咨询与建议

限定检索结果

文献类型

  • 401 篇 会议
  • 158 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 339 篇 工学
    • 258 篇 计算机科学与技术...
    • 196 篇 软件工程
    • 67 篇 信息与通信工程
    • 46 篇 控制科学与工程
    • 34 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 电气工程
    • 24 篇 机械工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 动力工程及工程热...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 网络空间安全
  • 153 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 34 篇 生物学
    • 22 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 10 篇 化学
  • 91 篇 管理学
    • 63 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 14 篇 法学
    • 11 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 7 篇 医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 文学
  • 3 篇 教育学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 23 篇 computational mo...
  • 17 篇 algorithm design...
  • 16 篇 computer science
  • 16 篇 deep learning
  • 16 篇 concurrent compu...
  • 15 篇 computer archite...
  • 15 篇 cloud computing
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 feature extracti...
  • 13 篇 parallel process...
  • 13 篇 servers
  • 12 篇 scalability
  • 12 篇 bandwidth
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 12 篇 hardware
  • 11 篇 runtime
  • 11 篇 throughput
  • 11 篇 grid computing

机构

  • 134 篇 science and tech...
  • 55 篇 college of compu...
  • 27 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national laborat...
  • 12 篇 national key lab...
  • 12 篇 laboratory of di...
  • 11 篇 school of comput...
  • 11 篇 national laborat...
  • 10 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 college of compu...
  • 8 篇 national key lab...
  • 7 篇 parallel and dis...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 laboratory of so...

作者

  • 36 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 18 篇 peng yuxing
  • 16 篇 wang yijie
  • 15 篇 zhigang luo
  • 15 篇 qinglin wang
  • 14 篇 zuocheng xing
  • 14 篇 wang huaimin
  • 13 篇 yuxing peng
  • 13 篇 xiaodong wang
  • 13 篇 naiyang guan
  • 13 篇 huaimin wang
  • 11 篇 chen xinhai
  • 11 篇 wang qinglin
  • 11 篇 chunye gong
  • 11 篇 kai lu
  • 10 篇 li dongsheng
  • 10 篇 dou yong
  • 10 篇 li kuan-ching

语言

  • 512 篇 英文
  • 26 篇 中文
  • 23 篇 其他
检索条件"机构=Department of Science and Technology on Parallel and Distributed Processing"
561 条 记 录,以下是361-370 订阅
Approximate Maximum Common Sub-graph Isomorphism Based on Discrete-Time Quantum Walk
Approximate Maximum Common Sub-graph Isomorphism Based on Di...
收藏 引用
International Conference on Pattern Recognition
作者: Kai Lu Yi Zhang Kai Xu Yinghui Gao Richard C. Wilson Science and Technology on Parallel and Distributed Processing Laboratory and College of Computer National University of Defense Technology Changsha P.R. China College of Electronic Science and Engineering National University of Defense Technology Changsha P.R. China Department of Computer Science University of York York UK
Maximum common sub-graph isomorphism (MCS) is a famous NP-hard problem in graph processing. The problem has found application in many areas where the similarity of graphs is important, for example in scene matching, v... 详细信息
来源: 评论
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems
A Runtime Verification Based Trace-Oriented Monitoring Frame...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Jingwen Zhou Zhenbang Chen Ji Wang Zibin Zheng Wei Dong College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China
Cloud computing provides a new paradigm for resource utilization and sharing. However, the reliability problems, like system failures, often happen in cloud systems and bring enormous loss. Trace-oriented monitoring i... 详细信息
来源: 评论
Correntropy induced metric based graph regularized non-negative matrix factorization
Correntropy induced metric based graph regularized non-negat...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Bin Mao Naiyang Guan Dacheng Tao Xuhui Huang Zhigang Luo College of Science National University of Defense Technology Changsha China College of Computer National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory Changsha China Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha China Faculty of Engineering and Information Technology University of Technology Sydney Sydney NSW Australia
Non-negative matrix factorization (NMF) is an efficient dimension reduction method and plays an important role in many pattern recognition and computer vision tasks. However, conventional NMF methods are not robust si... 详细信息
来源: 评论
Overlapping community detection via link partition of asymmetric weighted graph
Overlapping community detection via link partition of asymme...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Wenju Zhang Naiyang Guan Xuhui Huang Zhigang Luo Jianwu Li Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan P.R. China 410073 National University of Defense Technology Changsha Hunan CN Beijing Institute of Technology Beijing Beijing CN
Link partition clusters edges of a complex network to discover its overlapping communities. Due to Its effectiveness, link partition has attracted much attentions from the network science community. However, since lin... 详细信息
来源: 评论
Trace Bench: An Open Data Set for Trace-Oriented Monitoring
Trace Bench: An Open Data Set for Trace-Oriented Monitoring
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Jingwen Zhou Zhenbang Chen Ji Wang Zibin Zheng Michael R. Lyu College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-orie... 详细信息
来源: 评论
parallel 3D deterministic particle transport on Intel MIC architecture
Parallel 3D deterministic particle transport on Intel MIC ar...
收藏 引用
International Conference on High Performance Computing & Simulation (HPCS)
作者: Qinglin Wang Zuocheng Xing Jie Liu Xiaogang Qiang Chunye Gong Jiang Jiang Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China H.H. Wills Physics Laboratory University of Bristol Bristol UK Science and Technology on Space Physics Libratory Beijing China School of Microelectronics Shanghai Jiao Tong University Shanghai China
Single-node computation speed is essential in large-scale parallel solutions of particle transport problems. The Intel Many Integrated Core (MIC) architecture supports more than 200 hardware threads as well as 512-bit... 详细信息
来源: 评论
TRANSDUCTIVE NONNEGATIVE MATRIX FACTORIZATION FOR SEMI-SUPERVISED HIGH-PERFORMANCE SPEECH SEPARATION
TRANSDUCTIVE NONNEGATIVE MATRIX FACTORIZATION FOR SEMI-SUPER...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Naiyang Guan Long Lan Dacheng Tao Zhigang Luo Xuejun Yang Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Changsha Hunan 410073 China Centre for Quantum Computation and Intelligent Systems FEIT University of Technology Sydney Sydney NSW 2007 Australia State Key Laboratory of High Performance Computing National University of Defense Technology Changsha Hunan 410073 China
Regarding the non-negativity property of the magnitude spectrogram of speech signals, nonnegative matrix factorization (NMF) has obtained promising performance for speech separation by independently learning a diction... 详细信息
来源: 评论
Effective top-down active learning for hierarchical text classification
收藏 引用
17th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2013
作者: Li, Xiao Ling, Charles X. Wang, Huaimin Department of Computer Science University of Western Ontario Canada National Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Hierarchical text classification is an important task in many real-world applications. To build an accurate hierarchical classification system with many categories, usually a very large number of documents must be lab... 详细信息
来源: 评论
Efficiently indexing sparse wide tablesin cloud computing
收藏 引用
Information technology Journal 2013年 第20期12卷 5415-5423页
作者: Huang, Bin Peng, Yuxing Department of Computer Huaihua University 418008 Huaihua China School of Computer Science Wuhan University 430072 Wuhan China National Laboratory of Parallel and Distributed Processing National University of Defense Technology 410073 Changsha China
For its perception of unlimited resources and infinite scalability, Cloud Computing has emerged as a pervasive paradigm for hosting? data-centric applications in large computing infrastructures. The data produced by t... 详细信息
来源: 评论
A distributed algorithm for SI transactions serializability in cloud computing
收藏 引用
Information technology Journal 2013年 第24期12卷 8435-8445页
作者: Huang, Bin Peng, Yuxing Peng, Xiaoning School of Computer Science Wuhan University Wuhan 430072 China Department of Computer Huaihua University Huaihua 418008 China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
There are well known anomalies permitted by snapshot isolation that can lead to violations of data consistency by interleaving transactions that individually maintain consistency. Until now, there are some ways to pre... 详细信息
来源: 评论