咨询与建议

限定检索结果

文献类型

  • 195 篇 会议
  • 88 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 149 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 40 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 19 篇 生物工程
    • 17 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 9 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 4 篇 动力工程及工程热...
    • 4 篇 农业工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
  • 78 篇 理学
    • 49 篇 数学
    • 20 篇 生物学
    • 15 篇 物理学
    • 11 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 化学
  • 64 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 9 篇 cloud computing
  • 8 篇 computational mo...
  • 8 篇 distributed proc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 programming
  • 6 篇 laboratories
  • 6 篇 servers
  • 6 篇 wireless sensor ...
  • 6 篇 benchmark testin...
  • 6 篇 training
  • 5 篇 task analysis
  • 5 篇 graphics process...
  • 5 篇 graph neural net...
  • 5 篇 machine learning
  • 5 篇 data models
  • 5 篇 cryptography
  • 4 篇 deep learning
  • 4 篇 operating system...
  • 4 篇 deep neural netw...

机构

  • 29 篇 national key lab...
  • 25 篇 college of compu...
  • 22 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 school of comput...
  • 10 篇 national key lab...
  • 8 篇 xiangjiang lab
  • 8 篇 national key lab...
  • 8 篇 national univers...
  • 8 篇 national key lab...
  • 7 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 5 篇 tongji universit...
  • 4 篇 key laboratory o...
  • 4 篇 national key lab...

作者

  • 22 篇 wang huaimin
  • 14 篇 li dongsheng
  • 14 篇 ding bo
  • 12 篇 wang yijie
  • 12 篇 huaimin wang
  • 12 篇 xu kele
  • 10 篇 dongsheng li
  • 10 篇 bo ding
  • 9 篇 yuxing peng
  • 9 篇 wang tao
  • 8 篇 peichang shi
  • 8 篇 fu yongquan
  • 7 篇 mei wen
  • 7 篇 peng yuxing
  • 7 篇 tan qingping
  • 6 篇 jinshu su
  • 6 篇 su jinshu
  • 6 篇 shi peichang
  • 6 篇 kele xu
  • 6 篇 wang yi-jie

语言

  • 261 篇 英文
  • 23 篇 中文
  • 1 篇 其他
检索条件"机构=National Key Lab of Parallel and Distributed Processing"
285 条 记 录,以下是101-110 订阅
排序:
Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc Networks
Media Access Control Protocol Based on Hybrid Antennas in Ad...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yanrong Ding Xiaodong Wang Hu Shen Pengyu Guo National Key Laboratory for Parallel and Distributed Processing Changsha China
Nested Circular Directional MAC, a modified medium access control protocol of DMAC protocol, is proposed in this paper to support both directional antennas and omni-directional antennas simultaneously in one Ad Hoc ne... 详细信息
来源: 评论
CD-Sched: An Automated Scheduling Framework for Accelerating Neural Network Training on Shared Memory CPU-DSP Platforms  23
CD-Sched: An Automated Scheduling Framework for Accelerating...
收藏 引用
Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking Technologies
作者: Yuanyuan Xiao Zhiquan Lai Dongsheng Li National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology China
DSP holds significant potential for important applications in Deep Neural Networks. However, there is currently a lack of research focused on shared-memory CPU-DSP heterogeneous chips. This paper proposes CD-Sched, an... 详细信息
来源: 评论
A load balancing-supported constant degree DHT ID assignment method
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第11期38卷 2649-2654页
作者: Wang, Xiao-Hai Peng, Yu-Xing Li, Dong-Sheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
A Load Balancing-Supported ID assignment method is the foundation to implement and maintain DHT overlays, realized constant degree DHTs usually use simple pure centralized or distributed ID management strategies, whic... 详细信息
来源: 评论
Temporal Inconsistency-Based Intrinsic Reward for Multi-Agent Reinforcement Learning
Temporal Inconsistency-Based Intrinsic Reward for Multi-Agen...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Shaoqi Sun Kele Xu National Key Lab of Parallel and Distributed Processing National University of Defense Technology Changsha China
Multi-agent reinforcement learning (MARL) has shown promising results in many challenging sequential decision-making tasks. Recently, deep neural networks have dominated this field. However, the policy networks of age...
来源: 评论
Using NMFAS to identify key biological pathways associated with human diseases
Using NMFAS to identify key biological pathways associated w...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Guo, Hao Zhu, Yunping Li, Dong He, Fuchu Liu, Qijun State Key Laboratory of Proteomics Beijing Proteome Research Centre Beijing Institute of Radiation Medicine Beijing China National Laboratory for Parallel and Distributed Processing National University of Deference and Technology Changsha China
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde... 详细信息
来源: 评论
Two improved GPU acceleration strategies for force-directed graph layout
Two improved GPU acceleration strategies for force-directed ...
收藏 引用
International Conference on Computer Application and System Modeling (ICCASM)
作者: Yong-Xian Wang Zong-Zhe Li Lu Yao Wei Cao Zheng-Hua Wang National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Force directed approach is one of the most widely used methods in graph drawing research. However, the running time is increased intolerablely along with the enlargement of the graph size, which restricts the algorith... 详细信息
来源: 评论
Understanding User Interests Acquisition in Personalized Online Course Recommendation
Understanding User Interests Acquisition in Personalized Onl...
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Li, Xiao Wang, Ting Wang, Huaimin Tang, Jintao Information Center National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
MOOCs have attracted a large number of learners with different education background all over the world. Despite its increasing popularity, MOOCs still suffer from the problem of high drop-out rate. One important reaso... 详细信息
来源: 评论
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
A novel hybrid architecture for high speed regular expression matching  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Xu, Chengcheng Zhao, Baokang Chen, Shuhui Su, Jinshu College of Computer National University of Defense Technology No. 137 Yanwachi Street ChangshaHunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Mobile devices play an important role in our everyday lives, but they also bring great security threats. Deep packet inspection (DPI) is one of the most efficient methods to detect the malicious information hidden in ... 详细信息
来源: 评论
An optimized method for automatic test oracle generation from real-time specification
An optimized method for automatic test oracle generation fro...
收藏 引用
IEEE International Conference on Engineering of Complex Computer Systems
作者: Xin Wang Zhi-Chang Qi Shuhao Li National Laboratory for Parallel and Distributed Processing Changsha China National Lab. for Parallel & Distributed Process. Changsha China
Test oracles are widely used to verify whether a system under test is running as desired. Since the correctness of real-time systems depends on the logical results of the computation and the time when results are prod... 详细信息
来源: 评论