咨询与建议

限定检索结果

文献类型

  • 1,738 篇 会议
  • 23 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,206 篇 工学
    • 1,098 篇 计算机科学与技术...
    • 696 篇 软件工程
    • 222 篇 信息与通信工程
    • 163 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 98 篇 控制科学与工程
    • 82 篇 生物工程
    • 61 篇 动力工程及工程热...
    • 49 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 32 篇 交通运输工程
    • 30 篇 光学工程
    • 28 篇 仪器科学与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 18 篇 安全科学与工程
    • 17 篇 力学(可授工学、理...
  • 497 篇 理学
    • 321 篇 数学
    • 96 篇 生物学
    • 83 篇 系统科学
    • 77 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 34 篇 化学
  • 270 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 62 篇 医学
    • 55 篇 临床医学
  • 36 篇 法学
    • 35 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 198 篇 computer archite...
  • 80 篇 hardware
  • 79 篇 computational mo...
  • 66 篇 high performance...
  • 57 篇 cloud computing
  • 50 篇 grid computing
  • 41 篇 distributed comp...
  • 41 篇 field programmab...
  • 40 篇 bandwidth
  • 37 篇 kernel
  • 37 篇 graphics process...
  • 34 篇 resource managem...
  • 34 篇 computer network...
  • 33 篇 performance eval...
  • 32 篇 throughput
  • 31 篇 computer science
  • 31 篇 application soft...
  • 31 篇 analytical model...
  • 30 篇 program processo...
  • 29 篇 supercomputers

机构

  • 26 篇 college of compu...
  • 19 篇 university of ch...
  • 14 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 school of data a...
  • 7 篇 school of comput...
  • 7 篇 institute of com...
  • 6 篇 computer network...
  • 6 篇 tsinghua univers...
  • 6 篇 school of cyber ...
  • 6 篇 changsha univers...
  • 5 篇 university of sc...
  • 5 篇 skl of computer ...
  • 5 篇 computer science...
  • 5 篇 school of comput...
  • 5 篇 hubei province k...
  • 5 篇 zhongguancun lab...

作者

  • 11 篇 duan yucong
  • 7 篇 zhang tao
  • 7 篇 li kenli
  • 7 篇 xu xiaolong
  • 6 篇 wang wei
  • 6 篇 gao guang r.
  • 5 篇 li peng
  • 5 篇 yunquan zhang
  • 5 篇 liu qin
  • 5 篇 wang dong
  • 5 篇 bader david a.
  • 5 篇 liu ruicheng
  • 5 篇 zhang rui
  • 5 篇 wan shouhong
  • 5 篇 wu jigang
  • 5 篇 panda dhabaleswa...
  • 5 篇 zhang jie
  • 5 篇 wang xiaoliang
  • 5 篇 chen long
  • 5 篇 li wei

语言

  • 1,568 篇 英文
  • 196 篇 其他
  • 3 篇 中文
  • 1 篇 波兰文
检索条件"任意字段=21st International Symposium on Computer Architecture and High Performance Computing"
1768 条 记 录,以下是1021-1030 订阅
排序:
Understanding the virtualization "Tax" of scale-out pass-through GPUs in GaaS clouds: An empirical study
Understanding the virtualization "Tax" of scale-out pass-thr...
收藏 引用
IEEE symposium on high-performance computer architecture
作者: Ming Liu Tao Li Neo Jia Andy Currid Vladimir Troy Department of Electrical and Computer Engineering University of Florida NVIDIA
Pass-through techniques enable virtual machines to directly access hardware GPU resources in an exclusive mode, delivering extraordinary graphics performance for client users in GaaS clouds. However, the virtualizatio... 详细信息
来源: 评论
Ad-hoc lab computer network configuration using remote resources
Ad-hoc lab computer network configuration using remote resou...
收藏 引用
international symposium for Design and Technology of Electronics Packages (SIITME)
作者: T.C. Bălan D.N. Robu F. Sandu Department of Electronics and Computers “Transilvania” University of Brasov Romania
For the university computer labs there is a real challenge for the fixed infrastructure to keep the pace with the increased demand for computational resources. The complexity of the computer architecture is given by t... 详细信息
来源: 评论
TREBIVETM: A TREe Based Integrity Verification Environment for Non-volatile Memory System
TREBIVETM: A TREe Based Integrity Verification Environment f...
收藏 引用
Pacific Rim international symposium on Dependable computing
作者: Mikio Hashimoto Naoko Yamada Jun Kanai Computer Architecture & Security Systems Laboratory Corporate Research & Development Center Toshiba Saiwai-ku Kawasaki Japan
In view of the introduction of computer technologies into social infrastructure, computer security is rapidly emerging as a major real-world problem. Since control devices are left in physically insecure fields, the r... 详细信息
来源: 评论
An Efficient SAT Solving Algorithm Using Pseudo-Conflict Learning and Heterogeneous computing
An Efficient SAT Solving Algorithm Using Pseudo-Conflict Lea...
收藏 引用
international symposium on computing and Networking (CANDAR)
作者: Heng Liu Wendy MacCaully Xu Wang School of Computing Science Simon Fraser University Burnaby Canada Saint Francis Xavier University Antigonish NS CA Department of Mathematics St. Francis Xavier University Antigonish Canada
The Propositional Satisfiability Problem (SAT) is one of the most fundamental NP-complete problems. In this paper, a high-performance and heterogeneous SAT solving algorithm is presented. This algorithm, called CUDA-W... 详细信息
来源: 评论
Fast and Accurate Simulation of Multithreaded Sparse Linear Algebra Solvers
Fast and Accurate Simulation of Multithreaded Sparse Linear ...
收藏 引用
international Conference on Parallel and Distributed Systems (ICPADS)
作者: Luka stanisic Emmanuel Agullo Alfredo Buttari Abdou Guermouche Arnaud Legrand Florent Lopez Brice Videau CNRS/Inria/University of Grenoble Alpes France Inria/University of Bordeaux France CNRS/University Paul Sabatier Toulouse France
The ever growing complexity and scale of parallel architectures imposes to rewrite classical monolithic HPC scientific applications and libraries as their portability and performance optimization only comes at a prohi... 详细信息
来源: 评论
OPUF: Obfuscation logic based physical unclonable function
OPUF: Obfuscation logic based physical unclonable function
收藏 引用
IEEE symposium on On-Line Testing (IOLTS)
作者: Jing Ye Yu Hu Xiaowei Li State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing P. R. China
The Physical Unclonable Function (PUF) has broad application prospects in the field of hardware security. The arbiter PUF is a typical kind of strong PUF. However, due to its deterministic logic, attackers can use mod... 详细信息
来源: 评论
Survivability Quantification of Wireless Ad Hoc Network Taking Account of Border Effects
Survivability Quantification of Wireless Ad Hoc Network Taki...
收藏 引用
Pacific Rim international symposium on Dependable computing
作者: Zhipeng Yi Tadashi Dohi Hiroyuki Okamura Hiroshima University 1-4-1 Kagamiyama Higashi-Hiroshima Japan
Border effect in communication network area is one of the most important problems to quantify accurately the performance/dependability of wireless ad hoc networks (WAHNs), because the assumption on uniformity of netwo... 详细信息
来源: 评论
Timing-resilient Network-on-Chip architectures
Timing-resilient Network-on-Chip architectures
收藏 引用
IEEE symposium on On-Line Testing (IOLTS)
作者: Alexandros Panteloukas Anastasios Psarras Chrysostomos Nicopoulos Giorgos Dimitrakopoulos Electrical and Computer Engineering Democritus University of Thrace Xanthi Greece Electrical and Computer Engineering University of Cyprus Nicosia Cyprus
Networks-on-Chip (NoC) have been established as the de facto standard for on-chip communication in multi-/many-core systems, due to their innate scalability properties pertaining to performance and physical implementa... 详细信息
来源: 评论
Rain Removal Using Single Image based on Non-negative Matrix Factorization
Rain Removal Using Single Image based on Non-negative Matrix...
收藏 引用
Workshop on computer architecture, Embedded Systems, SoC, and VLSI/EDA / international computer symposium (ICS)
作者: Liu, Pin-Hsian Lin, Chih-Yang Yeh, Chia-Hung Kang, Li-Wei Lo, Kyle Shih-Huang Hwang, Tai-Hwei Kuo, Chia-Chen Natl Sun Yat Sen Univ Dept Elect Engn Kaohsiung Taiwan Asia Univ Dept Comp Sci & Informat Engn Taichung Taiwan China Med Univ China Med Univ Hosp Dept Med Res Taichung Taiwan Natl Yunlin Univ Sci & Technol Dept Comp Sci & Informat Engn Touliu Yunlin Taiwan Ind Technol Res Inst Computat Intelligence Technol Ctr Hsinchu Taiwan Natl Appl Res Labs Natl Ctr High Performance Comp Hsinchu Taiwan
Rain streak in an image can degrade the human vision, as well as the image's quality. However, the rain removal of a single image is a challenging problem, because the rain is moving fast and may become torrential... 详细信息
来源: 评论
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for ...
收藏 引用
Pacific Rim international symposium on Dependable computing
作者: Claudio Ciccotelli Leonardo Aniello Federico Lombardi Luca Montanari Leonardo Querzoni Roberto Baldoni Sapienza University of Rome
Many organizations today still manage mid or large in-house data centers that require very expensive maintenance efforts, including fault detection. Common monitoring frameworks used to quickly detect faults are compl... 详细信息
来源: 评论