咨询与建议

限定检索结果

文献类型

  • 290 篇 会议
  • 133 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 425 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 280 篇 工学
    • 224 篇 计算机科学与技术...
    • 163 篇 软件工程
    • 68 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 30 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 冶金工程
  • 120 篇 理学
    • 76 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 16 篇 物理学
    • 11 篇 化学
  • 80 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 computational mo...
  • 14 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 10 篇 computer archite...
  • 10 篇 semantics
  • 9 篇 laboratories
  • 9 篇 kernel
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 training
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 national key lab...
  • 21 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 national laborat...
  • 6 篇 national key lab...
  • 6 篇 college of compu...
  • 6 篇 laboratory of di...
  • 5 篇 school of advanc...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 9 篇 ding bo
  • 9 篇 fu yongquan
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 7 篇 dongsheng li
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 wang yi-jie
  • 6 篇 sikun li

语言

  • 396 篇 英文
  • 26 篇 中文
  • 3 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
425 条 记 录,以下是241-250 订阅
排序:
Stigmergic Collaboration: A Sign-Based Perspective of Stigmergy
Stigmergic Collaboration: A Sign-Based Perspective of Stigme...
收藏 引用
2010 International Conference on Intelligent Computation Technology and Automation(2010 智能计算技术与自动化国际会议 ICICTA 2010)
作者: Chuanjun Ren Hongbing Huang Shiyao Jin National Laboratory for Parallel & Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Insects build architecturally complex nests and search for remote food by collaboration work despite their limited sensors, minimal individual intelligence and the lack of a central control system. Insets' co... 详细信息
来源: 评论
Properties and applications of octonion fractional Fourier transform for 3-D octonion signals
收藏 引用
Digital Signal processing 2025年 165卷
作者: Xi Yang Qiang Feng Nan Jiang Mohammad Younus Bhat Didar Urynbassarova School of Mathematics and Computer Science Yanan University Yanan Shanxi 716000 China Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data Yanan Shanxi 716000 China Department of Mathematical Sciences Islamic University of Science and Technology Kashmir 192122 India National Engineering Academy of the Republic of Kazakhstan Almaty 050000 Kazakhstan
In the field of signal processing, especially when dealing with complex signals and multidimensional data analysis requirements, traditional transformation methods often struggle to meet practical application needs. A... 详细信息
来源: 评论
Surrogate Supervision-based Deep Weakly-supervised Anomaly Detection
Surrogate Supervision-based Deep Weakly-supervised Anomaly D...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Zhiyue Wu Hongzuo Xu Yijie Wang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Many anomaly detection applications can provide partially observed anomalies, but only limited work is for this setting. Additionally, a number of anomaly detectors focus on learning a particular model of normal/abnor... 详细信息
来源: 评论
Word Embedding-based Context-sensitive Network Flow Payload Anomaly Detection
Word Embedding-based Context-sensitive Network Flow Payload ...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Yizhou Li Yijie Wang Li Cheng Hongzuo Xu Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Payload anomaly detection can discover malicious behaviors hidden in network packets. It is hard to handle payload due to its various possible characters and complex semantic context, and thus identifying abnormal pay... 详细信息
来源: 评论
Fden: Mining Effective Information of Features in Detecting Network Anomalies
Fden: Mining Effective Information of Features in Detecting ...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Bin Li Yijie Wang Mingyu Liu Kele Xu Zhongyang Wang Li Cheng Yizhou Li Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Network anomaly detection is important for detecting and reacting to the presence of network attacks. In this paper, we propose a novel method to effectively leverage the features in detecting network anomalies, named... 详细信息
来源: 评论
A Scalable and Flexible Monitoring System Framework for Supercomputers
A Scalable and Flexible Monitoring System Framework for Supe...
收藏 引用
2017 International Conference on computer, Electronics and Communication Engineering(CECE2017)
作者: Tong XIAO Kai LU College of Computer National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology
Mankind's demand for more powerful computing capabilities is never met, which has led to the continuous improvement of supercomputers' performance. A more powerful supercomputer tends to have a larger system s... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
International Conference on Computational Intelligence and Natural Computing, CINC
作者: Zheng-Fei Wang Ai-Guo Tang National Key Laboratory of Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Computer Hunan Business College Changsha China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
An Irregular cutting based distributed mapping algorithm for DVE systems
An Irregular cutting based distributed mapping algorithm for...
收藏 引用
Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA
作者: Wei Zhang Hangjun Zhou Yuxing Peng Sikun Li Min Xi National Laboratory of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China Department of Computer Science Xi'an Jiaotong University Xi'an China
distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world in... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
作者: Ming Li Bo Liu Guangsheng Xing Xiaodong Wang Zhihui Wang College of Intelligence Science and Technology National University of Defence Technology National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
SCQR - A P2P Query Routing Algorithm Based on Semantic Cluster
SCQR - A P2P Query Routing Algorithm Based on Semantic Clust...
收藏 引用
International Symposium on Intelligent Ubiquitous Computing and Education
作者: Shiyao Jin Gui-Ming Zhu School of Computer Science National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
The low efficiency and uncertainty routing is correct is a problem for resource location of an unstructured p2p network. It is hard to achieve high query hit with small cost and low latency for such kind of network. I... 详细信息
来源: 评论