咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 423 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 273 篇 工学
    • 219 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 68 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 24 篇 生物工程
    • 20 篇 机械工程
    • 13 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 冶金工程
  • 117 篇 理学
    • 75 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 12 篇 化学
  • 78 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 17 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 11 篇 semantics
  • 10 篇 computer archite...
  • 9 篇 laboratories
  • 9 篇 kernel
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 training
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 22 篇 school of comput...
  • 22 篇 national key lab...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 6 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 college of compu...
  • 6 篇 school of softwa...
  • 6 篇 laboratory of di...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 14 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 8 篇 peichang shi
  • 8 篇 dongsheng li
  • 8 篇 hangjun zhou
  • 8 篇 ding bo
  • 8 篇 fu yongquan
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 sikun li
  • 6 篇 hai jin

语言

  • 387 篇 英文
  • 22 篇 中文
  • 14 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
423 条 记 录,以下是291-300 订阅
排序:
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
2012 IEEE International Conference on Information science and Technology, ICIST 2012
作者: Liu, Jiangchao Chen, Liqian Dong, Longming Wang, Ji National Laboratory for Parallel and Distributed Processing School of Computer National University of Defence Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
On the feasibility of common-friend measurements for the distributed online social networks
On the feasibility of common-friend measurements for the dis...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme th... 详细信息
来源: 评论
BCE: A privacy-preserving common-friend estimation method for distributed online social networks without cryptography
BCE: A privacy-preserving common-friend estimation method fo...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed online social networks (DOSN) have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose BCE (Bloom Filter based Common-Friend Est... 详细信息
来源: 评论
SMP-SIM: An event-driven performance simulator for SMP
SMP-SIM: An event-driven performance simulator for SMP
收藏 引用
2012 International Conference on Systems and Informatics, ICSAI 2012
作者: Zhang, Xin Tang, Yuhua Lin, Yufei Xu, Xinhai Guo, Xiaowei Ren, Xiaoguang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Performance prediction for the high performance computer system is of great importance for designing, implementing, and optimizing system. As a widely used technique for predicting performance, simulation method attra... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information science and Technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Topology awareness algorithm for virtual network mapping
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2012年 第3期13卷 178-186页
作者: Xiao-ling LI Huai-min WANG Chang-guo GUO Bo DING Xiao-yong LI Wen-qi BI Shuang TAN National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology.Changsha 410073China School of Computer National University of Defense TechnologyChangsha 410073China China Electronic Systems Engineering Corporation Beijing 100039China The Northern Institute of Electronic Equipment of China Beijing 100083China
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne... 详细信息
来源: 评论
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
An efficient packing algorithm for spatial keyword queries
An efficient packing algorithm for spatial keyword queries
收藏 引用
6th International Conference on Convergence and Hybrid Information Technology, ICHIT 2012
作者: Pan, Jinkun Li, Dongsheng Li, Liming National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology 410073 Changsha China Shanghai Garrision 200040 Shanghai China
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel... 详细信息
来源: 评论
Inducing taxonomy from tags: An agglomerative hierarchical clustering framework
Inducing taxonomy from tags: An agglomerative hierarchical c...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Li, Xiang Wang, Huaimin Yin, Gang Wang, Tao Yang, Cheng Yu, Yue Tang, Dengqing National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China College of Mechatronics Engineering and Automation National University of Defense Technology Changsha China
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论