咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 63 篇 期刊文献

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 109 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 30 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
  • 61 篇 理学
    • 37 篇 数学
    • 19 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 7 篇 物理学
    • 7 篇 化学
  • 39 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 laboratories
  • 5 篇 servers
  • 5 篇 graph neural net...
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep neural netw...
  • 4 篇 distributed proc...
  • 4 篇 machine learning
  • 4 篇 scheduling algor...
  • 4 篇 hardware
  • 4 篇 graphics process...
  • 4 篇 training
  • 4 篇 heuristic algori...
  • 3 篇 routing

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 3 篇 department of in...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national laborat...

作者

  • 14 篇 ding bo
  • 14 篇 wang huaimin
  • 9 篇 yuxing peng
  • 9 篇 wang yijie
  • 8 篇 li dongsheng
  • 8 篇 bo ding
  • 7 篇 dongsheng li
  • 7 篇 huaimin wang
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 6 篇 peichang shi
  • 6 篇 mei wen
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 zhiquan lai
  • 6 篇 wang yi-jie
  • 6 篇 xu kele
  • 5 篇 zhou jing
  • 5 篇 hangjun zhou
  • 5 篇 wang xiaodong

语言

  • 185 篇 英文
  • 17 篇 中文
  • 2 篇 其他
检索条件"机构=Key Laboratory and Technology for National Defence of Parallel and Distributed Processing"
204 条 记 录,以下是31-40 订阅
排序:
CD-Sched: An Automated Scheduling Framework for Accelerating Neural Network Training on Shared Memory CPU-DSP Platforms
CD-Sched: An Automated Scheduling Framework for Accelerating...
收藏 引用
2023 International Conference on Power, Communication, Computing and Networking Technologies, PCCNT 2023
作者: Xiao, Yuanyuan Lai, Zhiquan Li, Dongsheng National Key Laboratory of Parallel and Distributed Processing Computer College National University of Defense Technology Changsha China
DSP holds significant potential for important applications in Deep Neural Networks. However, there is currently a lack of research focused on shared-memory CPU-DSP heterogeneous chips. This paper proposes CD-Sched, an... 详细信息
来源: 评论
Deep Learning-based Cooperative Trail Following for Multi-Robot System
Deep Learning-based Cooperative Trail Following for Multi-Ro...
收藏 引用
2018 International Joint Conference on Neural Networks, IJCNN 2018
作者: Geng, Mingyang Li, Yiying Ding, Bo Wang, And Huaimin National Key Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology ChangSha China
Following trails in the wild is an essential capability of out-door autonomous mobile robots. Recently, deep learningbased approaches have made great advancements in this field. However, the existing research only foc... 详细信息
来源: 评论
SemanticCast: Content-based data distribution over self-organizing semantic overlay networks
SemanticCast: Content-based data distribution over self-orga...
收藏 引用
11th International Conference on parallel and distributed Computing, Applications and Technologies, PDCAT 2010
作者: Zheng, Zhong Wang, Yijie National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Many applications demand distributing data with different contents efficiently in the network environment with unreliable links and a high node churn. Existing approaches mostly focus on optimizing either efficiency o... 详细信息
来源: 评论
Unsupervised feature learning for human activity recognition using smartphone sensors  2
Unsupervised feature learning for human activity recognition...
收藏 引用
2nd International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2014
作者: Li, Yongmou Shi, Dianxi Ding, B. Liu, Dongbo National Key Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China
Feature representation has a significant impact on human activity recognition. While the common used hand-crafted features rely heavily on the specific domain knowledge and may suffer from nonadaptability to the parti... 详细信息
来源: 评论
Accelerating Sample-based GNN Training by Feature Caching on GPUs  7
Accelerating Sample-based GNN Training by Feature Caching on...
收藏 引用
7th IEEE International Conference on Smart Cloud, SmartCloud 2022
作者: He, Yuqi Lai, Zhiquan Ran, Zhejiang Zhang, Lizhi Li, Dongsheng National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing College of Computer Changsha China
The existing graph neural network (GNN) systems adopt sample-based training on large-scale graphs over multiple GPUs. Although they support large-scale graph training, large data loading overhead is still a bottleneck... 详细信息
来源: 评论
CANSE: A churn adaptive approach to network size estimation
CANSE: A churn adaptive approach to network size estimation
收藏 引用
16th IEEE International Conference on parallel and distributed Systems, ICPADS 2010
作者: Ma, Xing-Kong Wang, Yi-Jie Zheng, Zhong National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Network size is one of the fundamental information of distributed applications. The approach to estimate network size must feature both high accuracy and robustness in order to adapt to the dynamic environment in diff... 详细信息
来源: 评论
Data dependence-based optimistic data consistency maintenance method
Data dependence-based optimistic data consistency maintenanc...
收藏 引用
6th IEEE International Conference on Computer and Information technology, CIT 2006
作者: Zhou, Jing Wang, Yijie Li, Sikun National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology China
Data replication introduces well-known consistency issues. This paper puts forward the question about data dependence in data consistency, which embodies pseudo-conflict updates and update dependency. According to tha... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features  10th
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Ming Liu, Bo Xing, Guangsheng Wang, Xiaodong Wang, Zhihui College of Intelligence Science and Technology National University of Defence Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
Continuous probabilistic reverse skyline monitoring over uncertain data streams
Continuous probabilistic reverse skyline monitoring over unc...
收藏 引用
2013 International Conference on Vehicle and Mechanical Engineering and Information technology, VMEIT 2013
作者: Yang, Yong Tao Wang, Yi Jie Guo, Min Li, Xiao Yong National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Reverse skyline is useful for supporting many applications, such as marketing decision, environmental monitoring. Since the uncertainty of data is inherent in many scenarios, there is a need for processing probabilist... 详细信息
来源: 评论
False-positive probability and compression optimization for tree-structured bloom filters
收藏 引用
ACM Transactions on Modeling and Performance Evaluation of Computing Systems 2016年 第4期1卷 1–39页
作者: Fu, Yongquan Biersack, Ernst National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Sanyi Road Changsha Hunan Province410073 China CAIPY Valbonne06560 France
Bloom filters are frequently used to to check the membership of an item in a set. However, Bloom filters face a dilemma: the transmission bandwidth and the accuracy cannot be optimized simultaneously. This dilemma is ... 详细信息
来源: 评论