咨询与建议

限定检索结果

文献类型

  • 145 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 108 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 29 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 16 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 5 篇 电气工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
  • 59 篇 理学
    • 36 篇 数学
    • 17 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 7 篇 系统科学
    • 6 篇 化学
  • 43 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 laboratories
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 servers
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 distributed proc...
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 throughput
  • 4 篇 graph neural net...
  • 4 篇 machine learning
  • 4 篇 performance eval...
  • 4 篇 scheduling algor...
  • 4 篇 kernel
  • 4 篇 hardware

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 4 篇 national key lab...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national univers...

作者

  • 14 篇 ding bo
  • 14 篇 wang huaimin
  • 11 篇 wang yijie
  • 8 篇 yuxing peng
  • 8 篇 bo ding
  • 7 篇 mei wen
  • 7 篇 li dongsheng
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 7 篇 xu kele
  • 6 篇 peichang shi
  • 6 篇 dongsheng li
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 huaimin wang
  • 6 篇 wang yi-jie
  • 5 篇 zhou jing
  • 5 篇 xiaodong wang
  • 5 篇 zhiquan lai
  • 5 篇 wang xiaodong

语言

  • 188 篇 英文
  • 21 篇 中文
  • 1 篇 其他
检索条件"机构=Key Laboratory for Parallel and Distributed Processing"
210 条 记 录,以下是61-70 订阅
排序:
Merge-Weighted Dynamic Time Warping for Speech Recognition
收藏 引用
Journal of Computer Science & Technology 2014年 第6期29卷 1072-1082页
作者: 张湘莉兰 骆志刚 李明 State Key Laboratory of Pathogen and Biosecurity Beijing Institute of Microbiology and Epidemiology Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology David R.Cheriton School of Computer Science University of WaterlooWaterlooOntario N2L 3G1Canada ACM IEEE
Obtaining training material for rarely used English words and common given names from countries where English is not spoken is difficult due to excessive time, storage and cost factors. By considering personal privacy... 详细信息
来源: 评论
A load balancing-supported constant degree DHT ID assignment method
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第11期38卷 2649-2654页
作者: Wang, Xiao-Hai Peng, Yu-Xing Li, Dong-Sheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
A Load Balancing-Supported ID assignment method is the foundation to implement and maintain DHT overlays, realized constant degree DHTs usually use simple pure centralized or distributed ID management strategies, whic... 详细信息
来源: 评论
Unified virtual memory support for deep CNN accelerator on soC FPGA  1
收藏 引用
15th International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2015
作者: Xiao, Tao Qiao, Yuran Shen, Junzhong Yang, Qianming Wen, Mei College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Cooperation of CPU and hardware accelerator on SoC FPGA to accomplish computational intensive tasks, provides significant advantages in performance and energy efficiency. However, current operating systems provide lit... 详细信息
来源: 评论
Comparing performance of hierarchical identity-based signature schemes
Comparing performance of hierarchical identity-based signatu...
收藏 引用
作者: Chen, Peixin Wu, Yilun Su, Jinshu Wang, Xiaofeng College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
The key escrow problem and high computational cost are the two major problems that hinder the wider adoption of hierarchical identity-based signature (HIBS) scheme. HIBS schemes with either escrow-free (EF) or online/... 详细信息
来源: 评论
A novel L1 cache based on volatile STT-RAM  20th
A novel L1 cache based on volatile STT-RAM
收藏 引用
20th Annual Conference on Computer Engineering and Technology, NCCET 2016
作者: Hongguang, Zhang Minxuan, Zhang College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Spin-transfer torque random access memory (STT-RAM) is one of the most promising substitutes for universal main memory and cache due to its excellent scalability, high density and low leakage power. Nevertheless, the ... 详细信息
来源: 评论
Using NMFAS to identify key biological pathways associated with human diseases
Using NMFAS to identify key biological pathways associated w...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Guo, Hao Zhu, Yunping Li, Dong He, Fuchu Liu, Qijun State Key Laboratory of Proteomics Beijing Proteome Research Centre Beijing Institute of Radiation Medicine Beijing China National Laboratory for Parallel and Distributed Processing National University of Deference and Technology Changsha China
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural Computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
Character feature learning for named entity recognition
Character feature learning for named entity recognition
收藏 引用
作者: Zeng, Ping Tan, Qingping Zhang, Haoyu Meng, Xiankai Zhang, Zhuo Xu, Jianjun Lei, Yan College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China School of Software Engineering Chongqing University Chongqing China
The deep neural named entity recognition model automatically learns and extracts the features of entities and solves the problem of the traditional model relying heavily on complex feature engineering and obscure prof... 详细信息
来源: 评论
CD-Sched: An Automated Scheduling Framework for Accelerating Neural Network Training on Shared Memory CPU-DSP Platforms  23
CD-Sched: An Automated Scheduling Framework for Accelerating...
收藏 引用
Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking Technologies
作者: Yuanyuan Xiao Zhiquan Lai Dongsheng Li National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology China
DSP holds significant potential for important applications in Deep Neural Networks. However, there is currently a lack of research focused on shared-memory CPU-DSP heterogeneous chips. This paper proposes CD-Sched, an... 详细信息
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论