咨询与建议

限定检索结果

文献类型

  • 145 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 108 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 29 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 16 篇 生物工程
    • 11 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 5 篇 电气工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 农业工程
    • 3 篇 交通运输工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
  • 59 篇 理学
    • 36 篇 数学
    • 17 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 7 篇 系统科学
    • 6 篇 化学
  • 43 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
    • 3 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学
  • 1 篇 医学

主题

  • 7 篇 cloud computing
  • 6 篇 laboratories
  • 6 篇 benchmark testin...
  • 5 篇 programming
  • 5 篇 servers
  • 5 篇 wireless sensor ...
  • 5 篇 computational mo...
  • 5 篇 semantics
  • 5 篇 distributed proc...
  • 5 篇 feature extracti...
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 deep neural netw...
  • 4 篇 throughput
  • 4 篇 graph neural net...
  • 4 篇 machine learning
  • 4 篇 performance eval...
  • 4 篇 scheduling algor...
  • 4 篇 kernel
  • 4 篇 hardware

机构

  • 29 篇 national key lab...
  • 22 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 school of advanc...
  • 4 篇 xiangjiang lab
  • 4 篇 national key lab...
  • 4 篇 national key lab...
  • 3 篇 national key lab...
  • 3 篇 state key labora...
  • 3 篇 national univers...

作者

  • 14 篇 ding bo
  • 14 篇 wang huaimin
  • 11 篇 wang yijie
  • 8 篇 yuxing peng
  • 8 篇 bo ding
  • 7 篇 mei wen
  • 7 篇 li dongsheng
  • 7 篇 fu yongquan
  • 7 篇 peng yuxing
  • 7 篇 xu kele
  • 6 篇 peichang shi
  • 6 篇 dongsheng li
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 huaimin wang
  • 6 篇 wang yi-jie
  • 5 篇 zhou jing
  • 5 篇 xiaodong wang
  • 5 篇 zhiquan lai
  • 5 篇 wang xiaodong

语言

  • 188 篇 英文
  • 21 篇 中文
  • 1 篇 其他
检索条件"机构=Key Laboratory for Parallel and Distributed Processing"
210 条 记 录,以下是81-90 订阅
排序:
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
A New Method for Evaluating Core Developers In Open Source Software  13
A New Method for Evaluating Core Developers In Open Source S...
收藏 引用
13th IEEE International Conference on Software Engineering and Service Science, ICSESS 2022
作者: Song, Yulin Wang, Tao Shen, Yang Chang, Junsheng National University of Defense Technology National Laboratory for Parallel and Distributed Processing Hunan Province Changsha China National University of Defense Technology Institute for Quantum Information State Key Laboratory of High Performance Computing Hunan Province Changsha China
The high-quality development of Open Source Software(OSS) benefits from the contributions of developers. An important research question is how to truly assess the extent of contribution of all developers in open sourc... 详细信息
来源: 评论
A novel hybrid architecture for high speed regular expression matching  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Xu, Chengcheng Zhao, Baokang Chen, Shuhui Su, Jinshu College of Computer National University of Defense Technology No. 137 Yanwachi Street ChangshaHunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Mobile devices play an important role in our everyday lives, but they also bring great security threats. Deep packet inspection (DPI) is one of the most efficient methods to detect the malicious information hidden in ... 详细信息
来源: 评论
Location-Aware Multi-user Resource Allocation in distributed Clouds
Location-Aware Multi-user Resource Allocation in Distributed...
收藏 引用
10th Annual Conference of Advanced Computer Architecture, ACA 2014
作者: Li, Jiaxin Li, Dongsheng Zheng, Jing Quan, Yong National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Information Center of Logistics Department Beijing China School of Computer Science National University of Defense Technology Changsha China
Resource allocation for multi-user across multiple data centers is an important problem in cloud computing environments. Many geographically-distributed users may request virtualized resources simultaneously. And the ... 详细信息
来源: 评论
CNA: A Dataset for Parsing Discourse Structure on Chinese News Articles
CNA: A Dataset for Parsing Discourse Structure on Chinese Ne...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Zhenliang Guo Zhen Huang Yong Dou Xiubin Yu Sijie Wang Zhongwu Chen Xinxin Su Xiaohang Liu National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Discourse structure analysis has shown to be useful for many artificial intelligence (AI) tasks such as text sum-marization and text categorization. However, for the Chinese news domain, the discourse structure analys... 详细信息
来源: 评论
Cloudroid: A cloud framework for transparent and QoS-aware robotic computation outsourcing
arXiv
收藏 引用
arXiv 2017年
作者: Hu, Ben Wang, Huaimin Zhang, Pengfei Ding, Bo Che, Huimin National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology 410073 China
Many robotic tasks require heavy computation, which can easily exceed the robot's onboard computer capability. A promising solution to address this challenge is outsourcing the computation to the cloud. However, e... 详细信息
来源: 评论
Jammer Localization for Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 735-738页
作者: SUN Yanqiang WANG Xiaodong ZHOU Xingming National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
Jamming attack can severely affect the performance of Wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, we in this paper propose a jammer ... 详细信息
来源: 评论
TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment  23
TeeSwap: Private Data Exchange using Smart Contract and Trus...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Peng Shi, Peichang Xu, Jie Fu, Xiang Li, Linhui Zhong, Tao Xiang, Liangliang Kong, Jinzhu College of Computer National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China Zhejiang Lab Hangzhou311100 China Kylin Software Co. Ltd Changsha410073 China
With importance of data value is approved, data-sharing will create more and greater value has become consensus. However, data exchange has to use a trusted third party(TTP) as an intermediary in an untrusted network ... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features  10th
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Ming Liu, Bo Xing, Guangsheng Wang, Xiaodong Wang, Zhihui College of Intelligence Science and Technology National University of Defence Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
Understanding User Interests Acquisition in Personalized Online Course Recommendation
Understanding User Interests Acquisition in Personalized Onl...
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Li, Xiao Wang, Ting Wang, Huaimin Tang, Jintao Information Center National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
MOOCs have attracted a large number of learners with different education background all over the world. Despite its increasing popularity, MOOCs still suffer from the problem of high drop-out rate. One important reaso... 详细信息
来源: 评论