咨询与建议

限定检索结果

文献类型

  • 141 篇 会议
  • 63 篇 期刊文献

馆藏范围

  • 204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 109 篇 计算机科学与技术...
    • 80 篇 软件工程
    • 30 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
  • 61 篇 理学
    • 37 篇 数学
    • 19 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 7 篇 物理学
    • 7 篇 化学
  • 39 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 laboratories
  • 5 篇 servers
  • 5 篇 graph neural net...
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep neural netw...
  • 4 篇 distributed proc...
  • 4 篇 machine learning
  • 4 篇 scheduling algor...
  • 4 篇 hardware
  • 4 篇 graphics process...
  • 4 篇 training
  • 4 篇 heuristic algori...
  • 3 篇 routing

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 3 篇 department of in...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national laborat...

作者

  • 14 篇 ding bo
  • 14 篇 wang huaimin
  • 9 篇 yuxing peng
  • 9 篇 wang yijie
  • 8 篇 li dongsheng
  • 8 篇 bo ding
  • 7 篇 dongsheng li
  • 7 篇 huaimin wang
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 6 篇 peichang shi
  • 6 篇 mei wen
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 zhiquan lai
  • 6 篇 wang yi-jie
  • 6 篇 xu kele
  • 5 篇 zhou jing
  • 5 篇 hangjun zhou
  • 5 篇 wang xiaodong

语言

  • 185 篇 英文
  • 17 篇 中文
  • 2 篇 其他
检索条件"机构=Key Laboratory and Technology for National Defence of Parallel and Distributed Processing"
204 条 记 录,以下是71-80 订阅
排序:
DISVMs: Fast SVMs Training on Large-scale Data Sets
DISVMs: Fast SVMs Training on Large-scale Data Sets
收藏 引用
International Conference on Tools with Artificial Intelligence
作者: Lijuan Cui Changjian Wang Ziyang Li Yuxing Peng Science and Technology on Parallel and distributed Processing Laboratory National University of Defence Technology
Support Vector Machines (SVMs) are powerful classification tools. However, the model training is very time-consuming when meeting large scale data sets. Some efforts have been devoted to screening out non-support vect... 详细信息
来源: 评论
A load balancing-supported constant degree DHT ID assignment method
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第11期38卷 2649-2654页
作者: Wang, Xiao-Hai Peng, Yu-Xing Li, Dong-Sheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
A Load Balancing-Supported ID assignment method is the foundation to implement and maintain DHT overlays, realized constant degree DHTs usually use simple pure centralized or distributed ID management strategies, whic... 详细信息
来源: 评论
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
parallelization of the Training for Face Detection with Transactional Memory
Parallelization of the Training for Face Detection with Tran...
收藏 引用
The International Conference on Automation and Robotics(ICAR 2011)
作者: Kun Zeng Key Laboratory and technology for National Defence of Parallel and Distributed Processing School of Computer National Univiersity of Defense Technology
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural Computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
Understanding User Interests Acquisition in Personalized Online Course Recommendation
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Li, Xiao Wang, Ting Wang, Huaimin Tang, Jintao Information Center National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
MOOCs have attracted a large number of learners with different education background all over the world. Despite its increasing popularity, MOOCs still suffer from the problem of high drop-out rate. One important reaso... 详细信息
来源: 评论
Character feature learning for named entity recognition
Character feature learning for named entity recognition
收藏 引用
作者: Zeng, Ping Tan, Qingping Zhang, Haoyu Meng, Xiankai Zhang, Zhuo Xu, Jianjun Lei, Yan College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China School of Software Engineering Chongqing University Chongqing China
The deep neural named entity recognition model automatically learns and extracts the features of entities and solves the problem of the traditional model relying heavily on complex feature engineering and obscure prof... 详细信息
来源: 评论
Using NMFAS to identify key biological pathways associated with human diseases
Using NMFAS to identify key biological pathways associated w...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Guo, Hao Zhu, Yunping Li, Dong He, Fuchu Liu, Qijun State Key Laboratory of Proteomics Beijing Proteome Research Centre Beijing Institute of Radiation Medicine Beijing China National Laboratory for Parallel and Distributed Processing National University of Deference and Technology Changsha China
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde... 详细信息
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Software Effective Evaluating technology: SWEET
Software Effective Evaluating Technology: SWEET
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Yaozong Li Tao Wang Yue Yu Dongyang Hu National Laboratory for Parallel and Distributed Processing National University of Defence Technology Changsha China
In open source community, there are a large number of software resources existing. Such software resources distribute in different societies or storehouses, which require different software characteristic. This phenom... 详细信息
来源: 评论