Research Direction
Key Development Direction 1: | New Intelligent Computing System | ||||
Major Research Areas, Characteristics, and Advantages |
Due to the "near the end of Moore's Law" and the limitations of the current computing architecture (von Neumann architecture) caused by fundamental semiconductor technology reaching a bottleneck, the development of information computing systems is facing serious challenges. Traditional electronic computing systems struggle to effectively handle the ubiquitously high-dimensional big data, and complex diversified scientific computing problems in the modern society. There is an urgent need to develop theories, technologies, and devices for non-traditional computing In the context of the international academic forefront in the field of computers, breaking through new computing theories, e.g., biocomputing and neuromorphic computing to drive innovation in new computing technologies and accelerate the construction of a new generation of supercomputing systems, is theoretically valuable.
| ||||
Key Breakthrough Points: | (1) Architectures, computational models, operation rules, implementation methods, etc., in biocomputing. (2) Models, learning algorithms, and the system integration architecture of neuromorphic. | ||||
Key Development Direction 2: | Intelligent Software Middleware and Trusted Verification | ||||
Main Research Areas, Characteristics, and Advantages: |
Middleware, Operating Systems, and Data bases are the three fundamental software components of computers. The driving force behind the middleware research is the continuous emergence of new technological trends, such as the Internet, Internet of Things (IoT), cloud computing, and artificial intelligence. Opportunities and Open Challenges: Middleware creates a significant historical opportunity for the development of foundational software in China. The Intelligent software middleware not only faces the challenge of new software structures but also encounters the difficulty of solving the novel problem of the ineffectiveness of software verification formal methods after the introduction of AI. Characteristics Comparisons: While Peking University and Nanjing University focus on the "Web-based Component" middleware for the Internet, distinctive characteristics of this direction are the "Intelligent Component" middleware for intelligent systems. | ||||
Key Breakthrough Points: | (1) Theories and methods of intelligent software middleware. (2) Models and trusted verification of intelligent software. (3) Domain-specific trusted assurance technologies for intelligent software. | ||||
Key Development Direction 3: | Natural Language Understanding and Information Retrieval | ||||
Main Research Areas, Characteristics, and Advantages: |
Aiming at the goal of intelligent interaction between humans and machines, this direction investigates the Chinese-oriented principles, technologies, and methods involved in multilingual semantic understanding. It aims to break through the technological bottlenecks, i.e., the abilities of a computer to “listen, speak, read, write, and translate" as humans. The key research areas include technologies for speech and text translation, automated writing and question answering in languages with limited data and expert resources. The objective is to achieve natural interaction between humans and machines. | ||||
Key Breakthrough Points: | (1) Multimodal and multilingual intelligent processing technology. (2) Intelligent interactions and knowledge generation technology. (3) Next-generation information retrieval technology. | ||||
Key Development Direction 4: | The Next Generation of Network Architecture and Internet of Things Security | ||||
Main Research Areas, Features, and Advantages: |
This direction focuses primarily on the content within the scope of computer networks and information security, including network architecture, network management and optimization technologies, secure transmission, and information confidentiality. To address the shortcomings of traditional network architectures, the research direction explores the evolutionary path of the next generation of network architectures. It takes an integrated approach to network and cyberspace security, conducting researches on converged architecture and key technologies, heterogeneous network coordination and scheduling optimization theory, and Internet of Things (IoT) security and privacy computing. The objective is to overcome key bottlenecks in computer networks related to determinism, control, and security, forming a new paradigm for the next generation of network architectures. | ||||
Key Breakthrough Points: | (1) Converged architecture and key technologies. (2) Heterogeneous network coordination and scheduling optimization theory. (3) IoT security situational awareness and privacy computing. | ||||