咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 423 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 273 篇 工学
    • 219 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 69 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 31 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 24 篇 生物工程
    • 19 篇 机械工程
    • 13 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 网络空间安全
    • 6 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 力学(可授工学、理...
    • 4 篇 冶金工程
    • 4 篇 建筑学
  • 117 篇 理学
    • 75 篇 数学
    • 26 篇 生物学
    • 19 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 11 篇 化学
  • 78 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 17 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 deep learning
  • 12 篇 distributed proc...
  • 11 篇 semantics
  • 10 篇 computer archite...
  • 9 篇 laboratories
  • 9 篇 kernel
  • 8 篇 computer science
  • 8 篇 conferences
  • 8 篇 scalability
  • 8 篇 concurrent compu...
  • 8 篇 fault tolerance
  • 8 篇 training
  • 7 篇 application soft...
  • 7 篇 anomaly detectio...
  • 7 篇 neural networks
  • 7 篇 predictive model...
  • 7 篇 benchmark testin...
  • 7 篇 costs

机构

  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 26 篇 college of compu...
  • 21 篇 national key lab...
  • 20 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 national laborat...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 7 篇 college of compu...
  • 6 篇 national key lab...
  • 6 篇 national laborat...
  • 6 篇 school of softwa...
  • 6 篇 laboratory of di...

作者

  • 18 篇 wang yijie
  • 16 篇 yijie wang
  • 15 篇 peng yuxing
  • 14 篇 wang huaimin
  • 12 篇 jie liu
  • 10 篇 liu jie
  • 10 篇 huaimin wang
  • 9 篇 yuxing peng
  • 9 篇 dongsheng li
  • 8 篇 peichang shi
  • 8 篇 hangjun zhou
  • 8 篇 ding bo
  • 8 篇 fu yongquan
  • 7 篇 qinglin wang
  • 7 篇 yin gang
  • 6 篇 zhou hangjun
  • 6 篇 shi peichang
  • 6 篇 wang huai-min
  • 6 篇 sikun li
  • 6 篇 hai jin

语言

  • 383 篇 英文
  • 22 篇 中文
  • 18 篇 其他
检索条件"机构=National Key Laboratory for Parallel and Distributed Processing School of Computer Science"
423 条 记 录,以下是331-340 订阅
排序:
Algorithm for distributed Constraint Optimization Problems with low constraint density
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2011年 第4期22卷 625-639页
作者: Ding, Bo Wang, Huai-Min Shi, Dian-Xi Tang, Yang-Bin School of Computer National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Many challenges in multi-agent coordination can be modeled as distributed Constraint Optimization Problems (DCOPs). Aiming at DCOPs with low constraint density, this paper proposes a distributed algorithm based on the... 详细信息
来源: 评论
A causality based dynamic message ordering for DVEs on Wide Area Network
A causality based dynamic message ordering for DVEs on Wide ...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
Due to the large message transmission latency in distributed Virtual Environments(DVEs) on Wide Area Net-work(WAN), the effectiveness of causality consistency control of message ordering is determined by not only caus... 详细信息
来源: 评论
A unique vertex deleting algorithm for graph isomorphism
A unique vertex deleting algorithm for graph isomorphism
收藏 引用
2011 International Symposium on Image and Data Fusion, ISIDF 2011
作者: Zhang, Baida Tang, Yuhua Wu, Junjie Huang, Linqi National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Resources and Safety Engineering Central South University Changsha 410083 China
Graph isomorphism problem has applications in many fields, such as chemistry, computer science, electronics, and network theory. But the exponential complexity of the algorithm makes the testing is time consuming. In ... 详细信息
来源: 评论
A multi-layered emulation platform to verify the effectiveness of consistency control approaches about message ordering
A multi-layered emulation platform to verify the effectivene...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Zhou, Hangjun Fu, Sha Department of Information Management Hunan University of Finance and Economics Chang Sha Hu Nan China Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Chang Sha Hu Nan China
It is an important issue to preserve the consistent delivering order of messages at each site in distributed Virtual Environments(DVEs). Currently, the violations of message delivery order are inclined to happen in th... 详细信息
来源: 评论
不确定数据流上的并行Skyline查询算法
不确定数据流上的并行Skyline查询算法
收藏 引用
第29届中国数据库学术会议
作者: WANG Guangdong 王广东 WANG Yijie 王意洁 LI Xiaoyong 李小勇 WANG Yuan 王媛 National Key Laboratory for Parallel and Distributed Processing College of Computer Science Nation 国防科技大学计算机学院并行与分布处理国家重点实验室 长沙410073
不确定数据流上的Skyline查询技术逐步引起研究者的关注,传统的集中式流处理算法难以满足海量数据的查询需求,并且云计算所提供的海量计算资源和有效的存储管理模式,为研究并行Skyline查询技术提供了充足的条件。基于上述事实,提出... 详细信息
来源: 评论
Efficient approach for repeated patterns mining based on indent shape of HTML documents
Efficient approach for repeated patterns mining based on ind...
收藏 引用
3rd International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2011
作者: Zhu, Yanxu Yin, Gang Wang, Huaimin Shi, Dianxi Rao, Xiang Yuan, Lin School of Computer National Laboratory for Parallel and Distributed Processing National University of Defense Technology 410073 Changsha Hunan China College of Electronic Technology Information Engineering University 450004 Zhengzhou Henan China
Mining of repeated patterns from HTML documents is the key step towards Web-based data mining and knowledge extraction. Many web crawling applications need efficient repeated patterns mining techniques to generate the... 详细信息
来源: 评论
BIIP:Application Behavior-Aware Insertion Policies for Managing Shared Cache in CMPs
BIIP:Application Behavior-Aware Insertion Policies for Manag...
收藏 引用
2011 International Conference on computers, Communications, Control and Automation
作者: Xiaomin Jia Ping Huang Tianlei Zhao Shubo Qi Guitao Fu Minxuan Zhang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology
Conventional replacement policy LRU(Least Recently Used) can significantly degrade the overall performance of shared cache of Chip Multi-Processors(CMPs), when the aggregate working set of multiple co-scheduled applic... 详细信息
来源: 评论
parallelization of the Training for Face Detection with Transactional Memory
Parallelization of the Training for Face Detection with Tran...
收藏 引用
The International Conference on Automation and Robotics(ICAR 2011)
作者: Kun Zeng Key Laboratory and technology for National Defence of Parallel and Distributed Processing School of Computer National Univiersity of Defense Technology
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes... 详细信息
来源: 评论
Fault Recovery Based on parallel Recomputing in Transactional Memory System
Fault Recovery Based on Parallel Recomputing in Transactiona...
收藏 引用
The 2011 International Conference on Electric and Electronics(EEIC 2011)
作者: Wei Song Jia Jia National Laboratory for Parallel and Distributed Processing School of ComputerNational University of Defense Technology
This paper addresses the issue of fault recovery in transactional memory,and proposes a method of fault recovery based on parallel recomputing in transactional memory *** method utilizes the dataversioning mechanism o... 详细信息
来源: 评论
TRUSTIE: Design of a Trustworthy Software Production Environment
TRUSTIE: Design of a Trustworthy Software Production Environ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huaimin Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Internet fundamentally changes the model of software development, the demands of software quality, and the process of software resource sharing. Internet- based environment for trustworthy software production is recog... 详细信息
来源: 评论