咨询与建议

限定检索结果

文献类型

  • 1,133 篇 会议
  • 24 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 976 篇 工学
    • 909 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 228 篇 信息与通信工程
    • 147 篇 电气工程
    • 67 篇 电子科学与技术(可...
    • 42 篇 控制科学与工程
    • 39 篇 生物工程
    • 29 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 24 篇 测绘科学与技术
    • 19 篇 生物医学工程(可授...
    • 15 篇 安全科学与工程
    • 11 篇 光学工程
    • 9 篇 建筑学
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 化学工程与技术
  • 210 篇 理学
    • 138 篇 数学
    • 42 篇 生物学
    • 35 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 19 篇 物理学
  • 133 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 62 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 17 篇 农学
    • 15 篇 作物学
  • 14 篇 法学
    • 10 篇 社会学
  • 13 篇 医学
    • 9 篇 临床医学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 36 篇 cloud computing
  • 33 篇 parallel process...
  • 27 篇 parallel computi...
  • 24 篇 network topology
  • 22 篇 neural networks
  • 19 篇 machine learning
  • 17 篇 deep learning
  • 17 篇 network security
  • 16 篇 grid computing
  • 15 篇 scalability
  • 15 篇 computer archite...
  • 15 篇 cluster computin...
  • 14 篇 parallel program...
  • 14 篇 computational mo...
  • 14 篇 network architec...
  • 14 篇 edge computing
  • 13 篇 mapreduce
  • 13 篇 high performance...
  • 12 篇 monitoring
  • 12 篇 topology

机构

  • 17 篇 university of ch...
  • 14 篇 institute of com...
  • 9 篇 national univers...
  • 6 篇 college of compu...
  • 6 篇 shandong univ in...
  • 5 篇 university of sc...
  • 5 篇 school of comput...
  • 5 篇 services computi...
  • 5 篇 college of intel...
  • 4 篇 college of physi...
  • 4 篇 qingdao univ col...
  • 4 篇 school of comput...
  • 4 篇 univ bologna dei...
  • 4 篇 jilin univ coll ...
  • 4 篇 imperial vision ...
  • 4 篇 institute of com...
  • 3 篇 college of compu...
  • 3 篇 national enginee...
  • 3 篇 tsinghua univers...
  • 3 篇 department of co...

作者

  • 14 篇 jin hai
  • 7 篇 li daxing
  • 6 篇 liu yang
  • 6 篇 dvorsky jiri
  • 6 篇 shi xuanhua
  • 6 篇 hsu ching-hsien
  • 6 篇 vojacek lukas
  • 5 篇 qian depei
  • 5 篇 xiao limin
  • 4 篇 man ka lok
  • 4 篇 liu jie
  • 4 篇 drazdilova pavla
  • 4 篇 rossi davide
  • 4 篇 benini luca
  • 4 篇 tan guangming
  • 4 篇 zhang jie
  • 4 篇 daxing li
  • 4 篇 beferull-lozano ...
  • 4 篇 li wei
  • 4 篇 tong tong

语言

  • 1,170 篇 英文
  • 5 篇 中文
  • 3 篇 其他
检索条件"任意字段=8th IFIP International Conference on Network and Parallel Computing"
1177 条 记 录,以下是161-170 订阅
排序:
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE international conference on Data Science in Cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论
An Efficient Data Transmission Strategy for Edge-computing-Based Opportunistic Social networks  17th
An Efficient Data Transmission Strategy for Edge-Computing-B...
收藏 引用
17th ifip WG 10.3 international conference on network and parallel computing, NPC 2020
作者: Luo, Jingwen Wu, Jia Wu, Yuzhou School of Computer Science and Engineering Central South University Changsha410083 China
As wireless network has developed rapidly in recent years, especially with the maturity and wide application of 5G wireless system, millions of mobile users have been able to quickly exchange large amounts of data in ... 详细信息
来源: 评论
PC-BNA: parallel Convolution Binary Neural network Accelerator
PC-BNA: Parallel Convolution Binary Neural Network Accelerat...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Haihui Liu Yuang Zhang Xiangwei Zheng Mengxin Yu Baoxu An Xiaojie Liu Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology School of Information Science and Engineering Shandong Normal University Jinan China
Binary neural network (BNN) is widely used in speech recognition, image processing and other fields to save memory and speed up computing. However, the accuracy of the existing binarization scheme in the realistic dat... 详细信息
来源: 评论
A Configurable Hardware Architecture for Runtime Application of network Calculus  17th
A Configurable Hardware Architecture for Runtime Application...
收藏 引用
17th ifip WG 10.3 international conference on network and parallel computing, NPC 2020
作者: Hu, Xiao Lu, Zhonghai School of Computer National University of Defense Technology Changsha China KTH Royal Institute of Technology Stockholm Sweden
network Calculus has been a foundational theory for analyzing and ensuring Quality-of-Service (QoS) in a variety of networks including networks on Chip (NoCs). To fulfill dynamic QoS requirements of applications, runt... 详细信息
来源: 评论
Optimizing and Extending Serverless Platforms: A Survey  8
Optimizing and Extending Serverless Platforms: A Survey
收藏 引用
8th international conference on Software Defined Systems (SDS)
作者: Nazari, Maziyar Goodarzy, Sepideh Keller, Eric Rozner, Eric Mishra, Shivakant Univ Colorado Comp Sci Dept Boulder CO 80309 USA Univ Colorado Elect Comp & Energy Engn Dept Boulder CO 80309 USA Facebook Boulder CO USA
Serverless computing is a new cloud computing paradigm wherein people in academia and industry are actively proposing either interesting improvements or building excellent applications on top of it. AWS, Google Cloud,... 详细信息
来源: 评论
Security Situation Prediction of network Based on Lstm Neural network  17th
Security Situation Prediction of Network Based on Lstm Neura...
收藏 引用
17th ifip WG 10.3 international conference on network and parallel computing, NPC 2020
作者: Chen, Liqiong Fan, Guoqing Guo, Kun Zhao, Junyan Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201400 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai200237 China
As an emerging technology that blocks network security threats, network security situation prediction is the key to defending against network security threats. In view of the single source of information and the lack ... 详细信息
来源: 评论
Reducing the Time of Live Container Migration in a Workflow  17th
Reducing the Time of Live Container Migration in a Workflow
收藏 引用
17th ifip WG 10.3 international conference on network and parallel computing, NPC 2020
作者: Di, Zhanyuan Shao, En He, Mujun University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing China Chongqing University Chongqing China
As a lightweight virtualization solution, container technology can provide resource limiting capabilities and can run multiple isolated process sets under a single kernel instance. Multi-tenant preemption leads to com... 详细信息
来源: 评论
An Adaptive Delay-Limited Offloading Scheme Based on Multi-round Auction Model for Mobile Edge computing  17th
An Adaptive Delay-Limited Offloading Scheme Based on Multi-r...
收藏 引用
17th ifip WG 10.3 international conference on network and parallel computing, NPC 2020
作者: Qi, Huamei Wang, Yiran Jiang, Su Yang, Chunmeng Wu, Jia School of Computer Science and Engineering Central South University Changsha China Information Technology Department China Life Ecommerce Company Limited Changsha Regional Branch Changsha Hunan China
Mobile edge computing (MEC) has been widely used in many scenarios due to its advantages such as low latency, high bandwidth, and strong real-time performance. For mobile edge computing in networks with multiple mobil... 详细信息
来源: 评论
Comparison of Hardware Accelerator of Matrix Multiplication with Approximate Adders
Comparison of Hardware Accelerator of Matrix Multiplication ...
收藏 引用
20th international conference on Electronics, Information, and Communication (ICEIC)
作者: Chung, Yunchul Cho, Manhee Kim, Youngmin Hongik Univ Sch Elect & Elect Engn Seoul 04066 South Korea
Approximate computing is attracting attention as an energy-efficient design, especially suitable for Deep Neural network and Image Processing. In this study, a variety of approximate adders are applied to a hardware a... 详细信息
来源: 评论
Aware: Adaptive Distributed Training with Computation, Communication and Position Awareness for Deep Learning Model
Aware: Adaptive Distributed Training with Computation, Commu...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Yan Zeng Guangzheng Yi Yuyu Yin Jiyang Wu Meiting Xue Jilin Zhang Jian Wan Yunquan Zhang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China School of Cyberspace Hangzhou Dianzi University Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
the accuracy of the neural networks can usually be improved by increasing the size of the dataset and the layers or operators of the network, as it has strong composability. But, it makes a challenge to train these mo... 详细信息
来源: 评论