咨询与建议

限定检索结果

文献类型

  • 4,547 篇 会议
  • 83 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 4,645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,559 篇 工学
    • 2,365 篇 计算机科学与技术...
    • 1,163 篇 软件工程
    • 494 篇 电气工程
    • 407 篇 信息与通信工程
    • 212 篇 电子科学与技术(可...
    • 212 篇 控制科学与工程
    • 98 篇 网络空间安全
    • 80 篇 动力工程及工程热...
    • 80 篇 生物工程
    • 68 篇 光学工程
    • 65 篇 机械工程
    • 56 篇 生物医学工程(可授...
    • 36 篇 建筑学
    • 30 篇 化学工程与技术
    • 29 篇 环境科学与工程(可...
  • 614 篇 理学
    • 375 篇 数学
    • 144 篇 物理学
    • 93 篇 生物学
    • 74 篇 系统科学
    • 69 篇 统计学(可授理学、...
  • 465 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 129 篇 工商管理
    • 65 篇 公共管理
  • 111 篇 法学
    • 103 篇 社会学
  • 104 篇 医学
    • 73 篇 公共卫生与预防医...
    • 31 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 65 篇 文学
    • 65 篇 新闻传播学
  • 39 篇 经济学
    • 38 篇 应用经济学
  • 17 篇 教育学
  • 10 篇 农学
  • 1 篇 艺术学

主题

  • 1,194 篇 computer archite...
  • 426 篇 hardware
  • 344 篇 high performance...
  • 295 篇 computational mo...
  • 255 篇 concurrent compu...
  • 236 篇 application soft...
  • 214 篇 computer science
  • 205 篇 parallel process...
  • 179 篇 distributed comp...
  • 178 篇 costs
  • 171 篇 delay
  • 170 篇 grid computing
  • 168 篇 bandwidth
  • 164 篇 field programmab...
  • 154 篇 resource managem...
  • 153 篇 cloud computing
  • 144 篇 computer network...
  • 142 篇 throughput
  • 129 篇 processor schedu...
  • 125 篇 scalability

机构

  • 22 篇 institute of com...
  • 16 篇 graphic era deem...
  • 14 篇 chitkara univers...
  • 13 篇 university of ch...
  • 11 篇 college of compu...
  • 10 篇 school of comput...
  • 10 篇 computer science...
  • 9 篇 georgia inst tec...
  • 9 篇 computer systems...
  • 9 篇 intel corp santa...
  • 8 篇 department of co...
  • 8 篇 department of el...
  • 8 篇 ibm thomas j. wa...
  • 8 篇 barcelona superc...
  • 8 篇 mathematics and ...
  • 8 篇 quantum universi...
  • 8 篇 中国电子科技集团...
  • 8 篇 mathematics and ...
  • 8 篇 key laboratory o...
  • 8 篇 univ fed rio gra...

作者

  • 14 篇 navaux philippe ...
  • 10 篇 satvik vats
  • 9 篇 vats satvik
  • 9 篇 i. foster
  • 9 篇 d.k. panda
  • 8 篇 dhabaleswar k. p...
  • 8 篇 dongarra jack
  • 8 篇 loh gabriel h.
  • 8 篇 guedes dorgival
  • 8 篇 viktor k. prasan...
  • 8 篇 prasanna viktor ...
  • 8 篇 mutlu onur
  • 7 篇 shiva mehta
  • 7 篇 borin edson
  • 7 篇 chong frederic t...
  • 7 篇 torrellas josep
  • 7 篇 kim nam sung
  • 7 篇 li chao
  • 7 篇 zhou huiyang
  • 7 篇 ferreira renato

语言

  • 4,523 篇 英文
  • 100 篇 其他
  • 20 篇 中文
  • 3 篇 葡萄牙文
  • 1 篇 法文
检索条件"任意字段=15th Symposium on Computer Architecture and High Performance Computing"
4645 条 记 录,以下是431-440 订阅
排序:
Enhancing Oil Spill Detection Using Synthetic Aperture Radar With Dual Attention U-Net Model
Enhancing Oil Spill Detection Using Synthetic Aperture Radar...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: M Phani Shanmukh S Baghavathi Priya Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Oil spills present a critical hazard in oceans, requiring advanced monitoring systems to rapidly detect and contain environmental damage. this work proposes a deep learning approach combining a UNet encoder-decoder ar... 详细信息
来源: 评论
Combining Cache and Refresh to Optimize SSD Read performance Scheme  15th
Combining Cache and Refresh to Optimize SSD Read Performance...
收藏 引用
15th International symposium on Advanced Parallel Processing Technologies, APPT 2023
作者: Chen, Jinli Li, Peixuan Xie, Ping College of Computer of Qinghai Normal University Xining810016 China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining810016 China The Key Laboratory of Internet of Things of Qinghai Province Xining810016 China Academy of Plateau Science and Sustainability Xining810016 China
In the era of continuous advances in flash technology, the storage density of NAND flash memory is increasing, but the availability of data is declining. In order to improve data availability, low-density parity check... 详细信息
来源: 评论
Enhancing Scalability: A Complete Tree Sharding architecture Towards IoT  18th
Enhancing Scalability: A Complete Tree Sharding Architecture...
收藏 引用
18th International Conference on Wireless Artificial Intelligent computing Systems and Applications, WASA 2024
作者: Zhang, Luyi Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Zheng, Haibin Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Hangzhou Innovation Institute of Beihang University Hangzhou310052 China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055 China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China
With the rapid proliferation of integration of blockchain and IoT, traditional centralized architectures and single-node processing have been effectively solved, but scalability of blockchain have become inadequate to... 详细信息
来源: 评论
Scalable Data Aggregation for Cloud-based Internet of things Applications
Scalable Data Aggregation for Cloud-based Internet of Things...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Muktha Eti Santosh Kumar Singh Meenakshi Dheer Department of Electrical and Electronics Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India Department of Biotechnology ARKA JAIN University Jamshedpur Jharkhand India Department of Agriculture Vivekananda Global University Jaipur India
Scalable records aggregation is a critical component of cloud-primarily based net of things (IoT) programs. Facts aggregation permits the evaluation and optimization of offerings by means of permitting aggregated view... 详细信息
来源: 评论
A Novel Adaptive Computation Offloading Strategy for Collaborative DNN Inference over Edge Devices  20
A Novel Adaptive Computation Offloading Strategy for Collabo...
收藏 引用
20th IEEE Int symposium on Parallel and Distributed Processing with Applicat / 15th IEEE Int Conf on Social Comp and Networking / 12th IEEE Int Conf on Big Data and Cloud Comp / 12th IEEE Int Conf on Sustainable Comp and Commun
作者: Zhang, Yansong Liu, Xiao Xu, Jia Yuan, Dong Li, Xuejun Anhui Univ Sch Comp Sci & Technol Hefei Peoples R China Deakin Univ Sch Informat Technol Geelong Vic Australia Univ Sydney Sch Elect & Informat Engn Sydney NSW Australia
With the breakthrough of deep learning technology and the rapid growth of Internet of things (IoT), a fast-increasing number of artificial intelligence (AI) applications are being widely used in many smart IoT systems... 详细信息
来源: 评论
Using Logging-on-Write to Improve Non-Volatile Memory Checkpoints via Processing-in-Memory
Using Logging-on-Write to Improve Non-Volatile Memory Checkp...
收藏 引用
International symposium on computer architecture and high performance computing (SBAC-PAD)
作者: Kleber Kruger Ricardo Pannain Rodolfo Azevedo Institute of Computing State University of Campinas Campinas Brazil
NVM architectures must keep consistent data in case of failures, a property called crash consistency. A common way to do so is by checkpoint mechanisms. However, most of the strategies developed have performance and u...
来源: 评论
Design and Implementation of a Real-time IoT Solution for Smart Meter Data Analysis in Microsoft Azure
Design and Implementation of a Real-time IoT Solution for Sm...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Sai Deepa BhavaniPeri Abhishek Ravi M Supriya Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
this research presents an end-to-end IoT solution designed as a project, not a traditional lab setup. It simulates high-velocity data generation from smart meters and focuses on real-time data visualization within Az... 详细信息
来源: 评论
Neural Network Based Light Field Predictors: An Evaluation
Neural Network Based Light Field Predictors: An Evaluation
收藏 引用
IEEE Latin American symposium on Circuits and Systems (LASCAS)
作者: Matheus Jahnke Ítalo D. Machado Lucas Ikenoue Bruno Zatt Video Technology Research Group (ViTech) Graduate Program in Computing (PPGC) Federal University of Pelotas (UFPel) Pelotas Brazil
Processing and storing the 4D structure of light fields can be challenging and expensive due to the high-dimensional data and its unique characteristics. there are plenty of works employing convolutional neural networ...
来源: 评论
JANUS: A Simple and Efficient Speculative Defense using Reinforcement Learning
JANUS: A Simple and Efficient Speculative Defense using Rein...
收藏 引用
International symposium on computer architecture and high performance computing (SBAC-PAD)
作者: Pavlos Aimoniotis Stefanos Kaxiras Uppsala University Uppsala Sweden
Speculative execution and the emergence of Spectre attacks have forced architects to rethink how microprocessors are designed. Several approaches aim to close this security vulnerability while trying to minimize perfo... 详细信息
来源: 评论
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-things  21
Adaboost-based Graph Convolutional Networks with Channel Att...
收藏 引用
21st IEEE International symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud computing, 16th IEEE International Conference on Social computing and Networking and 13th International Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Long, Jing Luo, Cuiting Chen, Ruxin Liang, Wei Qin, Zheng Hunan Normal University College of Information Science and Engineering Changsha410081 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
With the increasing proliferation of Internet of things (IoT) and industrial big data technologies, while IoT scenarios offer intelligent services, cyberspace faces various types of threats and attacks. Despite Graph ... 详细信息
来源: 评论