咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 63 篇 期刊文献

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 109 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 30 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
  • 61 篇 理学
    • 37 篇 数学
    • 19 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 7 篇 物理学
    • 7 篇 化学
  • 39 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 laboratories
  • 5 篇 servers
  • 5 篇 graph neural net...
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep neural netw...
  • 4 篇 distributed proc...
  • 4 篇 machine learning
  • 4 篇 scheduling algor...
  • 4 篇 hardware
  • 4 篇 graphics process...
  • 4 篇 training
  • 4 篇 heuristic algori...
  • 3 篇 routing

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 3 篇 department of in...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national laborat...

作者

  • 13 篇 ding bo
  • 13 篇 wang huaimin
  • 9 篇 yuxing peng
  • 9 篇 wang yijie
  • 8 篇 li dongsheng
  • 8 篇 bo ding
  • 7 篇 dongsheng li
  • 7 篇 huaimin wang
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 6 篇 peichang shi
  • 6 篇 mei wen
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 zhiquan lai
  • 6 篇 wang yi-jie
  • 6 篇 xu kele
  • 5 篇 zhou jing
  • 5 篇 hangjun zhou
  • 5 篇 wang xiaodong

语言

  • 184 篇 英文
  • 17 篇 中文
  • 3 篇 其他
检索条件"机构=Key Laboratory and Technology for National Defence of Parallel and Distributed Processing"
204 条 记 录,以下是51-60 订阅
TMDA: Task-Specific Multi-source Domain Adaptation via Clustering Embedded Adversarial Training
TMDA: Task-Specific Multi-source Domain Adaptation via Clust...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Haotian Wang Wenjing Yang Zhipeng Lin Yue Yu State Key Laboratory of High Performance Computing (HPCL) National University of Defense Technology China National Laboratory for Parallel and Distributed Processing National University of Defense Technology China Peng Cheng Laboratory Shenzhen China
Beyond classical domain-specific adversarial training, a recently proposed task-specific framework has achieved a great success in single source domain adaptation by utilizing task-specific decision boundaries. Howeve...
来源: 评论
Attention-based fault-tolerant approach for multi-agent reinforcement learning systems
arXiv
收藏 引用
arXiv 2019年
作者: Geng, Mingyang Xu, Kele Li, Yiying Liu, Shuqi Ding, Bo Wang, Huaimin National Key Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory of Big Data Management and Analysis Northeastern University Shenyang110000 China
The aim of multi-agent reinforcement learning systems is to provide interacting agents with the ability to collaboratively learn and adapt to the behavior of other agents. In many real-world applications, the agents c... 详细信息
来源: 评论
A similarity clustering-based deduplication strategy in cloud storage systems
A similarity clustering-based deduplication strategy in clou...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Saiqin Long Zhetao Li Zihao Liu Qingyong Deng Sangyoon Oh Nobuyoshi Komuro Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science Xiangtan University Xiangtan China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) National University of Defense Technology Changsha China Ajou University Suwon South Korea Graduate School of Advanced Integration Science Chiba University Chiba Japan
Deduplication is a data redundancy elimination technique, designed to save system storage resources by reducing redundant data in cloud storage systems. With the development of cloud computing technology, deduplicatio... 详细信息
来源: 评论
Understanding User Interests Acquisition in Personalized Online Course Recommendation
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Li, Xiao Wang, Ting Wang, Huaimin Tang, Jintao Information Center National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
MOOCs have attracted a large number of learners with different education background all over the world. Despite its increasing popularity, MOOCs still suffer from the problem of high drop-out rate. One important reaso... 详细信息
来源: 评论
Character feature learning for named entity recognition
Character feature learning for named entity recognition
收藏 引用
作者: Zeng, Ping Tan, Qingping Zhang, Haoyu Meng, Xiankai Zhang, Zhuo Xu, Jianjun Lei, Yan College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China School of Software Engineering Chongqing University Chongqing China
The deep neural named entity recognition model automatically learns and extracts the features of entities and solves the problem of the traditional model relying heavily on complex feature engineering and obscure prof... 详细信息
来源: 评论
Software Ranker: A New Comprehensive Software Ranking Approach
Software Ranker: A New Comprehensive Software Ranking Approa...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Yarong Zeng Xunhui Zhang Yaozong Li Tao Wang Gang Yin Huaimin Wang National Laboratory for Parallel and Distributed Processing National University of Defence Technology Changsha China
With the popularity of the open source, the open source community has accumulated a large number of open source project. While these massive projects provide developers with rich reusable resource, they also bring dif... 详细信息
来源: 评论
A novel hybrid architecture for high speed regular expression matching  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Xu, Chengcheng Zhao, Baokang Chen, Shuhui Su, Jinshu College of Computer National University of Defense Technology No. 137 Yanwachi Street ChangshaHunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Mobile devices play an important role in our everyday lives, but they also bring great security threats. Deep packet inspection (DPI) is one of the most efficient methods to detect the malicious information hidden in ... 详细信息
来源: 评论
Density-Attentive Head Detector for Crowd Counting
Density-Attentive Head Detector for Crowd Counting
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Ziyu Zhao Xingyu Shen Long Lan Xiaoyao Yin Xiang Zhang Yonggang Che Zhigang Luo College of Computer National University of Defense Technology Changsha China Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing National University of Defense Technology Changsha China
In crowd counting, regression-based method shows better performance in extreme density scenes by introduces a density map. However, the regression-based method fails to locate the positions of each head, which signifi... 详细信息
来源: 评论
Exploiting a depth context model in visual tracking with correlation filter
收藏 引用
Frontiers of Information technology & Electronic Engineering 2017年 第5期18卷 667-679页
作者: Zhao-yun CHEN Lei LUO Da-fei HUANG Mei WEN Chun-yuan ZHANG College of Computer National University of Defense TechnologyChangsha 410073China National Key Laboratory of Parallel and Distributed Processing Changsha 410073China
Recently correlation filter based trackers have attracted considerable attention for their high computational efficiency. However, they cannot handle occlusion and scale variation well enough. This paper aims at preve... 详细信息
来源: 评论
Enhancing 2D Representation via Adjacent Views for 3D Shape Retrieval
Enhancing 2D Representation via Adjacent Views for 3D Shape ...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Cheng Xu Zhaoqun Li Qiang Qiu Biao Leng Jingfei Jiang School of Computer Science & Engineering Beihang University Duke University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beihang University National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Multi-view shape descriptors obtained from various 2D images are commonly adopted in 3D shape retrieval. One major challenge is that significant shape information are discarded during 2D view rendering through project... 详细信息
来源: 评论