咨询与建议

限定检索结果

文献类型

  • 16,951 篇 会议
  • 194 篇 期刊文献
  • 107 册 图书

馆藏范围

  • 17,252 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,579 篇 工学
    • 9,463 篇 计算机科学与技术...
    • 3,957 篇 软件工程
    • 2,481 篇 电气工程
    • 2,149 篇 信息与通信工程
    • 638 篇 控制科学与工程
    • 608 篇 电子科学与技术(可...
    • 329 篇 生物工程
    • 289 篇 机械工程
    • 213 篇 仪器科学与技术
    • 201 篇 动力工程及工程热...
    • 168 篇 生物医学工程(可授...
    • 117 篇 光学工程
    • 113 篇 材料科学与工程(可...
    • 105 篇 网络空间安全
    • 104 篇 建筑学
    • 103 篇 交通运输工程
    • 93 篇 土木工程
  • 2,059 篇 理学
    • 1,286 篇 数学
    • 386 篇 生物学
    • 364 篇 物理学
    • 257 篇 统计学(可授理学、...
    • 232 篇 系统科学
    • 95 篇 化学
  • 1,298 篇 管理学
    • 975 篇 管理科学与工程(可...
    • 383 篇 图书情报与档案管...
    • 380 篇 工商管理
  • 197 篇 医学
    • 151 篇 临床医学
  • 162 篇 农学
    • 123 篇 作物学
  • 123 篇 经济学
    • 123 篇 应用经济学
  • 118 篇 法学
    • 94 篇 社会学
  • 32 篇 教育学
  • 24 篇 文学
  • 21 篇 军事学
  • 5 篇 艺术学
  • 1 篇 历史学

主题

  • 1,296 篇 parallel process...
  • 1,021 篇 concurrent compu...
  • 960 篇 computer network...
  • 787 篇 distributed comp...
  • 763 篇 computer archite...
  • 677 篇 cloud computing
  • 670 篇 computational mo...
  • 648 篇 network topology
  • 598 篇 routing
  • 570 篇 computer science
  • 505 篇 neural networks
  • 478 篇 peer to peer com...
  • 466 篇 bandwidth
  • 415 篇 application soft...
  • 370 篇 protocols
  • 364 篇 scalability
  • 345 篇 hardware
  • 317 篇 network servers
  • 313 篇 grid computing
  • 305 篇 parallel computi...

机构

  • 66 篇 university of ch...
  • 56 篇 institute of com...
  • 36 篇 univ chinese aca...
  • 31 篇 computer network...
  • 30 篇 shandong provinc...
  • 25 篇 school of comput...
  • 24 篇 tsinghua univ de...
  • 23 篇 school of comput...
  • 23 篇 institute of inf...
  • 22 篇 chinese acad sci...
  • 22 篇 institute of com...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 college of intel...
  • 19 篇 tsinghua univers...
  • 19 篇 shanghai jiao to...
  • 19 篇 department of co...
  • 19 篇 beijing univ pos...
  • 18 篇 college of compu...
  • 17 篇 chinese acad sci...

作者

  • 19 篇 liu yang
  • 19 篇 li dongsheng
  • 19 篇 koibuchi michihi...
  • 17 篇 liu jie
  • 16 篇 shietung peng
  • 15 篇 yang yang
  • 14 篇 dhabaleswar k. p...
  • 14 篇 wang guojun
  • 14 篇 xiao limin
  • 13 篇 m. takizawa
  • 13 篇 li qiang
  • 13 篇 wanlei zhou
  • 13 篇 wang wei
  • 12 篇 depei qian
  • 12 篇 li xin
  • 12 篇 yang jun
  • 12 篇 hoefler torsten
  • 12 篇 wu jie
  • 12 篇 yamin li
  • 12 篇 qian depei

语言

  • 17,124 篇 英文
  • 72 篇 其他
  • 57 篇 中文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=IFIP International Conference on Network and Parallel Computing"
17252 条 记 录,以下是51-60 订阅
排序:
LDChain: A Lightweight and Scalable Blockchain System for Dynamic IoT Scenarios  20th
LDChain: A Lightweight and Scalable Blockchain System for ...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Wang, Jianrong Cao, Yuxuan Hu, Dengcheng Li, Qi Li, Sen Li, Xuewei Liu, Xiulong College of Intelligence and Computing Tianjin University Tianjin China School of Electrical and Information Engineering Tianjin University Tianjin China School of Future Technology Tianjin University Tianjin China
As a distributed ledger, blockchain inherently guarantees data consistency. However, when applied to the Internet of Things (IoT), existing solutions employing blockchain systems struggle to address the scalability de... 详细信息
来源: 评论
2FA Sketch: Two-Factor Armor Sketch for Accurate and Efficient Heavy Hitter Detection in Data Streams  20th
2FA Sketch: Two-Factor Armor Sketch for Accurate and Efficie...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Liu, Xilai Zhang, Xinyi Liu, Bingqing Li, Tao Yang, Tong Xie, Gaogang Institute of Computing Technologies Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China CNIC Chinese Academy of Sciences Beijing China Beijing University of Posts and Telecommunications Beijing China National University of Defense Technology Changsha China Peking University Beijing China
Detecting heavy hitters, which are flows exceeding a specified threshold, is crucial for network measurement, but it faces challenges due to increasing throughput and memory constraints. Existing sketch-based solution... 详细信息
来源: 评论
RV-CVP: A Flexible Variable Precision RISC-V ISA Extension for Convolutional Neural network  20th
RV-CVP: A Flexible Variable Precision RISC-V ISA Extension f...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Zhu, Jingyi Zhao, Di Zhang, Weifeng Jia, Zhijie Liu, Boran Chen, Guokai Alibaba Group Hangzhou China Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China Peking University Beijing China
Convolutional neural network (CNN) performs well in several research fields and achieves high accuracy. With the development of CNNs, various hardware acceleration methods have been proposed. Instruction Set Architect... 详细信息
来源: 评论
DTuner: A Construction-Based Optimization Method for Dynamic Tensor Operators Accelerating  20th
DTuner: A Construction-Based Optimization Method for Dynam...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Chen, Wenxin Diao, Boyu Liu, Hangda Wang, RuiSheng Xu, Yongjun Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Auto-optimization of tensor programs is a crucial technique in deep learning compilers. Traditional tensor program optimization methods rely on the known fixed shape of the tensor, but when inputs of tensor program ar... 详细信息
来源: 评论
Gradient-Aware Incremental network Quantization  20th
Gradient-Aware Incremental Network Quantization
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Meng, Jiao Qu, Zhihao Zhou, Wenxuan Hu, Shihong Ye, Baoliu Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Quantization is an effective strategy for model compression, facilitating the efficient deployment of deep neural networks on resource-constrained edge devices. However, existing post-training quantization methods oft... 详细信息
来源: 评论
Relocation of Container-Based Services in a MEC-NFV Orchestrated Environment  7th
Relocation of Container-Based Services in a MEC-NFV Orchestr...
收藏 引用
7th ifip WG 5.5 international Cross-Domain conference on Internet of Things
作者: Bernad, Cristina Kjorveziroski, Vojdan Roig, Pedro Alcaraz, Salvador Gilly, Katja Filiposka, Sonja Miguel Hernandez Univ Dept Comp Engn Elche Spain Ss Cyril & Methodius Univ Fac Comp Sci & Engn Skopje North Macedonia
With the rapid growth of real-time next-generation mobile services, it has become necessary to work towards holistic orchestration of the benefits promised with edge computing based on bringing the computing infrastru... 详细信息
来源: 评论
Enhancing trusted computing operation efficiency based on parallel file verification techniques  4
Enhancing trusted computing operation efficiency based on pa...
收藏 引用
4th international conference on network Communication and Information Security, ICNCIS 2024
作者: Zhang, Zhilong Pan, Fengyan Hou, Haibo Li, Yuan Shanghai Jiaotong University Shanghai China Beijing Chenguang Rongxin Technology Co. Beijing China
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se... 详细信息
来源: 评论
Intelligent Telemetry: P4-Driven network Telemetry and Service Flow Intelligent Aviation Platform  20th
Intelligent Telemetry: P4-Driven Network Telemetry and Serv...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Gao, Jing Zhou, Fanqin Dong, Mianxiong Feng, Lei Ota, Kaoru Li, Zijian Fan, Jiawei State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Department of Information and Electronic Engineering Muroran Institute of Technology Muroran050-8585 Japan Beijing University of Posts and Telecommunications Address Beijing Beijing100876 China
To address the current challenges in network monitoring and management, such as poor real-time performance, high cost, low accuracy, and slow fault detection and recovery, a P4-driven network telemetry and resource sc... 详细信息
来源: 评论
Efficient Implementation of the LOBPCG Algorithm on a CPU-GPU Cluster  20th
Efficient Implementation of the LOBPCG Algorithm on a CP...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: Liu, Yang Zhao, Yonghua Wang, Zexin Huang, Rongfeng Zhang, Dingye Zhang, Xinyin Computer Network Information Center Chinese Academy of Science Beijing China University of Chinese Academy of Sciences Beijing China School of Information Science and Technology Shijiazhuang Tiedao University Hebei Shijiazhuang China
The Locally Optimal Block Preconditioned Conjugate Gradient (LOBPCG) algorithm is an effective algorithm for solving large-scale sparse eigenvalue problems in various scientific and engineering applications. Based on ... 详细信息
来源: 评论
ADMM for Energy-Efficient Computation Offloading in Marine Mobile Edge computing networks  20th
ADMM for Energy-Efficient Computation Offloading in Marine...
收藏 引用
20th ifip WG 10.3 international conference on network and parallel computing, NPC 2024
作者: He, Ang Lu, Zili Qin, Baolin Pan, Heng Si, Xueming Dai, Yueyue Huang, Xiaoyan Zhang, Yan Frontier Information Technology Research Institute Zhongyuan University of Technology Zhengzhou China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Department of Informatics University of Oslo Oslo Norway
Marine mobile edge computing (MMEC) networks play a crucial role in collecting and analyzing oceanic data. However, the limited energy storage capacity and inconvenient power delivery of underwater sensor nodes (USNs)... 详细信息
来源: 评论