咨询与建议

限定检索结果

文献类型

  • 10,918 篇 会议
  • 230 篇 期刊文献
  • 173 册 图书
  • 3 篇 学位论文

馆藏范围

  • 11,324 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 6,681 篇 工学
    • 6,110 篇 计算机科学与技术...
    • 2,915 篇 软件工程
    • 1,181 篇 电气工程
    • 1,069 篇 信息与通信工程
    • 482 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 176 篇 仪器科学与技术
    • 152 篇 机械工程
    • 117 篇 动力工程及工程热...
    • 113 篇 生物医学工程(可授...
    • 101 篇 生物工程
    • 87 篇 光学工程
    • 87 篇 建筑学
    • 69 篇 土木工程
    • 68 篇 网络空间安全
    • 65 篇 化学工程与技术
    • 63 篇 材料科学与工程(可...
    • 58 篇 安全科学与工程
  • 1,468 篇 理学
    • 976 篇 数学
    • 311 篇 物理学
    • 156 篇 系统科学
    • 140 篇 统计学(可授理学、...
    • 136 篇 生物学
    • 83 篇 化学
  • 898 篇 管理学
    • 648 篇 管理科学与工程(可...
    • 307 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 145 篇 医学
    • 120 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 56 篇 法学
  • 34 篇 农学
  • 26 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学

主题

  • 1,464 篇 parallel process...
  • 584 篇 computer archite...
  • 555 篇 distributed comp...
  • 534 篇 application soft...
  • 531 篇 computational mo...
  • 528 篇 concurrent compu...
  • 342 篇 hardware
  • 319 篇 graphics process...
  • 309 篇 scalability
  • 308 篇 parallel program...
  • 306 篇 graphics process...
  • 304 篇 computer science
  • 285 篇 runtime
  • 263 篇 big data
  • 262 篇 optimization
  • 250 篇 parallel process...
  • 226 篇 throughput
  • 225 篇 processor schedu...
  • 214 篇 resource managem...
  • 209 篇 bandwidth

机构

  • 31 篇 national laborat...
  • 23 篇 science and tech...
  • 21 篇 department of co...
  • 19 篇 national laborat...
  • 18 篇 university of ch...
  • 17 篇 school of comput...
  • 17 篇 institute of com...
  • 16 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 georgia inst tec...
  • 15 篇 barcelona superc...
  • 15 篇 intel corporatio...
  • 14 篇 school of comput...
  • 14 篇 chinese acad sci...
  • 14 篇 department of co...
  • 13 篇 tsinghua univ de...
  • 13 篇 ibm thomas j. wa...
  • 13 篇 cent s univ sch ...
  • 13 篇 college of compu...
  • 13 篇 ohio state univ ...

作者

  • 21 篇 jack dongarra
  • 16 篇 badia rosa m.
  • 16 篇 liu jie
  • 15 篇 wang guojun
  • 15 篇 yijie wang
  • 15 篇 a. choudhary
  • 14 篇 anon
  • 14 篇 kurt rothermel
  • 13 篇 jun wang
  • 13 篇 koldehofe boris
  • 13 篇 mencagli gabriel...
  • 13 篇 prodan radu
  • 13 篇 wang yijie
  • 12 篇 fahringer thomas
  • 12 篇 dongsheng li
  • 12 篇 zomaya albert y.
  • 12 篇 navaux philippe ...
  • 12 篇 yong dou
  • 11 篇 fernandes luiz g...
  • 11 篇 guangwen yang

语言

  • 11,155 篇 英文
  • 135 篇 其他
  • 36 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=International Conference on Parallel and Distributed Processing Techniques and Applications"
11324 条 记 录,以下是1351-1360 订阅
排序:
A distributed Cache Mechanism of HDFS to Improve Learning Performance for Deep Reinforcement Learning
A Distributed Cache Mechanism of HDFS to Improve Learning Pe...
收藏 引用
IEEE international conference on Big Data and Cloud Computing (BdCloud)
作者: Yongqiang Gao Shunyi Feng Zhenkun Li College of Computer Science Inner Mongolia University Hohhot China
Hadoop distributed file system (HDFS) has been widely used in deep reinforcement learning due to its high reliability and high performance. However, the dataset for training deep reinforcement learning models is usual... 详细信息
来源: 评论
Malicious URL Detection with distributed Representation and Deep Learning  21
Malicious URL Detection with Distributed Representation and ...
收藏 引用
21st international conference on New Trends in Intelligent Software Methodologies, Tools and techniques, SoMeT 2022
作者: Do, Nguyet Quang Selamat, Ali Lim, Kok Cheng Krejcar, Ondrej Universiti Teknologi Malaysia Kuala Lumpur Malaysia School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Malaysia Universiti Teknologi Malaysia Johor Bahru Malaysia Center for Basic and Applied Research Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove500 03 Czech Republic Kajang Malaysia
There exist numerous solutions to detect malicious URLs based on Natural Language processing and machine learning technologies. However, there is a lack of comparative analysis among approaches using distributed repre... 详细信息
来源: 评论
Indian Sign Language Alphanumeric Hand Gestures Recognition Using Deep Learning techniques  5
Indian Sign Language Alphanumeric Hand Gestures Recognition ...
收藏 引用
5th international conference on Advanced Research in Computing, ICARC 2025
作者: Mahendran, Shakana Mahendran, Ramya Vavuniya Campus of the University of Jaffna Department of Physical Science Fas Vavuniya Sri Lanka EUS. Information Technology Center Trincomalee Campus Trincomalee Sri Lanka
Alphanumeric sign language recognition plays a vital role in enabling effective communication between individuals who are deaf and the general population. This research focuses on classifying alphanumeric hand gesture... 详细信息
来源: 评论
Adaptive distributed Convolutional Neural Network Inference at the Network Edge with ADCNN  20
Adaptive Distributed Convolutional Neural Network Inference ...
收藏 引用
49th international conference on parallel processing (ICPP)
作者: Zhang, Sai Qian Lin, Jieyu Zhang, Qi Harvard Univ Cambridge MA 02138 USA Univ Toronto Toronto ON Canada Microsoft Redmond WA USA
The emergence of the Internet of Things (IoT) has led to a remarkable increase in the volume of data generated at the network edge. In order to support real-time smart IoT applications, massive amounts of data generat... 详细信息
来源: 评论
Bi-Objective Scheduling Algorithm for Hybrid Workflow in JointCloud
Bi-Objective Scheduling Algorithm for Hybrid Workflow in Joi...
收藏 引用
IEEE international conference on Joint Cloud Computing (JCC)
作者: Rui Li Huaimin Wang Peichang Shi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of Complex & Critica Software Environment College of Computer Science National University of Defense Technology Changsha China
Big data workflows are widely used in IoT, recommended systems, and real-time vision applications, and they continue to grow in complexity. These hybrid workflows consist of both resource-intensive batch jobs and late... 详细信息
来源: 评论
parallel Pattern Matching over Brotli Compressed Network Traffic
Parallel Pattern Matching over Brotli Compressed Network Tra...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xiuwen Sun Guangzheng Zhang Di Wu Qingying Yu Jie Cui Hong Zhong School of Computer Science and Technology Anhui University Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity
Pattern matching is a crucial technique for network traffic detection applications. As a fundamental computation model used by pattern matching, the finite state automata execute sequential matching due to the state d... 详细信息
来源: 评论
Bandwidth-Aware Page Placement in NUMA  34
Bandwidth-Aware Page Placement in NUMA
收藏 引用
34th IEEE international parallel and distributed processing Symposium (IPDPS)
作者: Gureya, David Neto, Joao Karimi, Reza Barreto, Joao Bhatotia, Pramod Quema, Vivien Rodrigues, Rodrigo Romano, Paolo Vlassov, Vladimir Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal KTH Royal Inst Technol Stockholm Sweden Emory Univ Atlanta GA 30322 USA Univ Edinburgh Edinburgh Midlothian Scotland Grenoble INP ENSIMAG Grenoble France
Page placement is a critical problem for memory-intensive applications running on a shared-memory multiprocessor with a non-uniform memory access (NUMA) architecture. State-of-the-art page placement mechanisms interle... 详细信息
来源: 评论
Signature-Based Secure Trajectory Similarity Search  20
Signature-Based Secure Trajectory Similarity Search
收藏 引用
20th IEEE international conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Teng, Yiping Shi, Zhan Zhao, Fanyou Ding, Guohui Xu, Li Fan, Chunlong Shenyang Aerosp Univ Sch Comp Large Scale Distributed Syst Lab Shenyang Liaoning Peoples R China
In recent years, the computation and processing of trajectories have attracted both academic and industrial communities to study and develop techniques and applications due to the popularization of mobile devices. To ... 详细信息
来源: 评论
TEEp: Supporting Secure parallel processing in ARM TrustZone  26
TEEp: Supporting Secure Parallel Processing in ARM TrustZone
收藏 引用
26th IEEE international conference on parallel and distributed Systems (IEEE ICPADS)
作者: Li, Zinan Li, Wenhao Xia, Yubin Zang, Binyu Shanghai Jiao Tong Univ Inst Parallel & Distributed Syst Shanghai Peoples R China
Machine learning applications are getting prevelent on various computing platforms, including cloud servers, smart phones, IoT devices, etc. For these applications, security is one of the most emergent requirements. W... 详细信息
来源: 评论
Artificial Intelligence in Smart Mobile Communication Systems: A Review
Artificial Intelligence in Smart Mobile Communication System...
收藏 引用
IEEE international conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Adebajo-Akinpelu Victor O Moses Oluwafemi Onibonoje Ayodeji Olalekan Salau Department of Electrical/Electronics and Computer Engineering Afe Babalola Univerisity Ado-Ekiti Ado-Ekiti Nigeria Dept of Electrical/Electronics & Computer Engineering Afe Babalola University Ado Ekiti Nigeria
Communication and information service systems are undergoing rapid advancements driven by the evolution of telecommunications and computer technology. The convergence of these fields has led to significant growth in d... 详细信息
来源: 评论