咨询与建议

限定检索结果

文献类型

  • 145 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 142 篇 工学
    • 109 篇 计算机科学与技术...
    • 79 篇 软件工程
    • 30 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 16 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 6 篇 电气工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
  • 59 篇 理学
    • 36 篇 数学
    • 17 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
  • 44 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 laboratories
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 servers
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 distributed proc...
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 throughput
  • 4 篇 graph neural net...
  • 4 篇 machine learning
  • 4 篇 performance eval...
  • 4 篇 scheduling algor...
  • 4 篇 kernel
  • 4 篇 hardware

机构

  • 30 篇 national key lab...
  • 23 篇 national key lab...
  • 22 篇 college of compu...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 4 篇 national key lab...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national univers...

作者

  • 14 篇 ding bo
  • 14 篇 wang huaimin
  • 11 篇 wang yijie
  • 8 篇 yuxing peng
  • 8 篇 bo ding
  • 7 篇 mei wen
  • 7 篇 li dongsheng
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 7 篇 xu kele
  • 6 篇 peichang shi
  • 6 篇 dongsheng li
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 huaimin wang
  • 6 篇 wang yi-jie
  • 5 篇 zhou jing
  • 5 篇 xiaodong wang
  • 5 篇 zhiquan lai
  • 5 篇 wang xiaodong

语言

  • 188 篇 英文
  • 21 篇 中文
  • 2 篇 其他
检索条件"机构=Key Laboratory for Parallel and Distributed Processing"
211 条 记 录,以下是71-80 订阅
Two improved GPU acceleration strategies for force-directed graph layout
Two improved GPU acceleration strategies for force-directed ...
收藏 引用
International Conference on Computer Application and System Modeling (ICCASM)
作者: Yong-Xian Wang Zong-Zhe Li Lu Yao Wei Cao Zheng-Hua Wang National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Force directed approach is one of the most widely used methods in graph drawing research. However, the running time is increased intolerablely along with the enlargement of the graph size, which restricts the algorith... 详细信息
来源: 评论
Concurrent access control using subcarrier signature in heterogeneous MIMO-based WLAN
Concurrent access control using subcarrier signature in hete...
收藏 引用
5th International Workshop on Multiple Access Communications, MACOM 2012
作者: Shen, Hu Lv, Shaohe Sun, Yanqiang Dong, Xuan Wang, Xiaodong Zhou, Xingming National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Institute of Network Information and Security National University of Defense Technology Changsha 410073 China
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif... 详细信息
来源: 评论
Efficient semantic-aware coflow scheduling for data-parallel jobs
Efficient semantic-aware coflow scheduling for data-parallel...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Ziyang Li Yiming Zhang Yunxiang Zhao Dongsheng Li National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology
This paper studies the communication pattern of data-parallel applications from the perspective of job execution, and discovers multiple inter-coflow dependencies. These inter-coflow dependencies, collectively named a... 详细信息
来源: 评论
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
High-performance Network Traffic Classification Based on Graph Neural Network  6
High-performance Network Traffic Classification Based on Gra...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Pang, Bo Fu, Yongquan Ren, Siyuan Jia, Yan Harbin Institute of Technology College of Computer Science and Technology Shenzhen China National University of Defense Technology National Key Laboratory for Parallel and Distributed Processing College of Computer Changsha China Peng Cheng Laboratory Shen Zhen China
Network traffic classification is crucial for network security and network management and is one of the most important network tasks. Current state-of-the-art traffic classifiers are based on deep learning models to a... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论
CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines
CoCache: Multi-layer Multi-path Cooperative Cache Accelerati...
收藏 引用
2014 IEEE 8th International Symposium on Service Oriented System Engineering
作者: Ziyang Li Zhaoning Zhang Huiba Li Yuxing Peng National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
By analyzing the problems and challenges of virtual machine image store system in cloud computing environment, we present a cooperative persistent cache (CoCache) for virtual disks. CoCache takes advantage of the serv... 详细信息
来源: 评论
A New Method for Evaluating Core Developers In Open Source Software  13
A New Method for Evaluating Core Developers In Open Source S...
收藏 引用
13th IEEE International Conference on Software Engineering and Service Science, ICSESS 2022
作者: Song, Yulin Wang, Tao Shen, Yang Chang, Junsheng National University of Defense Technology National Laboratory for Parallel and Distributed Processing Hunan Province Changsha China National University of Defense Technology Institute for Quantum Information State Key Laboratory of High Performance Computing Hunan Province Changsha China
The high-quality development of Open Source Software(OSS) benefits from the contributions of developers. An important research question is how to truly assess the extent of contribution of all developers in open sourc... 详细信息
来源: 评论
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
A novel hybrid architecture for high speed regular expression matching  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Xu, Chengcheng Zhao, Baokang Chen, Shuhui Su, Jinshu College of Computer National University of Defense Technology No. 137 Yanwachi Street ChangshaHunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Mobile devices play an important role in our everyday lives, but they also bring great security threats. Deep packet inspection (DPI) is one of the most efficient methods to detect the malicious information hidden in ... 详细信息
来源: 评论