{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:39:57Z","timestamp":1725982797245},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319937182"},{"type":"electronic","value":"9783319937199"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93719-9_7","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T11:35:01Z","timestamp":1530272101000},"page":"47-52","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline"],"prefix":"10.1007","author":[{"given":"Li","family":"Jingmei","sequence":"first","affiliation":[]},{"given":"Wu","family":"Yanxia","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Guoyin","sequence":"additional","affiliation":[]},{"given":"Men","family":"Chaoguang","sequence":"additional","affiliation":[]},{"given":"Ma","family":"Chunguang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Changting","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"7_CR1","unstructured":"Zhang C., Liu, Y., Zhang, C.: \u201cComputer Architecture\u201d web course. EB\/OL (2005). \nhttp:\/\/sse.tongji.edu.cn\/arch-course\/index.htm"},{"issue":"3","key":"7_CR2","first-page":"218","volume":"37","author":"D Qu","year":"2010","unstructured":"Qu, D., Xue, J., Fan, T.: Application of heuristic teaching in teaching of \u201ccomputer system structure\u201d. J. Liaoning Univ. Nat. Sci. Ed. 37(3), 218\u2013220 (2010)","journal-title":"J. Liaoning Univ. Nat. Sci. Ed."},{"key":"7_CR3","volume-title":"Computer Architecture","author":"C Zhang","year":"2003","unstructured":"Zhang, C., Wang, Z., Zhang, C., et al.: Computer Architecture. Higher Education Press, Beijing (2003)"},{"issue":"24","key":"7_CR4","first-page":"57","volume":"19","author":"L Xuan","year":"2016","unstructured":"Xuan, L., Liansheng, H.: Computer architecture software simulation technology. J. Electron. Eng. Softw. Eng. 19(24), 57 (2016)","journal-title":"J. Electron. Eng. Softw. Eng."},{"issue":"11","key":"7_CR5","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.3844\/ajassp.2006.2114.2121","volume":"3","author":"M Hesson","year":"2006","unstructured":"Hesson, M.: Computer simulator: an educational tool for computer architecture. Am. J. Appl. Sci. 3(11), 2114\u20132121 (2006)","journal-title":"Am. J. Appl. Sci."},{"key":"7_CR6","unstructured":"Application of micro-class in the teaching of basic computer in university. J. Comput. Knowl. Technol. Acad. Exch. 12(1)157\u2013159 (2016)"},{"key":"7_CR7","first-page":"181","volume":"3","author":"C Sibo","year":"2016","unstructured":"Sibo, C.: Research on simulation technology of computer architecture software. J. Low Carbon World 3, 181\u2013182 (2016)","journal-title":"J. Low Carbon World"},{"key":"7_CR8","unstructured":"Huang, Q., Chang L., Zhang De-Hua, et al.: Host-based trusted security architecture based on trusted computing base. J. Inf. Netw. Secur. (7), 78\u201384 (2016)"},{"issue":"1","key":"7_CR9","first-page":"178","volume":"37","author":"W Endong","year":"2016","unstructured":"Endong, W., Jicheng, C., Hongwei, W., et al.: Status, challenges and prospects of computer architecture simulation technology. J. Microsoft Microcomput. Syst. 37(1), 178\u2013185 (2016)","journal-title":"J. Microsoft Microcomput. Syst."},{"key":"7_CR10","first-page":"84","volume":"1","author":"Z Shixin","year":"2015","unstructured":"Shixin, Z., Lei, Z.: Analysis of computer architecture software simulation technology. J. Comput. CD Softw. Appl. 1, 84\u201385 (2015)","journal-title":"J. Comput. CD Softw. Appl."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cageo.2017.04.014","volume":"105","author":"M Louboutin","year":"2017","unstructured":"Louboutin, M., Lange, M., Herrmann, F.J., et al.: Performance prediction of finite-difference solvers for different computer architectures. J. Comput. Geosci. 105, 148\u2013157 (2017)","journal-title":"J. Comput. Geosci."},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.cpc.2013.10.013","volume":"185","author":"VK Decyk","year":"2014","unstructured":"Decyk, V.K., Singh, T.V.: Particle-in-Cell algorithms for emerging computer architectures. J. Comput. Phys. Commun. 185(3), 708\u2013719 (2014)","journal-title":"J. Comput. Phys. Commun."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Learning, e-Education, and Online Training"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93719-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T11:40:43Z","timestamp":1530272443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93719-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937182","9783319937199"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93719-9_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}