咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 298 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,147 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 732 篇 工学
    • 577 篇 计算机科学与技术...
    • 423 篇 软件工程
    • 131 篇 信息与通信工程
    • 81 篇 电子科学与技术(可...
    • 77 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 42 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 279 篇 理学
    • 176 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 186 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 16 篇 laboratory of di...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...

作者

  • 44 篇 wang huaimin
  • 43 篇 yong dou
  • 40 篇 li dongsheng
  • 38 篇 dou yong
  • 38 篇 liu jie
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 30 篇 wang yijie
  • 29 篇 xiaodong wang
  • 27 篇 yin gang
  • 26 篇 peng yuxing
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,073 篇 英文
  • 63 篇 中文
  • 11 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing"
1147 条 记 录,以下是21-30 订阅
排序:
Highly parallelized Reinforcement Learning Training with Relaxed Assignment Dependencies
arXiv
收藏 引用
arXiv 2025年
作者: He, Zhouyu Qiao, Peng Li, Rongchun Dou, Yong Tan, Yusong College of Computer Science and Technology National University of Defense Technology China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China
As the demands for superior agents grow, the training complexity of Deep Reinforcement Learning (DRL) becomes higher. Thus, accelerating training of DRL has become a major research focus. Dividing the DRL training pro... 详细信息
来源: 评论
Open source oriented cross-platform survey
收藏 引用
Information and Software Technology 2025年 182卷
作者: Yao, Simeng Zhang, Xunhui Zhang, Yang Wang, Tao College of Computer Science and Technology National University of Defense Technology Changsha410073 China State Key Laboratory of Complex & Critical Software Environment Changsha410073 China National Key Laboratory of Parallel and Distributed Computing Changsha410073 China
Context: Open-source software development has become a widely adopted approach to software creation. However, developers’ activities extend beyond social coding platforms (e.g., GitHub), encompassing social Q&A p... 详细信息
来源: 评论
Deep Time Series Anomaly Detection with Local Temporal Pattern Learning
Deep Time Series Anomaly Detection with Local Temporal Patte...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Yizhou Li Yijie Wang Hongzuo Xu Xiaohui Zhou National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised time series anomaly detection (TSAD) demonstrates remarkable performance improvement by extracting high-level data semantics through proxy tasks. Nonetheless, most existing self-supervised TSAD techniq... 详细信息
来源: 评论
A Counterfactual Ultrasound Anti-Interference Self-Supervised Network for B-mode Ultrasound Tongue Extraction
A Counterfactual Ultrasound Anti-Interference Self-Supervise...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Yan Jia Yuqing Cheng Kele Xu Yong Dou Peng Qiao Zhouyu He National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Systems Engineering National University of Defense Technology Changsha China
B-mode ultrasound tongue imaging is a non-invasive and real-time method for visualizing vocal tract deformation. However, accurately extracting the tongue’s surface contour remains a significant challenge due to the ... 详细信息
来源: 评论
Graph Structure Learning via Transfer Entropy for Multivariate Time Series Anomaly Detection
Graph Structure Learning via Transfer Entropy for Multivaria...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Mingyu Liu Yijie Wang Xiaohui Zhou Yongjun Wang National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology National University of Defense Technology Changsha China
Multivariate time series anomaly detection (MTAD) poses a challenge due to temporal and feature dependencies. The critical aspects of enhancing the detection performance lie in accurately capturing the dependencies be... 详细信息
来源: 评论
A Unified Co-Processor Architecture for Matrix Decomposition
收藏 引用
Journal of Computer Science & Technology 2010年 第4期25卷 874-885页
作者: 窦勇 周杰 邬贵明 姜晶菲 雷元武 倪时策 National Laboratory for Parallel & Distributed Processing National University of Defense Technology National Laboratory for Parallel & Distributed Processing.National University of Defense Technology
QR and LU decompositions are the most important matrix decomposition algorithms. Many studies work on accelerating these algorithms by FPGA or ASIC in a case by case style. In this paper, we propose a unified framewor... 详细信息
来源: 评论
Demand-Driven Memory Leak Detection Based on Flow-and Context-Sensitive Pointer Analysis
收藏 引用
Journal of Computer Science & Technology 2009年 第2期24卷 347-356页
作者: 王戟 马晓东 董威 徐厚峰 刘万伟 National Laboratory for Parallel and Distributed Processing National University of Defense Technology
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point... 详细信息
来源: 评论
Growing construction and adaptive evolution of complex software systems
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 5-7页
作者: Huaimin WANG Bo DING National Key Laboratory of Parallel and Distributed Processing College of ComputerNational University of Defense Technology
distributed software systems are becoming more and more complex *** is easy to find a huge amount of computing nodes in a nationwide or global information *** example,We Chat(Wei Xin),a well-known mobile application i... 详细信息
来源: 评论
Efficient Multi-Tenant Virtual Machine Allocation in Cloud Data Centers
收藏 引用
Tsinghua Science and Technology 2015年 第1期20卷 81-89页
作者: Jiaxin Li Dongsheng Li Yuming Ye Xicheng Lu the National Key Laboratory of Parallel and Distributed Processing (PDL) College of Computer National University of Defense Technology
Virtual Machine(VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and th... 详细信息
来源: 评论
MABP: an optimal resource allocation approach in data center networks
收藏 引用
Science China(Information Sciences) 2014年 第10期57卷 230-245页
作者: LI XiaoLing WANG HuaiMin DING Bo LI XiaoYong National Key Laboratory for Parallel and Distributed Processing School of ComputerNational University of Defense Technology
In data center networks, resource allocation based on workload is an effective way to allocate the infrastructure resources to diverse cloud applications and satisfy the quality of service for the users, which refers ... 详细信息
来源: 评论