咨询与建议

限定检索结果

文献类型

  • 290 篇 会议
  • 133 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 425 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 280 篇 工学
    • 224 篇 计算机科学与技术...
    • 163 篇 软件工程
    • 68 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 30 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 冶金工程
  • 120 篇 理学
    • 76 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 16 篇 物理学
    • 11 篇 化学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 computational mo...
  • 14 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 10 篇 computer archite...
  • 10 篇 semantics
  • 9 篇 laboratories
  • 9 篇 kernel
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 training
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 national key lab...
  • 21 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 national laborat...
  • 6 篇 national key lab...
  • 6 篇 college of compu...
  • 6 篇 laboratory of di...
  • 5 篇 school of advanc...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 9 篇 ding bo
  • 9 篇 fu yongquan
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 7 篇 dongsheng li
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 wang yi-jie
  • 6 篇 sikun li

语言

  • 396 篇 英文
  • 26 篇 中文
  • 3 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
425 条 记 录,以下是211-220 订阅
排序:
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
International Conference on Information science and Technology (ICIST)
作者: Jiangchao Liu Liqian Chen Longming Dong Ji Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
Compositional Verification of UML Dynamic Models
Compositional Verification of UML Dynamic Models
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Wei Dong Ji Wang Zhichang Qi Ni Rong School of Computer National University of Defense Technology China National Laboratory for Parallel and Distributed Processing China
UML dynamic models are important for software analysis and design. Verifying UML dynamic models to find design errors earlier is a key issue for ensuring software quality. Because of the characteristics such as concur... 详细信息
来源: 评论
DPSS: Dynamic Parameter Selection for Outlier Detection on Data Streams
DPSS: Dynamic Parameter Selection for Outlier Detection on D...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Ruyi Zhang Yijie Wang Haifang Zhou Bin Li Hongzuo Xu Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Outlier detection on data streams identifies unusual states to sense and alarm potential risks and faults of the target systems in both the cyber and physical world. As different parameter settings of machine learning... 详细信息
来源: 评论
Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data
Entropy and Autoencoder-Based Outlier Detection in Mixed-Typ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhongyang Wang Yijie Wang Zhenyu Huang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Mixed-type data containing categorical and numerical features are pervasive in real life, but very limited outlier detection methods are available for these data. Some existing methods handle mixed-type data by featur... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
International Conference on Information science and Technology (ICIST)
作者: Longming Dong Liqian Chen Jiangchao Liu Renjian Li National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
TRUSTIE: Design of a Trustworthy Software Production Environment
TRUSTIE: Design of a Trustworthy Software Production Environ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huaimin Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Internet fundamentally changes the model of software development, the demands of software quality, and the process of software resource sharing. Internet- based environment for trustworthy software production is recog... 详细信息
来源: 评论
Image Annotation by Object Hypotheses-oriented Deep Neural Networks
Image Annotation by Object Hypotheses-oriented Deep Neural N...
收藏 引用
2017 2nd International Conference on Software, Multimedia and Communication Engineering(SMCE 2017)
作者: Fang MA Shao-he LV Ke-xin ZHENG Chi JIN Fei CHEN Ke YANG and Yong DOU National Laboratory for Parallel and Distributed Processing National University of Defense Technology University of South China School of Computer Science and Technology
Image annotation generates a set of semantic labels that describe the contents of an input *** deep learning techniques have achieved significant success in many areas of image *** this paper,we present a multi-label ... 详细信息
来源: 评论
Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly Detection
Attention-based Encoder-Decoder Recurrent Neural Networks fo...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Shang Wu Yijie Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Attack payloads are often short segments hidden in HTTP requests; thus they can be found by HTTP payload anomaly detection. Deep learning models learn data features during training without manual feature extraction, a... 详细信息
来源: 评论
Are filter methods very effective in gene selection of microarray data?
Are filter methods very effective in gene selection of micro...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
作者: Zhou-Jun Li Li-Juan Zhang Huo-Wang Chen School of Computer Science & Engineering Beihang University Beijing China National Laboratory for Parallel and Distributed Processing Changsha China
Feature (gene) selection is a frequently used preprocessing technology for successful cancer classification task in microarray gene expression data analysis. Widely used gene selection approaches are mainly focused on... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论