咨询与建议

限定检索结果

文献类型

  • 195 篇 会议
  • 89 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 286 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 150 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 41 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 19 篇 生物工程
    • 18 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 9 篇 仪器科学与技术
    • 7 篇 网络空间安全
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 4 篇 动力工程及工程热...
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
  • 78 篇 理学
    • 49 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 11 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 化学
  • 65 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 9 篇 cloud computing
  • 8 篇 computational mo...
  • 8 篇 distributed proc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 programming
  • 6 篇 laboratories
  • 6 篇 servers
  • 6 篇 wireless sensor ...
  • 6 篇 benchmark testin...
  • 6 篇 training
  • 5 篇 task analysis
  • 5 篇 graphics process...
  • 5 篇 graph neural net...
  • 5 篇 machine learning
  • 5 篇 data models
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 operating system...
  • 4 篇 deep neural netw...

机构

  • 29 篇 national key lab...
  • 25 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 school of comput...
  • 10 篇 national key lab...
  • 8 篇 xiangjiang lab
  • 8 篇 national key lab...
  • 8 篇 national univers...
  • 8 篇 national key lab...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 5 篇 tongji universit...
  • 4 篇 key laboratory o...
  • 4 篇 national key lab...

作者

  • 22 篇 wang huaimin
  • 14 篇 li dongsheng
  • 14 篇 ding bo
  • 12 篇 wang yijie
  • 12 篇 huaimin wang
  • 12 篇 xu kele
  • 10 篇 dongsheng li
  • 10 篇 bo ding
  • 9 篇 yuxing peng
  • 9 篇 wang tao
  • 8 篇 peichang shi
  • 8 篇 fu yongquan
  • 7 篇 mei wen
  • 7 篇 peng yuxing
  • 7 篇 tan qingping
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 shi peichang
  • 6 篇 kele xu
  • 6 篇 wang yi-jie

语言

  • 261 篇 英文
  • 23 篇 中文
  • 2 篇 其他
检索条件"机构=National Key Lab of Parallel and Distributed Processing"
286 条 记 录,以下是91-100 订阅
排序:
A construction technique of constant degree P2P systems towards efficient complex queries
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第3期48卷 374-381页
作者: Wang, Xiaohai Peng, Yuxing Li, Dongsheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Constant degree peer-to-peer (P2P) system is turning into the P2P domain's promising hotspot due to constant degree digraphs having good propertis. However, it is often hard to convert a stardard constant degree d... 详细信息
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment  23
TeeSwap: Private Data Exchange using Smart Contract and Trus...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Peng Shi, Peichang Xu, Jie Fu, Xiang Li, Linhui Zhong, Tao Xiang, Liangliang Kong, Jinzhu College of Computer National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China Zhejiang Lab Hangzhou311100 China Kylin Software Co. Ltd Changsha410073 China
With importance of data value is approved, data-sharing will create more and greater value has become consensus. However, data exchange has to use a trusted third party(TTP) as an intermediary in an untrusted network ... 详细信息
来源: 评论
An Efficient Broadcast Authentication Protocol in Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 368-372页
作者: Xin Zhao Xiaodong Wang Wanrong Yu Xingming Zhou National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Broadcast authentication is a critical security service in wireless sensor networks. A protocol named $\mu\text{TESLA}$ [1] has been proposed to provide efficient authentication service for such networks. However, w... 详细信息
来源: 评论
Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc Networks
Media Access Control Protocol Based on Hybrid Antennas in Ad...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yanrong Ding Xiaodong Wang Hu Shen Pengyu Guo National Key Laboratory for Parallel and Distributed Processing Changsha China
Nested Circular Directional MAC, a modified medium access control protocol of DMAC protocol, is proposed in this paper to support both directional antennas and omni-directional antennas simultaneously in one Ad Hoc ne... 详细信息
来源: 评论
CD-Sched: An Automated Scheduling Framework for Accelerating Neural Network Training on Shared Memory CPU-DSP Platforms  23
CD-Sched: An Automated Scheduling Framework for Accelerating...
收藏 引用
Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking Technologies
作者: Yuanyuan Xiao Zhiquan Lai Dongsheng Li National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology China
DSP holds significant potential for important applications in Deep Neural Networks. However, there is currently a lack of research focused on shared-memory CPU-DSP heterogeneous chips. This paper proposes CD-Sched, an... 详细信息
来源: 评论
A load balancing-supported constant degree DHT ID assignment method
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第11期38卷 2649-2654页
作者: Wang, Xiao-Hai Peng, Yu-Xing Li, Dong-Sheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
A Load Balancing-Supported ID assignment method is the foundation to implement and maintain DHT overlays, realized constant degree DHTs usually use simple pure centralized or distributed ID management strategies, whic... 详细信息
来源: 评论
Temporal Inconsistency-Based Intrinsic Reward for Multi-Agent Reinforcement Learning
Temporal Inconsistency-Based Intrinsic Reward for Multi-Agen...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Shaoqi Sun Kele Xu National Key Lab of Parallel and Distributed Processing National University of Defense Technology Changsha China
Multi-agent reinforcement learning (MARL) has shown promising results in many challenging sequential decision-making tasks. Recently, deep neural networks have dominated this field. However, the policy networks of age...
来源: 评论