咨询与建议

限定检索结果

文献类型

  • 1,739 篇 会议
  • 23 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,208 篇 工学
    • 1,099 篇 计算机科学与技术...
    • 695 篇 软件工程
    • 223 篇 信息与通信工程
    • 164 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 99 篇 控制科学与工程
    • 82 篇 生物工程
    • 61 篇 动力工程及工程热...
    • 50 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 32 篇 交通运输工程
    • 30 篇 光学工程
    • 29 篇 仪器科学与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 18 篇 安全科学与工程
    • 17 篇 力学(可授工学、理...
  • 498 篇 理学
    • 321 篇 数学
    • 96 篇 生物学
    • 83 篇 系统科学
    • 78 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 34 篇 化学
  • 270 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 62 篇 医学
    • 55 篇 临床医学
  • 36 篇 法学
    • 35 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 198 篇 computer archite...
  • 80 篇 hardware
  • 79 篇 computational mo...
  • 66 篇 high performance...
  • 57 篇 cloud computing
  • 50 篇 grid computing
  • 41 篇 distributed comp...
  • 41 篇 field programmab...
  • 40 篇 bandwidth
  • 37 篇 kernel
  • 37 篇 graphics process...
  • 34 篇 resource managem...
  • 34 篇 computer network...
  • 33 篇 performance eval...
  • 32 篇 throughput
  • 31 篇 computer science
  • 31 篇 application soft...
  • 31 篇 analytical model...
  • 30 篇 program processo...
  • 29 篇 supercomputers

机构

  • 26 篇 college of compu...
  • 19 篇 university of ch...
  • 14 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 school of data a...
  • 7 篇 school of comput...
  • 7 篇 institute of com...
  • 6 篇 computer network...
  • 6 篇 tsinghua univers...
  • 6 篇 school of cyber ...
  • 6 篇 changsha univers...
  • 5 篇 university of sc...
  • 5 篇 skl of computer ...
  • 5 篇 computer science...
  • 5 篇 school of comput...
  • 5 篇 hubei province k...
  • 5 篇 zhongguancun lab...

作者

  • 11 篇 duan yucong
  • 7 篇 zhang tao
  • 7 篇 li kenli
  • 7 篇 xu xiaolong
  • 6 篇 wang wei
  • 6 篇 gao guang r.
  • 5 篇 li peng
  • 5 篇 yunquan zhang
  • 5 篇 liu qin
  • 5 篇 wang dong
  • 5 篇 bader david a.
  • 5 篇 liu ruicheng
  • 5 篇 zhang rui
  • 5 篇 wan shouhong
  • 5 篇 wu jigang
  • 5 篇 panda dhabaleswa...
  • 5 篇 zhang jie
  • 5 篇 wang xiaoliang
  • 5 篇 chen long
  • 5 篇 li wei

语言

  • 1,714 篇 英文
  • 51 篇 其他
  • 3 篇 中文
  • 1 篇 波兰文
检索条件"任意字段=21st International Symposium on Computer Architecture and High Performance Computing"
1769 条 记 录,以下是351-360 订阅
排序:
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks  21st
An Automata-Theoretic Approach to Synthesizing Binarized Ne...
收藏 引用
21st international symposium on Automated Technology for Verification and Analysis, ATVA 2023
作者: Tao, Ye Liu, Wanwei Song, Fu Liang, Zhen Wang, Ji Zhu, Hongxu College of Computer Science and Technology National University of Defense Technology Changsha China School of Information Science and Technology ShanghaiTech University Shanghai China Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences Beijing China Automotive Software Innovation Center Shanghai China Institute for Quantum Information and State Key Laboratory for High Performance Computing National University of Defense Technology Changsha China
Deep neural networks, (DNNs, a.k.a. NNs), have been widely used in various tasks and have been proven to be successful. However, the accompanied expensive computing and storage costs make the deployments in resource-c... 详细信息
来源: 评论
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress)
Enforcing delay-aware fog-cloud based IoT firewall (Work In ...
收藏 引用
IEEE international symposium on Network computing and Applications
作者: Towhidul Islam Asif Ahmed Tanvir Raihan Rezwana Reaz Department of CSE Bangladesh University of Engineering and Technology Bangladesh
Firewalls for IoT devices can be enforced at the gateway or at the cloud. Utilizing a fog based architecture, firewalls can also be enforced at fog layer. Depending on where the firewall is running, varying delays and... 详细信息
来源: 评论
A high-Speed HBM Receiver Design for high-performance computing Systems
A High-Speed HBM Receiver Design for High-Performance Comput...
收藏 引用
international SoC Design Conference, ISOCC
作者: Thinh Nguyen-Viet Gyung-Su Byun Department of Electrical and Computer Engineering Inha University Incheon Korea
In this paper, we present a receiver design that achieves high data rates while maintaining low power consumption for high bandwidth memory (HBM) applications, using 28-nm CMOS technology. The proposed receiver scheme... 详细信息
来源: 评论
Multi-objective Deep Reinforcement Learning for Mobile Edge computing
Multi-objective Deep Reinforcement Learning for Mobile Edge ...
收藏 引用
international symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
作者: Ning Yang Junrui Wen Meng Zhang Ming Tang Institute of Automation Chinese Academy of Sciences Beijing China ZJU-UIUC Institute Zhejiang University Zhejing China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Mobile edge computing (MEC) is essential for next-generation mobile network applications that prioritize various performance metrics, including delays and energy consumption. However, conventional single-objective sch...
来源: 评论
Cloud-Native Plinth: A Platform to Support Containerized 5G Core Networks
Cloud-Native Plinth: A Platform to Support Containerized 5G ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Shen Gao Shuo Quan Jie Wu Cloud Computing Research Institute China Telecom Beijing P.R. China
With the proliferation of 5G Core (5GC) network workloads, the cloudification of 5GC has emerged as a pre-dominant trend. Cloud-native technologies enhance the carrier cloud of 5GC by providing capabilities for rapid ... 详细信息
来源: 评论
An Analytical Bound for Choosing Trivial strategies in Co-scheduling  21st
An Analytical Bound for Choosing Trivial Strategies in Co-sc...
收藏 引用
21st international Conference on Computational Science and Its Applications (ICCSA)
作者: Kuchumov, Ruslan Korkhov, Vladimir St Petersburg State Univ 7-9 Univ Skaya Nab St Petersburg 199034 Russia
Efficient usage of shared high-performance computing (HPC) resources raises the problem of HPC applications co-scheduling, i.e. the problem of execution of multiple applications simultaneously on the same shared compu... 详细信息
来源: 评论
Infinite Virtual Space Exploration Using Space Tiling and Perceivable Reset at Fixed Positions  21
Infinite Virtual Space Exploration Using Space Tiling and Pe...
收藏 引用
21st IEEE international symposium on Mixed and Augmented Reality (ISMAR)
作者: Kwon, Soon-Uk Jeon, Sang-Bin Hwang, June-Young Cho, Yong-Hun Park, Jinhyung Lee, In-Kwon Yonsei Univ Dept Comp Sci Seoul South Korea
A simultaneous walking experience in virtual and real spaces can provide a high sense of presence. However, users may face challenges when walking within a large virtual space while walking in a small and complex real... 详细信息
来源: 评论
Data Poisoning Attack to X-armed Bandits  21
Data Poisoning Attack to X-armed Bandits
收藏 引用
21st IEEE international Conference on Trust, Security and Privacy in computing and Communications, TrustCom 2022
作者: Luo, Zhi Li, Youqi Chen, Lixing Xu, Zichuan Zhou, Pan Huazhong University of Science and Technology School of Cyber Science and Engineering China Beijing Institute of Technology School of Cyberspace Science and Technology School of Computer Science China Shanghai Jiao Tong University Institute of Cyber Science and Technology China Dalian University of Technology School of Software China Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati... 详细信息
来源: 评论
Tender: Accelerating Large Language Models via Tensor Decomposition and Runtime Requantization
Tender: Accelerating Large Language Models via Tensor Decomp...
收藏 引用
Annual international symposium on computer architecture, ISCA
作者: Jungi Lee Wonbeom Lee Jaewoong Sim Department of Electrical and Computer Engineering Seoul National University
Large language models (LLMs) demonstrate outstanding performance in various tasks in machine learning and have thus become one of the most important workloads in today’s computing landscape. However, deploying LLM in... 详细信息
来源: 评论
Constructing Hardware Accelerators for Number-Theoretic Transform Using high-Level Synthesis
Constructing Hardware Accelerators for Number-Theoretic Tran...
收藏 引用
international SoC Design Conference, ISOCC
作者: Hyeri Roh Woo-Seok Choi Department of Electrical and Computer Engineering ISRC Seoul National University Seoul Korea
The rapid advancements in quantum computing threaten traditional public-key cryptosystems, necessitating the development of quantum-safe cryptographic solutions like post-quantum cryptography and lattice-based cryptog... 详细信息
来源: 评论