咨询与建议

限定检索结果

文献类型

  • 857 篇 会议
  • 255 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 697 篇 工学
    • 555 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 125 篇 信息与通信工程
    • 69 篇 控制科学与工程
    • 67 篇 电子科学与技术(可...
    • 51 篇 生物工程
    • 45 篇 机械工程
    • 36 篇 电气工程
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 18 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 13 篇 环境科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
  • 270 篇 理学
    • 179 篇 数学
    • 56 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 35 篇 物理学
    • 21 篇 化学
  • 177 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 6 篇 文学
  • 5 篇 医学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 51 篇 distributed proc...
  • 49 篇 laboratories
  • 40 篇 computational mo...
  • 38 篇 concurrent compu...
  • 33 篇 algorithm design...
  • 30 篇 distributed comp...
  • 29 篇 computer archite...
  • 29 篇 benchmark testin...
  • 29 篇 kernel
  • 27 篇 hardware
  • 26 篇 parallel process...
  • 26 篇 fault tolerance
  • 26 篇 graphics process...
  • 22 篇 servers
  • 22 篇 feature extracti...
  • 22 篇 cloud computing
  • 22 篇 training
  • 21 篇 throughput
  • 21 篇 bandwidth
  • 21 篇 protocols

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 93 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 35 篇 school of comput...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...
  • 10 篇 parallel and dis...
  • 10 篇 national laborat...

作者

  • 40 篇 wang huaimin
  • 37 篇 wang ji
  • 37 篇 yong dou
  • 36 篇 ji wang
  • 35 篇 liu jie
  • 32 篇 jie liu
  • 29 篇 huaimin wang
  • 28 篇 dou yong
  • 27 篇 dongsheng li
  • 27 篇 xiaodong wang
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 li dongsheng
  • 24 篇 yijie wang
  • 23 篇 wang yijie
  • 21 篇 xicheng lu
  • 21 篇 li kuan-ching
  • 21 篇 xingming zhou
  • 20 篇 gang yin

语言

  • 1,046 篇 英文
  • 63 篇 中文
  • 6 篇 其他
检索条件"机构=Laboratory for Parallel and Distributed Processing"
1115 条 记 录,以下是941-950 订阅
排序:
An Efficient Approximation for Weapon-Target Assignment
An Efficient Approximation for Weapon-Target Assignment
收藏 引用
ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM
作者: Lina Chen ChuanJun Ren Su Deng C4ISR Technology National Defense Science and Technology Key Laboratory National University of Defense Technology Changsha Hunan China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
The weapon-target assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. The WTA problem can be formulated as a nonlinear integer programming problem and is k... 详细信息
来源: 评论
Optimistic data consistency maintenance method based on data dependence
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2008年 第5期31卷 741-753页
作者: Zhou, Jing Wang, Yi-Jie Li, Si-Kun National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
This paper proposes an optimistic data consistency method according to the question about data dependence in data consistency. In the method, data object is partitioned into data blocks by fixed size as the basic unit... 详细信息
来源: 评论
Optimistic data consistency maintenance method based on key-attributes
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2008年 第8期19卷 2114-2126页
作者: Zhou, Jing Wang, Yi-Jie Li, Si-Kun National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
The features of simple description, small updates item and weak dependence are the main characteristics of updates of key-attributes in P2P systems. Accordingly, an optimistic data consistency maintenance method based... 详细信息
来源: 评论
Weakly hard real-time schedule algorithm based on cutting down
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2008年 第7期19卷 1837-1846页
作者: Wu, Tong Jin, Shi-Yao Liu, Hua-Feng Chen, Ji-Ming National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China National Laboratory of Industrial Control Technology Zhejiang University Hangzhou 310027 China
Nowadays, weakly hard real-time is attracted in the research of real-time system. Existing weakly hard real-time scheduling algorithms cannot guarantee the meeting ratio of executing sequence of which the length is la... 详细信息
来源: 评论
Research on self-similar network traffic prediction
Hunan Daxue Xuebao/Journal of Hunan University Natural Scien...
收藏 引用
Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences 2008年 第6期35卷 82-86页
作者: Zhang, Guang-Sheng Li, Jing-Bo Dou, Wen-Hua Shao, Li-Song National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Journal of Hunan University Changsha 410082 China
Recent studies on network traffic have shown that self-similar is very popular, and the character will not be changed during buffering, switching and transmitting. The character self-similar must be considered in netw... 详细信息
来源: 评论
Axiomatizing extended temporal logic fragments via instantiation
Axiomatizing extended temporal logic fragments via instantia...
收藏 引用
4th International Colloquium on Theoretical Aspects of Computing (ICTAC 2007)
作者: Liu, Wanwei Wang, Ji Dong, Wei Chen, Huowang National Laboratory of Parallel and Distributed Processing China
ETLs are temporal logics employing w-automata as temporal connectives. This paper presents sound and complete axiom systems for ETLl, ETLf, and ETLr, respectively. Axioms and rules reflecting temporal behaviors of loo... 详细信息
来源: 评论
Optimization approaches of organizing streams on imagine processor
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2008年 第7期31卷 1092-1100页
作者: Yang, Xue-Jun Zeng, Li-Fang Deng, Yu Tang, Yu-Hua National Key Laboratory of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China Jiangnan Remote Sensing Institute Shanghai 200072 China
Due to the characteristics of stream applications and the insufficiency of conventional processors when running stream programs, stream processors which support data-level parallelism become the research hotspot. This... 详细信息
来源: 评论
PIBUS: A network memory-based peer-to-peer IO buffering service
收藏 引用
6th International IFIP-TC6 Networking Conference, NETWORKING 2007
作者: Zhang, Yiming Li, Dongsheng Chu, Rui Xiao, Nong Lu, Xicheng National Laboratory for Parallel and Distributed Processing NUDT Changsha Hunan410073 China
This paper proposes a network memory-based P2P IO BUffering Service (PIBUS), which buffers blocks for IO-intensive applications in P2P network memory like a 2-level disk cache. PIBUS reduces the IO overhead when local... 详细信息
来源: 评论
A stream system-on-chip architecture for high speed target recognition based on biologic vision
A stream system-on-chip architecture for high speed target r...
收藏 引用
12th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2007
作者: Wu, Nan Yang, Qianming Wen, Mei He, Yi Xun, Changqing Zhang, Chunyuan National Laboratory for Parallel and Distributed Processing Chang Sha Hu Nan 410073 China
For target recognition based on biologic vision, an application-specific stream SOC: MASA-MI is described in this paper. MASA-MI consists of several heterogeneous cores, and a stream accelerator core is used to accele... 详细信息
来源: 评论
Towards a new methodology for estimating available bandwidth on network paths
收藏 引用
7th International Symposium on Advanced parallel processing Technologies, APPT 2007
作者: Lv, Shaohe Wang, Xiaodong Zhou, Xingming Yin, Jianping National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
This paper presents a novel methodology, called COPP, to estimate available bandwidth over a given network path. COPP deploys a particular probe scheme, namely chirp of packet pairs, which is composed of several packe... 详细信息
来源: 评论