咨询与建议

限定检索结果

文献类型

  • 847 篇 会议
  • 288 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 722 篇 工学
    • 567 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 130 篇 信息与通信工程
    • 80 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 54 篇 生物工程
    • 53 篇 机械工程
    • 40 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 19 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 12 篇 力学(可授工学、理...
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 276 篇 理学
    • 174 篇 数学
    • 57 篇 生物学
    • 47 篇 物理学
    • 38 篇 系统科学
    • 38 篇 统计学(可授理学、...
    • 23 篇 化学
  • 181 篇 管理学
    • 123 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 170 篇 national laborat...
  • 134 篇 science and tech...
  • 102 篇 college of compu...
  • 91 篇 national laborat...
  • 79 篇 national laborat...
  • 39 篇 school of comput...
  • 37 篇 national laborat...
  • 29 篇 national key lab...
  • 23 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 17 篇 laboratory of di...
  • 16 篇 national laborat...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 college of compu...

作者

  • 44 篇 yong dou
  • 42 篇 wang huaimin
  • 39 篇 li dongsheng
  • 39 篇 dou yong
  • 38 篇 liu jie
  • 37 篇 dongsheng li
  • 36 篇 wang ji
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 29 篇 xiaodong wang
  • 28 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,038 篇 英文
  • 55 篇 中文
  • 45 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing"
1138 条 记 录,以下是721-730 订阅
排序:
Detecting faults by tracing companion states in cloud computing systems
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第5期35卷 856-870页
作者: Rao, Xiang Wang, Huai-Min Chen, Zhen-Bang Zhou, Yang-Fan Cai, Hua Zhou, Qi Sun, Ting-Tao National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China Department of Computing Platform Alibaba Cloud Computing Company Hangzhou 310011 China
A common way to construct a fault model is injecting the fault into the system and observing the subsequent symptoms, e. g. event logs. However, fault features would vary during the propagation period, and present dif... 详细信息
来源: 评论
Server-uncertain spectrum trading in cognitive radio networks: A queueing-theoretic modeling approach
Server-uncertain spectrum trading in cognitive radio network...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Department of Network Engineering College of Computer National University of Defense Technology Changsha China
Spectrum trading is the promising method to improve spectrum efficiency from the perspective of economics. In this paper we propose a queueing-theory based spectrum trading model, where the primary user plays the serv... 详细信息
来源: 评论
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论
DMSS: A Dynamic Memory Scheduling System in Server Consolidation Environments
DMSS: A Dynamic Memory Scheduling System in Server Consolida...
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Lanzheng Liu Rui Chu Yongchun Zhu Pengfei Zhang Liufeng Wang National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Systems and Technology Group IBM China Beijing China
As the foundation of cloud computing, Server consolidation allows multiple computer infrastructures running as virtual machines in a single physical node. It improves the utilization of most kinds of resource but memo... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yunlong Wu Chen Chen Huiquan Wang Jie Zhou Xinhai Xu National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan P. R. China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on Malicious Code Detection Based on Least-squares Estimation
Research on Malicious Code Detection Based on Least-squares ...
收藏 引用
International Conference on Computer Science and Electronics Engineering (ICCSEE)
作者: Yunlong Wu Chen Chen Huiquan Wang Xinhai Xu Jie Zhou National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan P. R. China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairne...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Networks Engineering School of Computer National University of Defense Technology Changsha China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
Multi-core optimization for conjugate gradient benchmark on heterogeneous processors
收藏 引用
Journal of Central South University 2011年 第2期18卷 490-498页
作者: 邓林 窦勇 National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Developing parallel applications on heterogeneous processors is facing the challenges of 'memory wall',due to limited capacity of local storage,limited bandwidth and long latency for memory access. Aiming at t... 详细信息
来源: 评论
Intention oriented itinerary recommendation by bridging physical trajectories and online social networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 159-168页
作者: Meng, Xiang-Xu Wang, Xiao-Dong Zhou, Xing-Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Human itineraries are often initiated by some general intentions and will be optimized after considering all kinds of constraints and available information. This paper proposes a category-based itinerary recommendatio... 详细信息
来源: 评论
Jammer Localization for Wireless Sensor Networks
收藏 引用
电子学报(英文版) 2011年 第4期20卷 735-738页
作者: SUN Yanqiang WANG Xiaodong ZHOU Xingming National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
Jamming attack can severely affect the performance of Wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, we in this paper propose a jammer ... 详细信息
来源: 评论