咨询与建议

限定检索结果

文献类型

  • 201 篇 会议
  • 100 篇 期刊文献

馆藏范围

  • 301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 196 篇 工学
    • 158 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 36 篇 信息与通信工程
    • 23 篇 生物工程
    • 22 篇 控制科学与工程
    • 17 篇 机械工程
    • 17 篇 电子科学与技术(可...
    • 8 篇 电气工程
    • 8 篇 化学工程与技术
    • 7 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 5 篇 土木工程
    • 5 篇 农业工程
    • 4 篇 建筑学
    • 4 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 航空宇航科学与技...
  • 81 篇 理学
    • 46 篇 数学
    • 24 篇 生物学
    • 12 篇 物理学
    • 11 篇 统计学(可授理学、...
    • 9 篇 化学
    • 8 篇 系统科学
  • 63 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 教育学
    • 5 篇 教育学
  • 5 篇 农学
    • 4 篇 作物学
  • 3 篇 医学
  • 2 篇 法学
  • 1 篇 文学

主题

  • 8 篇 semantics
  • 7 篇 deep neural netw...
  • 7 篇 computational mo...
  • 7 篇 performance eval...
  • 7 篇 cloud computing
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 laboratories
  • 6 篇 benchmark testin...
  • 6 篇 distributed proc...
  • 6 篇 feature extracti...
  • 5 篇 programming
  • 5 篇 computer archite...
  • 5 篇 knowledge graph
  • 5 篇 servers
  • 5 篇 wireless sensor ...
  • 5 篇 machine learning
  • 5 篇 kernel
  • 5 篇 hardware
  • 5 篇 graphics process...

机构

  • 31 篇 college of compu...
  • 29 篇 national key lab...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 school of comput...
  • 7 篇 xiangjiang lab
  • 7 篇 laboratory of di...
  • 6 篇 college of compu...
  • 6 篇 national laborat...
  • 6 篇 science and tech...
  • 6 篇 national key lab...
  • 5 篇 key laboratory o...
  • 5 篇 school of advanc...

作者

  • 23 篇 li dongsheng
  • 18 篇 wang yijie
  • 15 篇 dongsheng li
  • 15 篇 ding bo
  • 15 篇 wang huaimin
  • 12 篇 huaimin wang
  • 11 篇 lai zhiquan
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 9 篇 huang zhen
  • 9 篇 xu kele
  • 8 篇 yuxing peng
  • 8 篇 peichang shi
  • 8 篇 wang xiaodong
  • 8 篇 bo ding
  • 8 篇 fu yongquan
  • 7 篇 mei wen
  • 7 篇 xiaodong wang
  • 7 篇 dou yong
  • 7 篇 qiao peng

语言

  • 273 篇 英文
  • 22 篇 中文
  • 6 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed"
301 条 记 录,以下是81-90 订阅
排序:
Research of context situation awareness technology
Research of context situation awareness technology
收藏 引用
作者: Shi, Dianxi Wu, Zhendong Ding, Bo Yan, Huining National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
Resource Allocation with Dynamic Substrate Network in Data Centre Networks
收藏 引用
China Communications 2013年 第9期10卷 130-142页
作者: 李小玲 王怀民 丁博 李小勇 刘惠 National Key Laboratory for Parallel and Distributed Processing School of Computer ScienceNational University of Defense Technology
The resource allocation problem in data centre networks refers to a map of the workloads provided by the cloud users/tenants to the Substrate Network(SN)which are provided by the cloud *** studies consider the dynamic... 详细信息
来源: 评论
FedEAE: Federated Learning Based Privacy-Preserving Event Argument Extraction  12th
FedEAE: Federated Learning Based Privacy-Preserving Event Ar...
收藏 引用
12th national CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Hu, Fei Dong, Shenpo Chang, Tao Zhou, Jie Li, Haili Wang, Jingnan Chen, Rui Liu, Haijiao Wang, Xiaodong National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Benefiting from Pre-trained Language Model (PLM), Event Argument Extraction (EAE) methods have achieved SOTA performance in general scenarios of Event Extraction (EE). However, with increasing concerns and regulations... 详细信息
来源: 评论
BCE: A privacy-preserving common-friend estimation method for distributed online social networks without cryptography
BCE: A privacy-preserving common-friend estimation method fo...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed online social networks (DOSN) have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose BCE (Bloom Filter based Common-Friend Est... 详细信息
来源: 评论
On the feasibility of common-friend measurements for the distributed online social networks
On the feasibility of common-friend measurements for the dis...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme th... 详细信息
来源: 评论
parallelization of the training for face detection with transactional memory
Parallelization of the training for face detection with tran...
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Zeng, Kun Key Laboratory and Technology for National Defence of Parallel and Distributed Processing School of Computer National Univiersity of Defense Technology ChangSha Hunan China
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes... 详细信息
来源: 评论
AUModel: A conceptual model for adaptive software  5
AUModel: A conceptual model for adaptive software
收藏 引用
2014 5th IEEE International Conference on Software Engineering and Service Science, ICSESS 2014
作者: Liu, Hui Ding, Bo Shi, Dianxi Wang, Huaimin National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha Hunan410073 China
Pervasive software should be able to adapt itself to the changing environments and user requirements. Obviously, it will bring great challenges to the software engineering practice. This paper proposes AUModel, a conc... 详细信息
来源: 评论
Research on Fine-Grained Sentiment Classification  8th
Research on Fine-Grained Sentiment Classification
收藏 引用
8th CCF International Conference on Natural Language Processing and Chinese Computing, NLPCC 2019
作者: Wang, Zhihui Wang, Xiaodong Chang, Tao Lv, Shaohe Guo, Xiaoting National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
Aiming at the fine-grained sentiment classification that distinguishes the emotional intensity, the commonly used dataset SST-1 is analyzed in depth. Through the analysis, it is found that the dataset has serious prob... 详细信息
来源: 评论
Unified Contextualized Knowledge Embedding Method for Static and Temporal Knowledge Graph
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2024年 33卷 82-95页
作者: Gao, Yifu Qiao, Linbo Huang, Zhen Kan, Zhigang He, Yongquan Li, Dongsheng National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology Changsha410000 China Intelligent Game and Decision Lab Beijing China Meituan Beijing100102 China
Recent years, there is a growing interest in knowledge graph embedding (KGE), which maps symbolic entities and relations into low-dimensional vector space to effectively represent structured data from the knowledge gr... 详细信息
来源: 评论
RScam: Cloud-based anti-malware via reversible sketch  11th
RScam: Cloud-based anti-malware via reversible sketch
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Sun, Hao Wang, Xiaofeng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Cybercrime caused by malware becomes a persistent and damaging threat which makes the trusted security solution urgently demanded, especially for resource-constrained ends. The existing industry and academic approache... 详细信息
来源: 评论