咨询与建议

限定检索结果

文献类型

  • 195 篇 会议
  • 88 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 149 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 40 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 19 篇 生物工程
    • 17 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 9 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 4 篇 动力工程及工程热...
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
  • 78 篇 理学
    • 49 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 11 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 化学
  • 64 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 9 篇 cloud computing
  • 8 篇 computational mo...
  • 8 篇 distributed proc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 programming
  • 6 篇 laboratories
  • 6 篇 servers
  • 6 篇 wireless sensor ...
  • 6 篇 benchmark testin...
  • 6 篇 training
  • 5 篇 task analysis
  • 5 篇 graphics process...
  • 5 篇 graph neural net...
  • 5 篇 machine learning
  • 5 篇 data models
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 operating system...
  • 4 篇 deep neural netw...

机构

  • 29 篇 national key lab...
  • 25 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 school of comput...
  • 10 篇 national key lab...
  • 8 篇 xiangjiang lab
  • 8 篇 national key lab...
  • 8 篇 national univers...
  • 8 篇 national key lab...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 5 篇 tongji universit...
  • 4 篇 key laboratory o...
  • 4 篇 national key lab...

作者

  • 22 篇 wang huaimin
  • 14 篇 li dongsheng
  • 14 篇 ding bo
  • 12 篇 wang yijie
  • 12 篇 huaimin wang
  • 12 篇 xu kele
  • 10 篇 dongsheng li
  • 10 篇 bo ding
  • 9 篇 yuxing peng
  • 9 篇 wang tao
  • 8 篇 peichang shi
  • 8 篇 fu yongquan
  • 7 篇 mei wen
  • 7 篇 peng yuxing
  • 7 篇 tan qingping
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 shi peichang
  • 6 篇 kele xu
  • 6 篇 wang yi-jie

语言

  • 261 篇 英文
  • 23 篇 中文
  • 1 篇 其他
检索条件"机构=National Key Lab of Parallel and Distributed Processing"
285 条 记 录,以下是91-100 订阅
排序:
CloudDPI: Cloud-based privacy-preserving deep packet inspection via reversible sketch  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Li, Jie Su, Jinshu Wang, Xiaofeng Sun, Hao Chen, Shuhui School of Computer National University of Defense Technology Changsha Hunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan410073 China
Hardware-based middleboxes are ubiquitous in computer networks, which usually incur high deployment and management expenses. A recently arsing trend aims to address those problems by outsourcing the functions of tradi... 详细信息
来源: 评论
Concurrent access control using subcarrier signature in heterogeneous MIMO-based WLAN
Concurrent access control using subcarrier signature in hete...
收藏 引用
5th International Workshop on Multiple Access Communications, MACOM 2012
作者: Shen, Hu Lv, Shaohe Sun, Yanqiang Dong, Xuan Wang, Xiaodong Zhou, Xingming National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Institute of Network Information and Security National University of Defense Technology Changsha 410073 China
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural Computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
Character feature learning for named entity recognition
Character feature learning for named entity recognition
收藏 引用
作者: Zeng, Ping Tan, Qingping Zhang, Haoyu Meng, Xiankai Zhang, Zhuo Xu, Jianjun Lei, Yan College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China School of Software Engineering Chongqing University Chongqing China
The deep neural named entity recognition model automatically learns and extracts the features of entities and solves the problem of the traditional model relying heavily on complex feature engineering and obscure prof... 详细信息
来源: 评论
A construction technique of constant degree P2P systems towards efficient complex queries
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第3期48卷 374-381页
作者: Wang, Xiaohai Peng, Yuxing Li, Dongsheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Constant degree peer-to-peer (P2P) system is turning into the P2P domain's promising hotspot due to constant degree digraphs having good propertis. However, it is often hard to convert a stardard constant degree d... 详细信息
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment  23
TeeSwap: Private Data Exchange using Smart Contract and Trus...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Peng Shi, Peichang Xu, Jie Fu, Xiang Li, Linhui Zhong, Tao Xiang, Liangliang Kong, Jinzhu College of Computer National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China Zhejiang Lab Hangzhou311100 China Kylin Software Co. Ltd Changsha410073 China
With importance of data value is approved, data-sharing will create more and greater value has become consensus. However, data exchange has to use a trusted third party(TTP) as an intermediary in an untrusted network ... 详细信息
来源: 评论
An Efficient Broadcast Authentication Protocol in Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 368-372页
作者: Xin Zhao Xiaodong Wang Wanrong Yu Xingming Zhou National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Broadcast authentication is a critical security service in wireless sensor networks. A protocol named $\mu\text{TESLA}$ [1] has been proposed to provide efficient authentication service for such networks. However, w... 详细信息
来源: 评论