咨询与建议

限定检索结果

文献类型

  • 3,146 篇 会议
  • 71 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 3,279 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 2,054 篇 计算机科学与技术...
    • 1,033 篇 软件工程
    • 414 篇 电气工程
    • 326 篇 信息与通信工程
    • 309 篇 电子科学与技术(可...
    • 111 篇 控制科学与工程
    • 69 篇 机械工程
    • 67 篇 光学工程
    • 67 篇 生物工程
    • 62 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 33 篇 仪器科学与技术
    • 32 篇 建筑学
    • 30 篇 材料科学与工程(可...
    • 29 篇 化学工程与技术
    • 25 篇 土木工程
    • 21 篇 力学(可授工学、理...
  • 721 篇 理学
    • 482 篇 数学
    • 174 篇 物理学
    • 79 篇 生物学
    • 65 篇 系统科学
    • 60 篇 统计学(可授理学、...
    • 36 篇 化学
  • 244 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 101 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 62 篇 医学
    • 53 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 农学
    • 19 篇 作物学
  • 21 篇 法学
    • 19 篇 社会学
  • 15 篇 经济学
  • 12 篇 文学
  • 11 篇 教育学
  • 4 篇 军事学

主题

  • 325 篇 parallel process...
  • 204 篇 graphics process...
  • 202 篇 computer archite...
  • 156 篇 parallel archite...
  • 135 篇 parallel process...
  • 123 篇 parallel algorit...
  • 120 篇 graphics process...
  • 115 篇 hardware
  • 113 篇 image processing
  • 86 篇 concurrent compu...
  • 86 篇 computational mo...
  • 75 篇 signal processin...
  • 72 篇 parallel program...
  • 72 篇 field programmab...
  • 69 篇 multicore proces...
  • 68 篇 instruction sets
  • 67 篇 parallel computi...
  • 65 篇 algorithm design...
  • 60 篇 gpu
  • 57 篇 throughput

机构

  • 9 篇 college of compu...
  • 9 篇 natl univ def te...
  • 8 篇 carleton univ sc...
  • 8 篇 national laborat...
  • 6 篇 hosei univ dept ...
  • 6 篇 st francis xavie...
  • 5 篇 chinese acad sci...
  • 5 篇 univ aizu dept c...
  • 5 篇 polish japanese ...
  • 5 篇 computer science...
  • 5 篇 college of compu...
  • 5 篇 city university ...
  • 4 篇 shanghai jiao to...
  • 4 篇 charles univ pra...
  • 4 篇 rwth aachen univ...
  • 4 篇 hainan internati...
  • 4 篇 department of co...
  • 4 篇 inria rennes
  • 4 篇 chinese acad sci...
  • 4 篇 polish acad sci ...

作者

  • 11 篇 jack dongarra
  • 10 篇 roman wyrzykowsk...
  • 8 篇 dongarra jack
  • 7 篇 liu jie
  • 7 篇 konrad karczewsk...
  • 7 篇 quintana-orti en...
  • 6 篇 hannig frank
  • 6 篇 li dongsheng
  • 6 篇 teich juergen
  • 6 篇 li chao
  • 6 篇 nakano koji
  • 6 篇 peng shietung
  • 6 篇 li yamin
  • 6 篇 chu wanming
  • 6 篇 krulis martin
  • 5 篇 zhang lei
  • 5 篇 ito yasuaki
  • 5 篇 li kenli
  • 5 篇 wanlei zhou
  • 5 篇 tudruj marek

语言

  • 3,234 篇 英文
  • 35 篇 其他
  • 14 篇 中文
检索条件"任意字段=5th International Conference on Algorithms and Architectures for Parallel Processing"
3280 条 记 录,以下是71-80 订阅
排序:
Multimodal Summarization with Modality-Aware Fusion and Summarization Ranking  24th
Multimodal Summarization with Modality-Aware Fusion and Su...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Ye, Xuming Chaomurilige Liu, Zheng Luo, Haoyu Dong, Jun Luo, Yingzhe Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of China Beijing China Hainan International College of Minzu University of China Li’an International Education Innovation pilot Zone Hainan572499 China Faculty of Data Science City University of Macau Macau China
Existing multimodal summarization methods primarily focus on multimodal fusion to efficiently utilize the visual information for summarization. However, they fail to exploit the deep interaction between textual and vi... 详细信息
来源: 评论
Enhancing Text-Image Person Re-identification via Intra-Class Relevance Learning  24th
Enhancing Text-Image Person Re-identification via Intra-Cla...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: He, Wenbin Gao, Yutong Liu, Wenjian Chaomurilige Liu, Zheng Guo, Ao Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance Ministry of Education Minzu University of China Beijing100081 China Hainan International College of Minzu University of China Li’an International Education Innovation pilot Zone Hainan Lingshui Li572499 China City University of Macau China
Text-Image Person Re-Identification (TIReID) is a computer vision task that involves identifying person in images or videos based on textual descriptions. Current works mainly employ Vision Language Pretrained (VLP) m... 详细信息
来源: 评论
NPB-PSTL: C++ STL algorithms with parallel Execution Policies in NAS parallel Benchmarks
NPB-PSTL: C++ STL Algorithms with Parallel Execution Policie...
收藏 引用
33rd Euromicro international conference on parallel, Distributed, and Network-Based processing, PDP 2025
作者: Loff, Junior Hoffmann, Renato B. Bianchessi, Arthur S. Mallmann, Leonardo Griebler, Dalvan Binder, Walter Faculty of Informatics Lugano Switzerland Porto Alegre Brazil
the C++ language continually evolves through formal specifications established by its standards committee, proposing new features to maintain $\mathrm{C}++$ as a relevant programming language while improving usability... 详细信息
来源: 评论
Neural Text Normalization for Luxembourgish Using Real-Life Variation Data  12
Neural Text Normalization for Luxembourgish Using Real-Life ...
收藏 引用
12th Workshop on NLP for Similar Languages, Varieties and Dialects, VarDial 2025 - co-located with the 31st international conference on Computational Linguistics, COLING 2025
作者: Lutgen, Anne-Marie Plum, Alistair Purschke, Christoph Plank, Barbara University of Luxembourg Esch-sur-Alzette Luxembourg MaiNLP Center for Information and Language Processing LMU Munich Germany Munich Germany
Orthographic variation is very common in Luxembourgish texts due to the absence of a fully-fledged standard variety. Additionally, developing NLP tools for Luxembourgish is a difficult task given the lack of annotated... 详细信息
来源: 评论
SwinMixer Detector: A Two-Level Traffic Flow Detection System Based on Swin Transformer and MLP-Mixer  24th
SwinMixer Detector: A Two-Level Traffic Flow Detection Syste...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Lu, Lu Fang, Menghao Li, Xia Li, Minghui Lei, Tianwei Kong, Zixiao School of Cyber Science and Engineering University of International Relations Beijing100091 China Institute of Disaster and Emergency Medicine Tianjin University Tianjin300072 China Marine Engineering of College Dalian Maritime University Dalian116026 China School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China
this paper explores the problem of boundary data classification ambiguity that arises when machine learning techniques are applied in the field of intrusion detection. the features and attributes of the boundary data ... 详细信息
来源: 评论
Data Center Infrastructure in the Era of Generative Artificial Intelligence
Data Center Infrastructure in the Era of Generative Artifici...
收藏 引用
Innovative Research in Applied Science, Engineering and Technology (IRASET),conference on
作者: Antonio Cortés Castillo Departamento de Informática Universidad de Panamá Ciudad de Panamá Panamá
Nowadays, Generative Artificial Intelligence (GenAI) is increasingly making inroads in Data Centers, helping to improve aspects related to latency and high speed. Data center-level network infrastructures require mana... 详细信息
来源: 评论
Language-Based Colorization with Sparse Attention and Multi-scale Cross-Modal Semantic Alignment  24th
Language-Based Colorization with Sparse Attention and Mult...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Zhang, Ying Gao, Yutong Liu, Xuan Zhang, Lefeng Liu, Xianggan Jiang, Shan Ethnic Language Intelligent Analysis and Security Governance Minzu University of China Beijing China Faculty of Data Science City university of Macau China Natural Language Processing and Knowledge Graph Lab Huazhong University of Science and Technology Wuhan China
Language-based colorization generates realistic and aesthetically appealing colors by leveraging the guidance of intuitive and user-friendly natural language descriptions. Previous methods in language-based image colo... 详细信息
来源: 评论
Enhancing Delay-Sensitive Task Offloading: A Multi-agent Deep Reinforcement Learning Algorithm for MEC-Based AIoT Systems  24th
Enhancing Delay-Sensitive Task Offloading: A Multi-agent Dee...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Tang, Fengjie Xu, Jia Liu, Xiao Yao, Aiting Fang, Mingyan Li, Xuejun Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging School of Computer Science and Technology Anhui University Hefei China School of Information Technology Deakin University Geelong Australia
Artificial Intelligence of things (AIoT) systems are widely utilized in various domains such as smart logistics and smart health. In AIoT systems, computational tasks earmarked for offloading by IoT devices often have... 详细信息
来源: 评论
A Dual-Defense Self-balancing Framework Against Bilateral Model Attacks in Federated Learning  24th
A Dual-Defense Self-balancing Framework Against Bilateral Mo...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Wu, Xiang Yao, Aiting Pal, Shantanu Jiang, Frank Li, Xuejun Xu, Jia Dong, Chengzu Chen, Xuefei Zhang, Xiuyi Liu, Xiao Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging School of Computer Science and Technology Anhui University Anhui China Deakin University Melbourne Australia School of Data Science Lingnan University Hong Kong
With the rapid expansion of Artificial Intelligence (AI) services, smart devices generate a large amount of user data at the edge network, which urgently needs to be protected while effectively extracting information.... 详细信息
来源: 评论
Defense Against Textual Backdoors via Elastic Weighted Consolidation-Based Machine Unlearning  24th
Defense Against Textual Backdoors via Elastic Weighted Cons...
收藏 引用
24th international conference on algorithms and architectures for parallel processing, ICA3PP 2024
作者: Xuan, Haojun Wang, Yajie Wu, Huishu Liu, Tao Zhang, Chuan Zhu, Liehuang Beijing Institute of Technology Beijing China China University of Political Science and Law Beijing China China Academy of Information and Communications Technology Beijing China
Backdoor attacks pose significant threats to Natural Language processing (NLP) models. Various backdoor defense methods for NLP models primarily function by identifying and subsequently manipulating backdoor triggers ... 详细信息
来源: 评论