咨询与建议

限定检索结果

文献类型

  • 23 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 16 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
    • 1 篇 建筑学
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 食品科学与工程(可...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 化学
    • 1 篇 生物学
  • 6 篇 管理学
    • 4 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 4 篇 distributed comp...
  • 3 篇 neural networks
  • 3 篇 laboratories
  • 2 篇 parallel process...
  • 2 篇 support vector m...
  • 2 篇 concurrent compu...
  • 2 篇 computational ef...
  • 2 篇 knowledge graph
  • 2 篇 accuracy
  • 1 篇 computer science
  • 1 篇 parallel algorit...
  • 1 篇 runtime
  • 1 篇 object detection
  • 1 篇 virtual addresse...
  • 1 篇 learning systems
  • 1 篇 neurons
  • 1 篇 intersection
  • 1 篇 routing
  • 1 篇 reconstruction
  • 1 篇 message passing

机构

  • 4 篇 guangxi intellig...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 national key lab...
  • 2 篇 university of ai...
  • 2 篇 university of no...
  • 2 篇 information rese...
  • 2 篇 distributed and ...
  • 2 篇 jožef stefan ins...
  • 2 篇 centre of excell...
  • 2 篇 science and tech...
  • 2 篇 shanghai key lab...
  • 2 篇 shandong univers...
  • 2 篇 china tobacco gu...
  • 2 篇 college of compu...
  • 2 篇 research center ...
  • 2 篇 defense innovati...
  • 2 篇 štore steel d.o....
  • 2 篇 national key lab...
  • 1 篇 department of el...

作者

  • 4 篇 huang zhen
  • 3 篇 ningjiang chen
  • 3 篇 hu minghao
  • 2 篇 sun ting-tao
  • 2 篇 yingxiong nong
  • 2 篇 liming fang
  • 2 篇 zhou yang-fan
  • 2 篇 li dongsheng
  • 2 篇 dou yong
  • 2 篇 yang dong
  • 2 篇 zhe liu
  • 2 篇 piyabute fuangkh...
  • 2 篇 vertnik r.
  • 2 篇 jiachen shen
  • 2 篇 zhou qi
  • 2 篇 chunhua su
  • 2 篇 thitipong tanpra...
  • 2 篇 wang huai-min
  • 2 篇 zhe li
  • 2 篇 jun zhou

语言

  • 28 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=Distributed and Parallel Computing Research Laboratory"
33 条 记 录,以下是1-10 订阅
KC-GenRe: A Knowledge-constrained Generative Re-ranking Method Based on Large Language Models for Knowledge Graph Completion  30
KC-GenRe: A Knowledge-constrained Generative Re-ranking Meth...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wang, Yilin Hu, Minghao Huang, Zhen Li, Dongsheng Yang, Dong Lu, Xicheng Defense Innovation Institute Academy of Military Sciences China Information Research Center of Military Science China National Key Laboratory of Parallel and Distributed Computing China
The goal of knowledge graph completion (KGC) is to predict missing facts among entities. Previous methods for KGC re-ranking are mostly built on non-generative language models to obtain the probability of each candida... 详细信息
来源: 评论
Partial Order-centered Hyperbolic Representation Learning for Few-shot Relation Extraction  31
Partial Order-centered Hyperbolic Representation Learning fo...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Hu, Biao Huang, Zhen Hu, Minghao Yang, Pinglv Qiao, Peng Dou, Yong Wang, Zhilin National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China Center of Information Research Academy of Military Science China College of Meteorology and Oceanology National University of Defense Technology China
Prototype network-based methods have made substantial progress in few-shot relation extraction (FSRE) by enhancing relation prototypes with relation descriptions. However, the distribution of relations and instances i... 详细信息
来源: 评论
PEbfs: Implement High-Performance Breadth-First Search on PEZY-SC3s  24th
PEbfs: Implement High-Performance Breadth-First Search on P...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2024
作者: Guo, Weihao Wang, Qinglin Liu, Xiaodong Peng, Muchun Yang, Shun Liang, Yaling Shi, Yongzhen Cao, Ligang Liu, Jie Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha410073 China Engineering Research Center for National Fundamental Software National University of Defense Technology Changsha410073 China
The breadth-first search (BFS) algorithm is a fundamental algorithm in graph theory, and it’s parallelization can significantly improve performance. Therefore, there have been numerous efforts to leverage the powerfu... 详细信息
来源: 评论
KC-GenRe: A Knowledge-constrained Generative Re-ranking Method Based on Large Language Models for Knowledge Graph Completion
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yilin Hu, Minghao Huang, Zhen Li, Dongsheng Yang, Dong Lu, Xicheng Defense Innovation Institute Academy of Military Sciences China Information Research Center of Military Science China National Key Laboratory of Parallel and Distributed Computing China
The goal of knowledge graph completion (KGC) is to predict missing facts among entities. Previous methods for KGC re-ranking are mostly built on non-generative language models to obtain the probability of each candida... 详细信息
来源: 评论
RuleRAG: Rule-Guided Retrieval-Augmented Generation with Language Models for Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhongwu Xu, Chengjin Wang, Dingmin Huang, Zhen Dou, Yong Jiang, Xuhui Guo, Jian National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology China IDEA Research International Digital Economy Academy Department of Computer Science University of Oxford United Kingdom
Retrieval-augmented generation (RAG) has shown promising potential in knowledge intensive question answering (QA). However, existing approaches only consider the query itself, neither specifying the retrieval preferen... 详细信息
来源: 评论
FedHybrid: Hierarchical Hybrid Training for High-Performance Federated Learning
FedHybrid: Hierarchical Hybrid Training for High-Performance...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Tao Chang Li Li Meihan Wu Wei Yu Xiaodong Wang National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China State Key Laboratory of Internet of Things for Smart City University of Macau China The 30th Research Institute of China Electronics Technology Group Corporation China
Federated Learning coordinates multiple devices to train a shared model while preserving data privacy. Despite its potential benefit, the increasing number of participating devices poses new challenges to the deployme...
来源: 评论
MTD: Multi-Timestep Detector for Delayed Streaming Perception
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yihui Chen, Ningjiang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University Education Department of Guangxi Zhuang Autonomous Region Nanning China
Autonomous driving systems require real-time environmental perception to ensure user safety and experience. Streaming perception is a task of reporting the current state of the world, which is used to evaluate the del... 详细信息
来源: 评论
A Deep Belief Networks Intrusion Detection Method Based on Generative Adversarial Networks
A Deep Belief Networks Intrusion Detection Method Based on G...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Yi Wei Yingxiong Nong Zhe Li Jian Pan Zhenyu Yang Zezhang Zheng Ningjiang Chen China Tobacco Guangxi Industrial Co. Ltd Nanning China School of Computer Electronics and Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Key Laboratory of Parallel Distributed and Intelligent Computing School of Computer Electronics and Information Guangxi University (Guangxi University) Nanning China
In response to the substantial threat that Internet attacks pose to data center network security, researchers have proposed several deep learning-based methods for detecting network intrusions. However, while algorith... 详细信息
来源: 评论
Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model Compression
Knowledge Distillation with Source-free Unsupervised Domain ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jing Tian Juan Chen Ning Jiang Chen Lin Bai Suqun Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
The pre-training language model BERT has brought significant performance improvements to a series of natural language processing tasks, but due to the large scale of the model, it is difficult to be applied in many pr...
来源: 评论
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Sy...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Panyu Wu Zhenfu Cao Jiachen Shen Xiaolei Dong Yihao Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan
Since data outsourcing poses privacy concerns with data leakage, searchable symmetric encryption (SSE) has emerged as a powerful solution that enables clients to perform query operations on encrypted data while preser...
来源: 评论