咨询与建议

限定检索结果

文献类型

  • 845 篇 会议
  • 293 篇 期刊文献

馆藏范围

  • 1,138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 572 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 130 篇 信息与通信工程
    • 81 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 41 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 279 篇 理学
    • 176 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 185 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 16 篇 laboratory of di...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...

作者

  • 42 篇 yong dou
  • 42 篇 wang huaimin
  • 39 篇 li dongsheng
  • 38 篇 dou yong
  • 37 篇 liu jie
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 29 篇 xiaodong wang
  • 29 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xingming zhou

语言

  • 1,065 篇 英文
  • 63 篇 中文
  • 10 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing"
1138 条 记 录,以下是191-200 订阅
排序:
A multidimensional approach of evaluating developers  2020
A multidimensional approach of evaluating developers
收藏 引用
2nd International Conference on Big Data Engineering, BDE 2020
作者: Zhang, Changqiang Chen, Ming Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology China
In this paper, we propose an approach to assess the ability of developers based on their behavior data from OSS. Specifically, we classify developers' ability into code ability, project management ability, and soc... 详细信息
来源: 评论
Modeling Full Information with Graph Network for Joint Entity-Relation Extraction  21
Modeling Full Information with Graph Network for Joint Entit...
收藏 引用
Proceedings of the 2021 4th International Conference on Algorithms, Computing and Artificial Intelligence
作者: Qian Wan Luona Wei Xinhai Chen Jie Liu Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology China College of Systems Engineering National University of Defense Technology China Laboratory of Software Engineering for Complex Systems National University of Defense Technology China
Fully capturing contextual information and analyzing the association between entity semantics and type is helpful for joint extraction task: 1) The context can reflect the part of speech and semantics of entity. 2) Th... 详细信息
来源: 评论
PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain
PPSS: A Privacy-Preserving Supervision Scheme Based on Block...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Ming Chen Peichang Shi Xiang Fu Feng Jiang Fei Gao Penghui Ma Jinzhu Kong National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Kylin Software Co.LTD Changsha China Zhejiang Lab Hangzhou China
In JointCloud Computing, multi-party participation introduces complexity and uncertainty. For all participants in JointCloud Computing, both continuous supervision and necessary privacy protection are required. Tradit... 详细信息
来源: 评论
A Memory Saving Mechanism Based on Data Transferring for Pipeline parallelism
A Memory Saving Mechanism Based on Data Transferring for Pip...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Wei Jiang Rui Xu Sheng Ma Qiong Wang Xiang Hou Hongyi Lu Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
The correctness and robustness of the neural network model are usually proportional to its depth and width. Currently, the neural network models become deeper and wider to cope with complex applications, which leads t... 详细信息
来源: 评论
A pipelining strategy for accelerating convolutional networks on arm processors  10th
A pipelining strategy for accelerating convolutional network...
收藏 引用
10th International Symposium on parallel Architectures, Algorithms and Programming, PAAP 2019
作者: Zhou, Xin Li, Rongchun Zhang, Peng Liu, Yuntao Dou, Yong National Key Laboratory for Parallel and Distribution Processing National University of Defense Technology Changsha450001 China
Convolutional neural networks (CNN) is playing an important role in many fields. Many applications are able to run the inference process of CNN with pre-trained models on mobile devices in these days. Improving perfor... 详细信息
来源: 评论
Multi-task Pre-training Language Model for Semantic Network Completion
arXiv
收藏 引用
arXiv 2022年
作者: Li, Da Yang, Sen Xu, Kele Yi, Ming He, Yukai Wang, Huaimin Tencent Beijing100084 China Beijing Institute of Microbiology and Epidemiology Beijing100071 China State Key Laboratory of Pathogen and Biosecurity Beijing100071 China National University of Defense Technology Changsha410073 China National Key Lab of Parallel and Distributed Processing Changsha410073 China
Semantic networks, such as the knowledge graph, can represent the knowledge leveraging the graph structure. Although the knowledge graph shows promising values in natural language processing, it suffers from incomplet... 详细信息
来源: 评论
Co-designing the Topology/Algorithm to Accelerate distributed Training
Co-designing the Topology/Algorithm to Accelerate Distribute...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Xiang Hou Rui Xu Sheng Ma Qiong Wang Wei Jiang Hongyi Lu Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
With the development of Deep Learning (DL), Deep Neural Network (DNN) models have become more complex. At the same time, the development of the Internet makes it easy to obtain large data sets for DL training. Large-s... 详细信息
来源: 评论
Surrogate Supervision-based Deep Weakly-supervised Anomaly Detection
Surrogate Supervision-based Deep Weakly-supervised Anomaly D...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Zhiyue Wu Hongzuo Xu Yijie Wang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Many anomaly detection applications can provide partially observed anomalies, but only limited work is for this setting. Additionally, a number of anomaly detectors focus on learning a particular model of normal/abnor... 详细信息
来源: 评论
Word Embedding-based Context-sensitive Network Flow Payload Anomaly Detection
Word Embedding-based Context-sensitive Network Flow Payload ...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Yizhou Li Yijie Wang Li Cheng Hongzuo Xu Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Payload anomaly detection can discover malicious behaviors hidden in network packets. It is hard to handle payload due to its various possible characters and complex semantic context, and thus identifying abnormal pay... 详细信息
来源: 评论
Fden: Mining Effective Information of Features in Detecting Network Anomalies
Fden: Mining Effective Information of Features in Detecting ...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Bin Li Yijie Wang Mingyu Liu Kele Xu Zhongyang Wang Li Cheng Yizhou Li Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Network anomaly detection is important for detecting and reacting to the presence of network attacks. In this paper, we propose a novel method to effectively leverage the features in detecting network anomalies, named... 详细信息
来源: 评论