咨询与建议

限定检索结果

文献类型

  • 849 篇 会议
  • 290 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 723 篇 工学
    • 568 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 132 篇 信息与通信工程
    • 80 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 54 篇 生物工程
    • 53 篇 机械工程
    • 40 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 12 篇 力学(可授工学、理...
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 276 篇 理学
    • 174 篇 数学
    • 57 篇 生物学
    • 47 篇 物理学
    • 38 篇 系统科学
    • 38 篇 统计学(可授理学、...
    • 22 篇 化学
  • 182 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 168 篇 national laborat...
  • 134 篇 science and tech...
  • 102 篇 college of compu...
  • 88 篇 national laborat...
  • 79 篇 national laborat...
  • 37 篇 school of comput...
  • 37 篇 national laborat...
  • 28 篇 national key lab...
  • 24 篇 national key lab...
  • 22 篇 science and tech...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 17 篇 laboratory of di...
  • 16 篇 national laborat...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 college of compu...
  • 13 篇 school of comput...

作者

  • 44 篇 yong dou
  • 42 篇 wang huaimin
  • 40 篇 li dongsheng
  • 39 篇 dongsheng li
  • 39 篇 dou yong
  • 39 篇 liu jie
  • 36 篇 wang ji
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 xiaodong wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 28 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,030 篇 英文
  • 56 篇 其他
  • 56 篇 中文
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing"
1142 条 记 录,以下是801-810 订阅
排序:
Minimizing redundant paths for coding-based IP congestion control
Minimizing redundant paths for coding-based IP congestion co...
收藏 引用
International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Yuan Yuan Shengyun Liu Yuxing Peng National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China
Network coding brings a new solution for IP congestion control, since more than one buffered packets can be encoded together and removed as a coded packet. This may significantly decrease the packet loss during the co... 详细信息
来源: 评论
Error Detection by Redundant Transaction in Transactional Memory System
Error Detection by Redundant Transaction in Transactional Me...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Wei Song Jia Jia Yu-xing Peng National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
This paper addresses the issue of error detection in transactional memory, and proposes a new method of error detection based on redundant transaction (EDRT). This method creates a transaction copy for every transacti... 详细信息
来源: 评论
TRUSTIE: Design of a Trustworthy Software Production Environment
TRUSTIE: Design of a Trustworthy Software Production Environ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huaimin Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Internet fundamentally changes the model of software development, the demands of software quality, and the process of software resource sharing. Internet- based environment for trustworthy software production is recog... 详细信息
来源: 评论
Understanding How Non-uniform Distribution of Memory Accesses on Cache Sets Affects the System Performance of Chip Multiprocessors
Understanding How Non-uniform Distribution of Memory Accesse...
收藏 引用
IEEE International Symposium on parallel and distributed processing with Applications Workshops (ISPAW)
作者: Xiaomin Jia Jiang Jiang Xiaoqiang Ni Tianlei Zhao Shubo Qi Guitao Fu Minxuan Zhang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Non-uniform distribution of memory accesses across cache sets has been recognized as one of the sources of inefficiency of cache architecture on single-core platform. Several schemes target the problem for performance... 详细信息
来源: 评论
NBHU-based Method to Counter Quiet DDoS Attacks
NBHU-based Method to Counter Quiet DDoS Attacks
收藏 引用
2011 International Conference on Computer Science and Network Technology(2011计算机科学与网络技术国际会议 ICCSNT 2011)
作者: Jing Zhang Lin Chen Huaping Hu Hui Liu Computer School National University of Defense Technology Changsha China State Key Laboratory on Parallel and Distributed Processing National University of Defense Technolog
The Quiet DDoS attack becomes one of the most severely threat to the network safety, because this kind of attack completely adopts legal TCP flow while distributing its destination IP to evade various countermeasu... 详细信息
来源: 评论
Research on Online Failure Prediction Model and Status Pretreatment Method for Exascale System
Research on Online Failure Prediction Model and Status Pretr...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Hao Zhou Yanhuang Jiang National Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executin... 详细信息
来源: 评论
Coordinate strip-mining and kernel fusion to lower power consumption on GPU
Coordinate strip-mining and kernel fusion to lower power con...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Guibin Wang National Laboratory of Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Although general purpose GPUs have relatively high computing capacity, they also introduce high power consumption compared with general purpose CPUs. Therefore low-power techniques targeted for GPUs will be one of the... 详细信息
来源: 评论
Fault recovery based on parallel recomputing in transactional memory system
收藏 引用
Lecture Notes in Electrical Engineering 2011年 98卷 995-1002页
作者: Song, Wei Jia, Jia National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha410073 China
This paper addresses the issue of fault recovery in transactional memory, and proposes a method of fault recovery based on parallel recomputing in transactional memory system. This method utilizes the dataversioning m... 详细信息
来源: 评论
A Hierarchical Memory Service Mechanism in Server Consolidation Environment
A Hierarchical Memory Service Mechanism in Server Consolidat...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Liufeng Wang Huaimin Wang Lu Cai Rui Chu Pengfei Zhang Lanzheng Liu National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China School of Economics and Management Xi'an University Xi'an China
Increasing Internet business and computing footprint motivate server consolidation in data centers. Through virtualization technology, server consolidation can reduce physical hosts and provide scalable services. Howe... 详细信息
来源: 评论
Context-Aware Scheduling in Wireless Networks with Successive Interference Cancellation
Context-Aware Scheduling in Wireless Networks with Successiv...
收藏 引用
IEEE International Conference on Communications Workshops
作者: Shaohe Lv Weihua Zhuang Xiaodong Wang Xingming Zhou National Laboratory of Parallel and Distributed Processing National University of Defense Technology Department of Electrical and Computer Engineering University of Waterloo
We consider the greedy scheduling based on the physical model in wireless networks with successive interference cancellation (SIC). There are two major stages in a scheduling scheme, link selection (to decide which li... 详细信息
来源: 评论