咨询与建议

限定检索结果

文献类型

  • 290 篇 会议
  • 133 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 425 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 280 篇 工学
    • 224 篇 计算机科学与技术...
    • 163 篇 软件工程
    • 68 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 30 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 冶金工程
  • 120 篇 理学
    • 76 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 16 篇 物理学
    • 11 篇 化学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 computational mo...
  • 14 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 10 篇 computer archite...
  • 10 篇 semantics
  • 9 篇 laboratories
  • 9 篇 kernel
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 training
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 national key lab...
  • 21 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 national laborat...
  • 6 篇 national key lab...
  • 6 篇 college of compu...
  • 6 篇 laboratory of di...
  • 5 篇 school of advanc...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 9 篇 ding bo
  • 9 篇 fu yongquan
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 7 篇 dongsheng li
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 wang yi-jie
  • 6 篇 sikun li

语言

  • 396 篇 英文
  • 26 篇 中文
  • 3 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
425 条 记 录,以下是131-140 订阅
排序:
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Tree-structured bloom filters for joint optimization of false positive probability and transmission bandwidth
Tree-structured bloom filters for joint optimization of fals...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Fu, Yongquan Biersack, Ernst Science and Technology Laboratory of Parallel and Distributed Processing School of Computer National Univ. of Defense Technology China Www.e-biersack.eu France
Bloom filters are frequently used to perform set queries that test the existence of some items. However, Bloom filters face a dilemma: the transmission bandwidth and the accuracy cannot be optimized simultaneously. Th... 详细信息
来源: 评论
FedEAE: Federated Learning Based Privacy-Preserving Event Argument Extraction  12th
FedEAE: Federated Learning Based Privacy-Preserving Event Ar...
收藏 引用
12th national CCF Conference on Natural Language processing and Chinese Computing, NLPCC 2023
作者: Hu, Fei Dong, Shenpo Chang, Tao Zhou, Jie Li, Haili Wang, Jingnan Chen, Rui Liu, Haijiao Wang, Xiaodong National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Benefiting from Pre-trained Language Model (PLM), Event Argument Extraction (EAE) methods have achieved SOTA performance in general scenarios of Event Extraction (EE). However, with increasing concerns and regulations... 详细信息
来源: 评论
Inducing taxonomy from tags: An agglomerative hierarchical clustering framework
Inducing taxonomy from tags: An agglomerative hierarchical c...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Li, Xiang Wang, Huaimin Yin, Gang Wang, Tao Yang, Cheng Yu, Yue Tang, Dengqing National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China College of Mechatronics Engineering and Automation National University of Defense Technology Changsha China
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte... 详细信息
来源: 评论
Deep learning for social network information cascade analysis: A survey  5
Deep learning for social network information cascade analysi...
收藏 引用
5th IEEE International Conference on Data science in Cyberspace, DSC 2020
作者: Gao, Liqun Zhou, Bin Jia, Yan Tu, Hongkui Wang, Ye Chen, Chenguang Wang, Haiyang Zhuang, Hongwu National University of Defense Technology College of Computer ChangSha China National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory ChangSha China
The phenomenon of information dissemination in social networks is widespread, and Social Network Information Cascade Analysis (SNICA) aims to acquire valuable knowledge in the process of information dissemination in s... 详细信息
来源: 评论
A knowledge graph embedding method based on neural network  5
A knowledge graph embedding method based on neural network
收藏 引用
5th IEEE International Conference on Data science in Cyberspace, DSC 2020
作者: Li, Chenchen Li, Aiping Tu, Hongkui Wang, Ye Wang, Changhai National University of Defense Technology College of Computer ChangSha China National University of Defense Technology College of Computer Science and Technology on Parallel and Distributed Processing Laboratory ChangSha China
As the basis of many knowledge graph completion tasks, the embedding representation of entities and relations in knowledge graph (KG) is an important task in the fields of Natural Language processing (NLP) and Artific... 详细信息
来源: 评论
Unified Contextualized Knowledge Embedding Method for Static and Temporal Knowledge Graph
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language processing 2024年 33卷 82-95页
作者: Gao, Yifu Qiao, Linbo Huang, Zhen Kan, Zhigang He, Yongquan Li, Dongsheng National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology Changsha410000 China Intelligent Game and Decision Lab Beijing China Meituan Beijing100102 China
Recent years, there is a growing interest in knowledge graph embedding (KGE), which maps symbolic entities and relations into low-dimensional vector space to effectively represent structured data from the knowledge gr... 详细信息
来源: 评论
A survey on approaches and applications of knowledge representation learning  5
A survey on approaches and applications of knowledge represe...
收藏 引用
5th IEEE International Conference on Data science in Cyberspace, DSC 2020
作者: Li, Chenchen Li, Aiping Wang, Ye Tu, Hongkui Song, Yichen National University of Defense Technology College of Computer ChangSha China National University of Defense Technology College of Computer Science and Technology on Parallel and Distributed Processing Laboratory ChangSha China
Knowledge representation learning (KRL) is one of the important research topics in artificial intelligence and Natural language processing. It can efficiently calculate the semantics of entities and relations in a low... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论