咨询与建议

限定检索结果

文献类型

  • 10,083 篇 会议
  • 269 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 10,390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,285 篇 工学
    • 5,755 篇 计算机科学与技术...
    • 3,640 篇 软件工程
    • 1,366 篇 信息与通信工程
    • 1,287 篇 电气工程
    • 877 篇 控制科学与工程
    • 825 篇 电子科学与技术(可...
    • 465 篇 机械工程
    • 462 篇 生物工程
    • 392 篇 光学工程
    • 370 篇 动力工程及工程热...
    • 365 篇 生物医学工程(可授...
    • 288 篇 仪器科学与技术
    • 258 篇 化学工程与技术
    • 239 篇 交通运输工程
    • 230 篇 网络空间安全
    • 206 篇 材料科学与工程(可...
    • 193 篇 土木工程
    • 188 篇 建筑学
    • 184 篇 安全科学与工程
  • 2,754 篇 理学
    • 1,410 篇 数学
    • 868 篇 物理学
    • 503 篇 生物学
    • 362 篇 统计学(可授理学、...
    • 342 篇 化学
    • 240 篇 系统科学
  • 1,333 篇 管理学
    • 819 篇 管理科学与工程(可...
    • 629 篇 图书情报与档案管...
    • 366 篇 工商管理
  • 444 篇 医学
    • 346 篇 临床医学
    • 192 篇 基础医学(可授医学...
  • 186 篇 教育学
  • 143 篇 法学
  • 126 篇 经济学
  • 48 篇 农学
  • 41 篇 军事学
  • 31 篇 文学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,028 篇 program processo...
  • 729 篇 computer archite...
  • 418 篇 computational mo...
  • 390 篇 hardware
  • 343 篇 high performance...
  • 258 篇 parallel process...
  • 237 篇 computer science
  • 193 篇 optimization
  • 172 篇 benchmark testin...
  • 164 篇 concurrent compu...
  • 163 篇 application soft...
  • 159 篇 runtime
  • 156 篇 computer vision
  • 149 篇 bandwidth
  • 132 篇 deep learning
  • 129 篇 registers
  • 129 篇 libraries
  • 122 篇 scalability
  • 122 篇 parallel program...
  • 121 篇 throughput

机构

  • 70 篇 college of compu...
  • 57 篇 school of comput...
  • 56 篇 university of ch...
  • 45 篇 school of comput...
  • 34 篇 department of co...
  • 32 篇 college of compu...
  • 31 篇 univ chinese aca...
  • 30 篇 school of comput...
  • 30 篇 tsinghua univers...
  • 27 篇 school of comput...
  • 25 篇 school of data a...
  • 23 篇 college of compu...
  • 23 篇 computer network...
  • 23 篇 high energy astr...
  • 22 篇 graduate school ...
  • 21 篇 graduate school ...
  • 20 篇 center for astro...
  • 20 篇 department of ph...
  • 20 篇 department of ph...
  • 20 篇 the graduate sch...

作者

  • 25 篇 tokuno h.
  • 24 篇 ikeda d.
  • 23 篇 belz j.w.
  • 22 篇 jui c.c.h.
  • 22 篇 oshima a.
  • 22 篇 tsuda r.
  • 22 篇 kim j.h.
  • 22 篇 bergman d.r.
  • 22 篇 allen m.
  • 22 篇 matsuyama t.
  • 22 篇 wong t.
  • 22 篇 ishii t.
  • 22 篇 kim s.w.
  • 22 篇 takamura m.
  • 22 篇 yashiro k.
  • 22 篇 kadota k.
  • 22 篇 mayta r.
  • 22 篇 ozawa s.
  • 22 篇 kasami s.
  • 22 篇 rodriguez d.c.

语言

  • 9,499 篇 英文
  • 851 篇 其他
  • 67 篇 中文
  • 3 篇 西班牙文
  • 2 篇 土耳其文
检索条件"任意字段=Conference on High Performance Computer Modernization Program"
10390 条 记 录,以下是1301-1310 订阅
排序:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability  23
BOFSanitizer: Efficient locator and detector for buffer over...
收藏 引用
23rd IEEE International conference on high performance Computing and Communications, 7th IEEE International conference on Data Science and Systems, 19th IEEE International conference on Smart City and 7th IEEE International conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Wang, Wenzhi Fan, Meng Yu, Aimin Meng, Dan Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Buffer overflow is one of the most serious and common vulnerability that using memory beyond the allocated memory. It can cause many severe threats, including system crash, arbitrary code execution and data corruption... 详细信息
来源: 评论
Towards Optimized Streaming Tensor Completion on multiple GPUs  24
Towards Optimized Streaming Tensor Completion on multiple GP...
收藏 引用
24th IEEE International conference on high performance Computing and Communications, 8th IEEE International conference on Data Science and Systems, 20th IEEE International conference on Smart City and 8th IEEE International conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Hao, Jiwei Yang, Hailong Sun, Qingxiao Zhang, Huaitao Luan, Zhongzhi Qian, Depei School of Computer Science and Engineering Beihang University Beijing100191 China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi710049 China
Tensor completion is a prevailing method for predicting the unobserved or missing data in incomplete tensors. In many real-world scenarios, incomplete tensors can grow in multiple modes with streaming fashion. Such te... 详细信息
来源: 评论
Independent and Collaborative Demosaicking Neural Networks  5
Independent and Collaborative Demosaicking Neural Networks
收藏 引用
5th ACM International conference on Multimedia in Asia, MMAsia 2023
作者: Niu, Yan Zhang, Lixue Li, Chenlai State Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education College of Computer Science and Technology Jilin University Jilin Changchun China College of Computer Science and Technology Jilin University Changchun China School of Artificial Intelligence Shenzhen Polytechnic University Shenzhen China
Existing demosaicking neural models generally reconstruct the red, green and blue channels by one unified network. This has the advantage of allowing the RGB channels to share latent features. However, it is unnoticed... 详细信息
来源: 评论
Development of Methods for Analyzing the Process of Operator Training When Working with a CNC System Using Components of Analytical Systems
Development of Methods for Analyzing the Process of Operator...
收藏 引用
2022 International Russian Automation conference, RusAutoCon 2022
作者: Tuktamysheva, Liliia Kovalev, Ilya Nezmetdinov, Ramil Msut 'STANKIN' Department of Computer Control Systems Moscow Russia
The article discusses the trend of introduction of high-performance CNC equipment at Russian enterprises. It is planned to introduce various equipment, primarily domestic, in order to ensure uninterrupted performance ... 详细信息
来源: 评论
An Unsupervised Short- and Long-Term Mask Representation for Multivariate Time Series Anomaly Detection  29th
An Unsupervised Short- and Long-Term Mask Representation for...
收藏 引用
29th International conference on Neural Information Processing
作者: Miao, Qiucheng Xu, Chuanfu Zhan, Jun Zhu, Dong Wu, Chengkun Natl Univ Def Technol Inst Quantum Informat Coll Comp Sci & Technol Changsha Hunan Peoples R China Natl Univ Def Technol State Key Lab High Performance Comp Coll Comp Sci & Technol Changsha Hunan Peoples R China
Anomaly detection of multivariate time series is meaningful for system behavior monitoring. This paper proposes an anomaly detection method based on unsupervised Short- and Long-term Mask Representation learning(SLMR)... 详细信息
来源: 评论
A Novel Lightweight Convolutional Neural Network for EEG-Based Miniature-Event-Related Potentials
A Novel Lightweight Convolutional Neural Network for EEG-Bas...
收藏 引用
IEEE International conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)
作者: Liu, Chang Zhong, Wenxiao Di, Yang Zhao, Liang An, Xingwei Tianjin Univ Acad Med Engn & Translat Med Tianjin Peoples R China Tianjin Univ Acad Med Engn & Translat Med Tianjin Key Lab Brain Sci & Neuroengn Tianjin Peoples R China Tianjin Univ Haihe Lab Brain Comp Interact & Human Machine Int Tianjin Peoples R China Tianjin Univ State Key Lab Adv Med Mat & Devices Tianjin Peoples R China
Miniature asymmetric visual evoked potential (aVEP) induced by very small lateral visual stimuli is a comfortable stimulation paradigm. It could only induce a miniature potential about 0.5 mu V in amplitude, which cou... 详细信息
来源: 评论
A Secure and Reliable Construction Scheme for Enterprise Value Chain Networks  24
A Secure and Reliable Construction Scheme for Enterprise Val...
收藏 引用
24th IEEE International conference on high performance Computing and Communications, 8th IEEE International conference on Data Science and Systems, 20th IEEE International conference on Smart City and 8th IEEE International conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Qin, Chaoxia Guo, Bing Zhao, Yuting Shen, Yan College of Computer Science Sichuan University Chengdu China School of Computer Science Chengdu University of Information Technology Chengdu China
A value chain optimizes the economic benefit of an enterprise alliance by integrating the cooperation relationships among the upstream and downstream companies. Nevertheless, the absence of information security mechan... 详细信息
来源: 评论
Spatio-temporal Graph Learning on Adaptive Mined Key Frames for high-performance Multi-Object Tracking  14th
Spatio-temporal Graph Learning on Adaptive Mined Key Frames...
收藏 引用
14th International conference on Brain Inspired Cognitive Systems, BICS 2024
作者: Wang, Futian Liu, Fengxiang Wang, Xiao School of Computer Science and Technology Anhui University Hefei China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Hefei China
In this work, we propose a novel adaptive key frame mining strategy to guide multi-object tracking, which combines the advantages of short-term and long-term correlation to capture both the structured spatial relation... 详细信息
来源: 评论
A Multi-Scale Temporal Data Fusion Model Based on Deep Neural Network
A Multi-Scale Temporal Data Fusion Model Based on Deep Neura...
收藏 引用
2022 IEEE Asia-Pacific conference on Image Processing, Electronics and computers, IPEC 2022
作者: Wei, Xianglong Liu, Huiyi Chen, Zhongshuo Hohai University School of Computer and Information Nanjing China
Aiming at the poor performance of traditional data fusion algorithms for high-dimension, high-noise and multi-scale temporal data fusion, a data fusion model based on deep neural network (DDB model) is proposed in thi... 详细信息
来源: 评论
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for highly-Effective Drug-Protein Interaction Representation
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for...
收藏 引用
2023 IEEE International conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Qiu, Yanlong Wang, Siqi Yang, Xi Qiu, Xinyuan Wu, Chengkun Cui, Yingbo Yang, Canqun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science Hunan Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Hunan Changsha410073 China National University of Defense Technology Department of Biology and Chemistry College of Science Hunan Changsha410073 China
With the exponential growth of biomedical knowledge in unstructured text repositories such as PubMed, it is imminent to establish a knowledge graph-style, efficient searchable and targeted database that can support th... 详细信息
来源: 评论