咨询与建议

限定检索结果

文献类型

  • 4,281 篇 会议
  • 47 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 4,331 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,432 篇 工学
    • 2,168 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 607 篇 电气工程
    • 586 篇 信息与通信工程
    • 185 篇 仪器科学与技术
    • 138 篇 控制科学与工程
    • 120 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 59 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 38 篇 交通运输工程
    • 31 篇 生物医学工程(可授...
    • 27 篇 安全科学与工程
    • 26 篇 网络空间安全
    • 24 篇 光学工程
    • 23 篇 土木工程
    • 22 篇 材料科学与工程(可...
    • 20 篇 建筑学
    • 19 篇 航空宇航科学与技...
  • 418 篇 理学
    • 253 篇 数学
    • 86 篇 物理学
    • 72 篇 生物学
    • 51 篇 系统科学
    • 42 篇 统计学(可授理学、...
  • 261 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
  • 33 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 7 篇 教育学
  • 7 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 543 篇 parallel process...
  • 259 篇 computer archite...
  • 238 篇 computational mo...
  • 207 篇 distributed comp...
  • 186 篇 concurrent compu...
  • 179 篇 computer network...
  • 164 篇 network topology
  • 157 篇 hardware
  • 157 篇 graphics process...
  • 148 篇 routing
  • 130 篇 bandwidth
  • 123 篇 application soft...
  • 120 篇 neural networks
  • 120 篇 protocols
  • 107 篇 scalability
  • 104 篇 multicore proces...
  • 103 篇 throughput
  • 102 篇 algorithm design...
  • 102 篇 kernel
  • 101 篇 computer science

机构

  • 15 篇 institute of inf...
  • 14 篇 institute of com...
  • 14 篇 science and tech...
  • 13 篇 college of compu...
  • 13 篇 school of cyber ...
  • 13 篇 shandong fundame...
  • 12 篇 school of comput...
  • 10 篇 science and tech...
  • 9 篇 univ chinese aca...
  • 9 篇 university of ch...
  • 9 篇 natl univ def te...
  • 9 篇 natl univ def te...
  • 8 篇 shenyang aerospa...
  • 8 篇 beijing univ pos...
  • 8 篇 nanjing univ aer...
  • 8 篇 beijing universi...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 chinese acad sci...
  • 7 篇 national key lab...

作者

  • 17 篇 bagherzadeh nade...
  • 16 篇 kotenko igor
  • 14 篇 j. duato
  • 12 篇 wang yijie
  • 11 篇 daneshtalab maso...
  • 10 篇 ebrahimi masoume...
  • 10 篇 yijie wang
  • 10 篇 nader bagherzade...
  • 10 篇 igor kotenko
  • 10 篇 lexi xu
  • 9 篇 li dongsheng
  • 9 篇 marco aldinucci
  • 9 篇 matsutani hiroki
  • 8 篇 hiroki matsutani
  • 8 篇 masoumeh ebrahim...
  • 8 篇 plosila juha
  • 8 篇 marco danelutto
  • 8 篇 wang huaimin
  • 7 篇 tenhunen hannu
  • 7 篇 xinzhou cheng

语言

  • 4,273 篇 英文
  • 49 篇 其他
  • 11 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=Euromicro Conference on Parallel, Distributed and Network-Based Processing"
4331 条 记 录,以下是891-900 订阅
排序:
Optimization of RDMA-based HDFS Data Distribution Mechanism  17th
Optimization of RDMA-Based HDFS Data Distribution Mechanism
收藏 引用
17th IFIP WG 10.3 International conference on network and parallel Computing, NPC 2020
作者: Zhang, Xiao Liu, Binbin Zhao, Junhao Dong, Cong School of Computer Science Northwestern Polytechnical University Xian Shaanxi710129 China
Hadoop distributed File System (short for HDFS) is a high availability file system designed to run on commodity hardware. It uses multiple replicas to ensure high reliability, and many data are transmitted between sto... 详细信息
来源: 评论
Deep learning methods for malicious URL detection using embedding techniques as Logistic Regression with Lasso penalty and Random Forest
Deep learning methods for malicious URL detection using embe...
收藏 引用
International conference on parallel distributed and Grid Computing (PDGC)
作者: Isha Thakur Kajal Panda Sanjeev Kumar Cyber Security Technology Division Centre for Development of Advanced Computing Mohali India
In the Internet ecosystem, URLs (Uniform Resource Locators) are widely used to propagate malicious infections through spam, spear-phishing, drive-by-download exploitation, malware embedding, etc. The blacklisting, pat... 详细信息
来源: 评论
HIGH-PERFORMANCE COMPUTING PROBABILISTIC FRACTURE MECHANICS IMPLEMENTATION FOR GAS TURBINE ROTOR DISKS ON distributed ARCHITECTURES INCLUDING GRAPHICS processing UNITS (GPUS)
HIGH-PERFORMANCE COMPUTING PROBABILISTIC FRACTURE MECHANICS ...
收藏 引用
ASME Turbomachinery Technical conference and Exposition (Turbo Expo) - Sustainable Energy - Accelerating the Transition by Advancing Turbine Technology
作者: Gajjar, Mrugesh Amann, Christian Kadau, Kai Siemens Technol & Serv Pvt Ltd Bangalore Karnataka India Siemens Energy Mulheim Germany Siemens Energy Charlotte NC USA
We present an efficient Monte Carlo based probabilistic fracture mechanics simulation implementation for heterogeneous high-performance (HPC) architectures including CPUs and GPUs. The specific application focuses on ... 详细信息
来源: 评论
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi  27
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Tec...
收藏 引用
27th IEEE International conference on parallel and distributed Systems, ICPADS 2021
作者: Shu, Yuanhe Wang, Jingwei Kong, Linghe Yu, Jiadi Yang, Guisong Cai, Yueping Wang, Zhen Khan, Muhammad Khurram Shanghai Jiao Tong University China University of Shanghai for Science and Technology China Chongqing University China Instrumentation Technology and Economy Institute China King Saud University Saudi Arabia
The booming of mobile technologies and Internet of Things (IoTs) have facilitated the explosion of wireless devices and brought convenience to people's daily lives. Coming with the explosive growth of wireless dev... 详细信息
来源: 评论
A Graph Convolution Neural network based Method for Insider Threat Detection
A Graph Convolution Neural Network Based Method for Insider ...
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Kexiong Fei Jiang Zhou Lin Su Weiping Wang Yong Chen Fan Zhang School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Texas Tech University Lubbock USA Information Technology Center China Mobile Beijing China
In this research, we propose Log2Graph, a new insider threat detection method based on graph convolution neural network (GCN). This method first retrieves the corresponding logs and features from log files through fea... 详细信息
来源: 评论
Big Data Classification Model and Algorithm based on Double Quantum Particle Swarm Optimization
Big Data Classification Model and Algorithm Based on Double ...
收藏 引用
Control, Electronics and Computer Technology (ICCECT), IEEE International conference on
作者: Duan Jingbo Guangdong Business and Technology University Guangdong China Philippine Christian University Center for International Education Manila Philippine
For the traditional big data classification models and algorithms that have the drawback of long processing time, the use of intelligent algorithms to model identification of multivariable systems has become a mainstr...
来源: 评论
Word Embedding-based Context-sensitive network Flow Payload Anomaly Detection  3
Word Embedding-based Context-sensitive Network Flow Payload ...
收藏 引用
3rd International conference on Applied Machine Learning, ICAML 2021
作者: Li, Yizhou Wang, Yijie Cheng, Li Xu, Hongzuo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Payload anomaly detection can discover malicious beliaviors tiidden in network packets. It is liard to liandle payload due to its various possible characters and complex semantic context, and tlius identifying abnorma... 详细信息
来源: 评论
A Dual-stage Attention based SDN Traffic Prediction Method
A Dual-stage Attention Based SDN Traffic Prediction Method
收藏 引用
IEEE International conference on Big Data and Cloud Computing (BdCloud)
作者: Chenjing Gao Junli Wang Chungang Yan Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Traffic matrix is the main research object of traffic prediction in software-defined networking. Accurate and timely traffic matrix prediction plays an important role in avoiding network congestion. While various meth... 详细信息
来源: 评论
Retrofitting High Availability Mechanism to Tame Hybrid Transaction/Analytical processing  15
Retrofitting High Availability Mechanism to Tame Hybrid Tran...
收藏 引用
USENIX Annual Technical conference / 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
作者: Shen, Sijie Chen, Rong Chen, Haibo Zang, Binyu Shanghai Jiao Tong Univ Inst Parallel & Distributed Syst Shanghai Artificial Intelligence Lab Minist EducEngn Res Ctr Domain Specif Operating Shanghai Peoples R China
Many application domains can benefit from hybrid transaction/analytical processing (HTAP) by executing queries on real-time datasets produced by concurrent transactions. However, with the increasingly speedy transacti...
来源: 评论
ECRaft: A Raft based Consensus Protocol for Highly Available and Reliable Erasure-Coded Storage Systems  27
ECRaft: A Raft Based Consensus Protocol for Highly Available...
收藏 引用
27th IEEE International conference on parallel and distributed Systems, ICPADS 2021
作者: Xu, MingWei Zhou, Yu Qiao, Yuan Yuan Xu, Kai Wang, Yu Yang, Jie School of Artificial Intelligence Beijing University of Posts and Telecommunications China Technology Research Institute Aisino Corporation Beijing China
Erasure-coded redundancy is a fault-tolerant method with low-cost storage overhead. It only stores data fragments and parity fragments rather than full data across the cluster. The write process of erasure-coded data ... 详细信息
来源: 评论