咨询与建议

限定检索结果

文献类型

  • 296 篇 期刊文献
  • 202 篇 会议
  • 16 篇 学位论文
  • 1 册 图书

馆藏范围

  • 515 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 457 篇 工学
    • 313 篇 计算机科学与技术...
    • 184 篇 电气工程
    • 69 篇 信息与通信工程
    • 60 篇 控制科学与工程
    • 60 篇 软件工程
    • 16 篇 石油与天然气工程
    • 15 篇 仪器科学与技术
    • 12 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 动力工程及工程热...
    • 7 篇 测绘科学与技术
    • 6 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 112 篇 理学
    • 68 篇 数学
    • 23 篇 物理学
    • 10 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 地球物理学
    • 7 篇 系统科学
    • 6 篇 化学
    • 4 篇 天文学
  • 31 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
  • 7 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 法学
  • 1 篇 军事学

主题

  • 515 篇 distributed comp...
  • 15 篇 big data
  • 12 篇 parallel computa...
  • 12 篇 optimization
  • 12 篇 wireless sensor ...
  • 12 篇 pagerank algorit...
  • 12 篇 sensor networks
  • 12 篇 randomization
  • 11 篇 convergence
  • 10 篇 multi-agent cons...
  • 10 篇 task analysis
  • 10 篇 privacy
  • 9 篇 stochastic matri...
  • 8 篇 machine learning
  • 7 篇 clustering
  • 7 篇 message passing
  • 7 篇 search engines
  • 7 篇 resource allocat...
  • 7 篇 scheduling
  • 7 篇 multi-agent syst...

机构

  • 6 篇 politecn torino ...
  • 4 篇 tokyo inst techn...
  • 4 篇 department of co...
  • 3 篇 ieiit-cnr polite...
  • 3 篇 univ chinese aca...
  • 3 篇 univ chinese aca...
  • 3 篇 chinese acad sci...
  • 3 篇 chinese acad sci...
  • 3 篇 university of pe...
  • 3 篇 univ illinois de...
  • 3 篇 hohai univ coll ...
  • 3 篇 univ cyprus dept...
  • 2 篇 ocean univ china...
  • 2 篇 univ ljubljana f...
  • 2 篇 department of co...
  • 2 篇 univ babylon dep...
  • 2 篇 univ north texas...
  • 2 篇 chongqing univ c...
  • 2 篇 michigan state u...
  • 2 篇 department of el...

作者

  • 9 篇 tempo roberto
  • 8 篇 ishii hideaki
  • 6 篇 wang lei
  • 5 篇 gunduz deniz
  • 5 篇 wang ning
  • 4 篇 kosugi g
  • 4 篇 kamada tomio
  • 4 篇 ohta chikara
  • 4 篇 takata t
  • 4 篇 zhao jinquan
  • 4 篇 finnerty patrick
  • 4 篇 hong yiguang
  • 4 篇 hideaki ishii
  • 4 篇 yagi m
  • 4 篇 bai er-wei
  • 4 篇 roberto tempo
  • 4 篇 yiguang hong
  • 3 篇 gomez-vilardebo ...
  • 3 篇 mizumoto y
  • 3 篇 wu zhengtian

语言

  • 490 篇 英文
  • 20 篇 其他
  • 5 篇 中文
检索条件"主题词=distributed computation"
515 条 记 录,以下是181-190 订阅
排序:
Secure Best Arm Identification in Multi-armed Bandits  15th
Secure Best Arm Identification in Multi-armed Bandits
收藏 引用
15th International Conference on Information Security Practice and Experience (ISPEC)
作者: Ciucanu, Radu Lafourcade, Pascal Lombard-Platet, Marius Soare, Marta Univ Orleans LIFO EA 4022 INSA Ctr Val de Loire Orleans France Univ Clermont Auvergne LIMOS CNRS UMR 6158 Aubiere France PSL Res Univ CNRS Ecole Normale Super Dept Informat Paris France Be Studys Geneva Switzerland
The stochastic multi-armed bandit is a classical decision making model, where an agent repeatedly chooses an action (pull a bandit arm) and the environment responds with a stochastic outcome (reward) coming from an un... 详细信息
来源: 评论
LT Codes with Feedback: Accelerate the distributed Matrix-Vector Multiplication with Stragglers  38
LT Codes with Feedback: Accelerate the Distributed Matrix-Ve...
收藏 引用
IEEE 38th International Performance Computing and Communications Conference (IPCCC)
作者: Yang, Xiao Jiang, Ming Zhao, Chunming Southeast Univ Natl Mobile Commun Res Lab Nanjing Peoples R China Purple Mt Lab Nanjing Peoples R China
In this paper, we propose a coding scheme for distributed matrix-vector multiplication that builds upon the Luby transform (LT) codes with feedback. The ideal soliton distribution is utilized in our LT coding scheme t... 详细信息
来源: 评论
Content Compression Coding for Federated Learning  11
Content Compression Coding for Federated Learning
收藏 引用
11th IEEE International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Deng, Kaihe Chen, Zhikun Zhang, Sihai Gong, Chen Zhu, Jinkang Univ Sci & Technol China Key Lab Wireless Opt Commun Hefei Anhui Peoples R China Univ Sci & Technol China PCNSS Hefei Anhui Peoples R China
As machine learning requires distributed framework, Federated Learning(FL) is proposed to address the distributed computations in machine learning, especially for privacy protection. In FL, an important problem is to ... 详细信息
来源: 评论
Building Large-Scale Deep Learning System for Entity Recognition in E-Commerce Search  19
Building Large-Scale Deep Learning System for Entity Recogni...
收藏 引用
12th IEEE/ACM Conference on Utility and Cloud Computing (UCC) / 6th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)
作者: Wen, Musen Vasthimal, Deepak Kumar Lu, Alan Wang, Tian Guo, Aimin eBay Inc San Jose CA 95125 USA
Named-Entity-Recognition (NER) or Item Aspect Recognition task is fundamental to e-commerce marketplace. A structured listing (i.e. item aspect and catalog) is critical to the success of the marketplace - it helps the... 详细信息
来源: 评论
The Random Component-Wise Power Method  18
The Random Component-Wise Power Method
收藏 引用
Conference on Wavelets and Sparsity XVIII
作者: Teke, Oguzhan Vaidyanathan, Palghat P. CALTECH 1200 E Calif Blvd Pasadena CA 91125 USA
This paper considers a random component-wise variant of the unnormalized power method, which is similar to the regular power iteration except that only a random subset of indices is updated in each iteration. For the ... 详细信息
来源: 评论
Feature Selection with Evolving, Fast and Slow Using Two Parallel Genetic Algorithms  4
Feature Selection with Evolving, Fast and Slow Using Two Par...
收藏 引用
4th International Conference on Computer Science and Engineering (UBMK)
作者: Cetin, Uzay Gundogmus, Yunus Emre Istanbul Bilgi Univ Comp Engn Dept Istanbul Turkey Istanbul Marmara Univ Stat Dept Tam Faktoring Istanbul Turkey
Feature selection is one of the most challenging issues in machine learning, especially while working with high dimensional data. In this paper, we address the problem of feature selection and propose a new approach c... 详细信息
来源: 评论
Model Inversion Attacks Against Collaborative Inference  19
Model Inversion Attacks Against Collaborative Inference
收藏 引用
35th Annual Computer Security Applications Conference (ACSA)
作者: He, Zecheng Zhang, Tianwei Lee, Ruby B. Princeton Univ Princeton NJ 08544 USA Nanyang Technol Univ Singapore Singapore
The prevalence of deep learning has drawn attention to the privacy protection of sensitive data. Various privacy threats have been presented, where an adversary can steal model owners' private data. Meanwhile, cou... 详细信息
来源: 评论
distributed Matrix-Vector Multiplication: A Convolutional Coding Approach
Distributed Matrix-Vector Multiplication: A Convolutional Co...
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Das, Anindya B. Ramamoorthy, Aditya Iowa State Univ Dept Elect & Comp Engn Ames IA 50010 USA
distributed computing systems are well-known to suffer from the problem of slow or failed nodes;these are referred to as stragglers. Straggler mitigation (for distributed matrix computations) has recently been investi... 详细信息
来源: 评论
A distributed Fuzzy Support Vector Machines Model for Real Network Traffic  9
A Distributed Fuzzy Support Vector Machines Model for Real N...
收藏 引用
2019 9th International Workshop on Computer Science and Engineering, WCSE 2019
作者: JIANG Jie QU Hua ZHAO Jihong ZHANG Yanpeng Xi'an Jiaotong University Xi'an University of Posts & Telecommunications
Traffic classification has been widely applied for *** works paid little attention to robustness and massive data of practice network *** this paper,we propose a new strategy for the Random Fuzzy Support Vector Machin... 详细信息
来源: 评论
A Novel Bitcoin Mining Scheme Based on the Multi-Leader Multi-Follower Stackelberg Game Model
收藏 引用
IEEE ACCESS 2018年 6卷 48902-48912页
作者: Kim, Sungwook Sogang Univ Dept Comp Sci Seoul 121742 South Korea
Since the introduction of Bitcoin in 2009, it has gained a significant popularity around the world. Bitcoin is a peer-to-peer electronic payment system where payment transactions are stored in a data structure named t... 详细信息
来源: 评论