咨询与建议

限定检索结果

文献类型

  • 422 篇 会议
  • 186 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 610 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 376 篇 工学
    • 294 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 72 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 39 篇 生物工程
    • 31 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 26 篇 电气工程
    • 14 篇 动力工程及工程热...
    • 13 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 10 篇 力学(可授工学、理...
    • 9 篇 土木工程
    • 9 篇 农业工程
    • 8 篇 交通运输工程
    • 8 篇 网络空间安全
    • 7 篇 建筑学
    • 7 篇 生物医学工程(可授...
  • 166 篇 理学
    • 99 篇 数学
    • 40 篇 生物学
    • 30 篇 物理学
    • 23 篇 系统科学
    • 21 篇 统计学(可授理学、...
    • 14 篇 化学
  • 104 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 10 篇 法学
    • 9 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 医学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 21 篇 computational mo...
  • 19 篇 training
  • 18 篇 cloud computing
  • 17 篇 deep learning
  • 17 篇 benchmark testin...
  • 15 篇 servers
  • 14 篇 computer archite...
  • 14 篇 semantics
  • 14 篇 algorithm design...
  • 14 篇 distributed proc...
  • 13 篇 laboratories
  • 13 篇 feature extracti...
  • 11 篇 task analysis
  • 11 篇 hardware
  • 10 篇 scalability
  • 10 篇 neural networks
  • 10 篇 clustering algor...
  • 10 篇 kernel
  • 10 篇 graphics process...
  • 10 篇 accuracy

机构

  • 134 篇 science and tech...
  • 69 篇 college of compu...
  • 29 篇 national key lab...
  • 28 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 16 篇 science and tech...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 college of scien...
  • 8 篇 national key lab...

作者

  • 36 篇 liu jie
  • 32 篇 jie liu
  • 25 篇 yijie wang
  • 23 篇 wang yijie
  • 22 篇 wang huaimin
  • 17 篇 peng yuxing
  • 16 篇 zhigang luo
  • 15 篇 dongsheng li
  • 15 篇 li dongsheng
  • 15 篇 qinglin wang
  • 15 篇 huaimin wang
  • 14 篇 yuxing peng
  • 14 篇 naiyang guan
  • 14 篇 ding bo
  • 13 篇 dou yong
  • 13 篇 zuocheng xing
  • 11 篇 chen xinhai
  • 11 篇 xiaodong wang
  • 11 篇 wang qinglin
  • 11 篇 fu yongquan

语言

  • 557 篇 英文
  • 38 篇 中文
  • 15 篇 其他
检索条件"机构=Key Laboratory of Science and Technology for Parallel and Distributed Processing"
610 条 记 录,以下是481-490 订阅
排序:
Skyline Query processing on Interval Uncertain Data
Skyline Query Processing on Interval Uncertain Data
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Xiaoyong Li Yijie Wang Xiaoling Li Guangdong Wang National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Many recent applications involve processing and analyzing uncertain data. Recently, several research efforts have addressed answering skyline queries efficiently on massive uncertain datasets. However, the research la... 详细信息
来源: 评论
A study of strategies to restrain the C&C activities of structured P2P botnets
A study of strategies to restrain the C&C activities of stru...
收藏 引用
International Conference on Computer sciences and Convergence Information technology (ICCIT)
作者: Tianzuo Wang Bo Liu Huaimin Wang Hao Ren Xiaolong Ma School of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense and Technology Changsha China
Botnets are threatening the Internet heavily, and more and more botnets are utilizing the P2P technology to build their C&C (Command and Control) mechanisms. Some research have been made to compare the resilience ... 详细信息
来源: 评论
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论
Reduced complexity tree-structured conditional random field for all-words word sense disambiguation
收藏 引用
Journal of Computational Information Systems 2012年 第3期8卷 1177-1186页
作者: Zhou, Yun Wang, Ting Wang, Zhiyuan Xie, Songxian Computer School National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
In this paper, we apply tree-structured conditional random field (TCRF) to all-words word sense disambiguation (WSD), where the graphical structure of TCRF is the dependency syntax tree produced by Minipar. The extrem... 详细信息
来源: 评论
Server-uncertain spectrum trading in cognitive radio networks: A queueing-theoretic modeling approach
Server-uncertain spectrum trading in cognitive radio network...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Department of Network Engineering College of Computer National University of Defense Technology Changsha China
Spectrum trading is the promising method to improve spectrum efficiency from the perspective of economics. In this paper we propose a queueing-theory based spectrum trading model, where the primary user plays the serv... 详细信息
来源: 评论
Detecting faults by tracing companion states in cloud computing systems
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第5期35卷 856-870页
作者: Rao, Xiang Wang, Huai-Min Chen, Zhen-Bang Zhou, Yang-Fan Cai, Hua Zhou, Qi Sun, Ting-Tao National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China Department of Computing Platform Alibaba Cloud Computing Company Hangzhou 310011 China
A common way to construct a fault model is injecting the fault into the system and observing the subsequent symptoms, e. g. event logs. However, fault features would vary during the propagation period, and present dif... 详细信息
来源: 评论
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairne...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Networks Engineering School of Computer National University of Defense Technology Changsha China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
Jammer Localization for Wireless Sensor Networks
收藏 引用
电子学报(英文版) 2011年 第4期20卷 735-738页
作者: SUN Yanqiang WANG Xiaodong ZHOU Xingming National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
Jamming attack can severely affect the performance of Wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, we in this paper propose a jammer ... 详细信息
来源: 评论
Intention oriented itinerary recommendation by bridging physical trajectories and online social networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 159-168页
作者: Meng, Xiang-Xu Wang, Xiao-Dong Zhou, Xing-Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Human itineraries are often initiated by some general intentions and will be optimized after considering all kinds of constraints and available information. This paper proposes a category-based itinerary recommendatio... 详细信息
来源: 评论
Security Issues and Solutions in Cloud Computing
Security Issues and Solutions in Cloud Computing
收藏 引用
International Conference on distributed Computing Systems Workshop
作者: Pengfei You Yuxing Peng Weidong Liu Shoufu Xue National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China Jiangsu Automation Research Institute Jiangsu China CPLA Air Defence Forces Command Academy Zhengzhou Henan China
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and ... 详细信息
来源: 评论