咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 63 篇 期刊文献

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 109 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 30 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
  • 61 篇 理学
    • 37 篇 数学
    • 19 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 7 篇 物理学
    • 7 篇 化学
  • 39 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 laboratories
  • 5 篇 servers
  • 5 篇 graph neural net...
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep neural netw...
  • 4 篇 distributed proc...
  • 4 篇 machine learning
  • 4 篇 scheduling algor...
  • 4 篇 hardware
  • 4 篇 graphics process...
  • 4 篇 training
  • 4 篇 heuristic algori...
  • 3 篇 routing

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 3 篇 department of in...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national laborat...

作者

  • 13 篇 ding bo
  • 13 篇 wang huaimin
  • 9 篇 yuxing peng
  • 9 篇 wang yijie
  • 8 篇 li dongsheng
  • 8 篇 bo ding
  • 7 篇 dongsheng li
  • 7 篇 huaimin wang
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 6 篇 peichang shi
  • 6 篇 mei wen
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 zhiquan lai
  • 6 篇 wang yi-jie
  • 6 篇 xu kele
  • 5 篇 zhou jing
  • 5 篇 hangjun zhou
  • 5 篇 wang xiaodong

语言

  • 184 篇 英文
  • 17 篇 中文
  • 3 篇 其他
检索条件"机构=Key Laboratory and Technology for National Defence of Parallel and Distributed Processing"
204 条 记 录,以下是151-160 订阅
排序:
parallelization of the training for face detection with transactional memory
Parallelization of the training for face detection with tran...
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Zeng, Kun Key Laboratory and Technology for National Defence of Parallel and Distributed Processing School of Computer National Univiersity of Defense Technology ChangSha Hunan China
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes... 详细信息
来源: 评论
A Compact Model for Multi-Island Single Electron Transistors
A Compact Model for Multi-Island Single Electron Transistors
收藏 引用
3rd IEEE International NanoElectronics Conference (INEC)/Symposium on Nanoscience and Nanotechnology in China
作者: Chi, Yaqing Zhong, Haiqin Zhang, Chao Fang, Liang National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Hunan 410073 China
Multi-island single electron transistor is an important kind of the single electron transistor, which is convenient to realize the controllable room temperature operation. A novel semi-empirical compact model for the ... 详细信息
来源: 评论
A construction technique of constant degree P2P systems towards efficient complex queries
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第3期48卷 374-381页
作者: Wang, Xiaohai Peng, Yuxing Li, Dongsheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Constant degree peer-to-peer (P2P) system is turning into the P2P domain's promising hotspot due to constant degree digraphs having good propertis. However, it is often hard to convert a stardard constant degree d... 详细信息
来源: 评论
parallelization of the Training for Face Detection with Transactional Memory
Parallelization of the Training for Face Detection with Tran...
收藏 引用
The International Conference on Automation and Robotics(ICAR 2011)
作者: Kun Zeng Key Laboratory and technology for National Defence of Parallel and Distributed Processing School of Computer National Univiersity of Defense Technology
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes... 详细信息
来源: 评论
Power Optimization for GPU Programs Based on Software Prefetching
Power Optimization for GPU Programs Based on Software Prefet...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yisong Lin Tao Tang Guibin Wang Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing National University of Defense and Technology Changsha China
GPUs render higher computing unit density than contemporary CPUs and thus exhibit much higher power consumption despite its higher power efficiency. The power consumption has become an important issue that impacts CPU... 详细信息
来源: 评论
A causality based dynamic message ordering for DVEs on Wide Area Network
A causality based dynamic message ordering for DVEs on Wide ...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
Due to the large message transmission latency in distributed Virtual Environments(DVEs) on Wide Area Net-work(WAN), the effectiveness of causality consistency control of message ordering is determined by not only caus... 详细信息
来源: 评论
An effective control scheme to ensure real-time causal order in large-scale distributed interactive simulations
An effective control scheme to ensure real-time causal order...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
When a large-scale distributed interactive simulation system is running on WAN, the sites usually disperse over a wide area in geography, which results in the simulation clock of each site is hardly to be accurately s... 详细信息
来源: 评论
A multi-layered emulation platform to verify the effectiveness of consistency control approaches about message ordering
A multi-layered emulation platform to verify the effectivene...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
It is an important issue to preserve the consistent delivering order of messages at each site in distributed Virtual Environments(DVEs). Currently, the violations of message delivery order are inclined to happen in th... 详细信息
来源: 评论
Algorithm for distributed Constraint Optimization Problems with low constraint density
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2011年 第4期22卷 625-639页
作者: Ding, Bo Wang, Huai-Min Shi, Dian-Xi Tang, Yang-Bin School of Computer National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Many challenges in multi-agent coordination can be modeled as distributed Constraint Optimization Problems (DCOPs). Aiming at DCOPs with low constraint density, this paper proposes a distributed algorithm based on the... 详细信息
来源: 评论
NBHU-based Method to Counter Quiet DDoS Attacks
NBHU-based Method to Counter Quiet DDoS Attacks
收藏 引用
2011 International Conference on Computer Science and Network technology(2011计算机科学与网络技术国际会议 ICCSNT 2011)
作者: Jing Zhang Lin Chen Huaping Hu Hui Liu Computer School National University of Defense Technology Changsha China State Key Laboratory on Parallel and Distributed Processing National University of Defense Technolog
The Quiet DDoS attack becomes one of the most severely threat to the network safety, because this kind of attack completely adopts legal TCP flow while distributing its destination IP to evade various countermeasu... 详细信息
来源: 评论