咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 165 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 260 篇 计算机科学与技术...
    • 201 篇 软件工程
    • 48 篇 信息与通信工程
    • 36 篇 生物工程
    • 34 篇 控制科学与工程
    • 23 篇 机械工程
    • 22 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 100 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 505 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
539 条 记 录,以下是171-180 订阅
排序:
Efficient Large Models Fine-tuning on Commodity Servers via Memory-balanced Pipeline parallelism
Efficient Large Models Fine-tuning on Commodity Servers via ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Yujie Liu Zhiquan Lai Weijie Liu Wei Wang Dongsheng Li National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
Large models have achieved impressive performance in many downstream tasks. Using pipeline parallelism to fine-tune large models on commodity GPU servers is an important way to make the excellent performance of large ...
来源: 评论
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology  33rd
CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer T...
收藏 引用
33rd International Conference on Advanced Information Networking and Applications, AINA 2019
作者: Zheng, Li-ming Long, Wen-feng Liu, Yu-Jia Sun, Wei-dong Department of Message Communication Armed Police Officer Academy Chengdu China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Data distribution is a key technology for resources convergence and sharing in distributed environment. To better meet the requirement for real time data distribution in the dynamic network, a trace routing algorithm ... 详细信息
来源: 评论
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data  2nd
Secure and Fast Decision Tree Evaluation on Outsourced Cloud...
收藏 引用
2nd International Conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Liu, Lin Su, Jinshu Chen, Rongmao Chen, Jinrong Sun, Guangliang Li, Jie School of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha China
Decision trees are famous machine learning classifiers which have been widely used in many areas, such as healthcare, text classification and remote diagnostics, etc. The service providers usually host a decision tree... 详细信息
来源: 评论
Boundary-Driven Active Learning for Anomaly Detection in Time Series Data Streams
Boundary-Driven Active Learning for Anomaly Detection in Tim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaohui Zhou Yijie Wang Hongzuo Xu Mingyu Liu National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
The key to anomaly detection in time series data streams (TSDS) lies in the ability to adapt to evolving data. Active learning for anomaly detection has shown such ability by leveraging expert feedback. However, many ...
来源: 评论
Tinman: Eliminating confidential mobile data exposure with security oriented offloading  15
Tinman: Eliminating confidential mobile data exposure with s...
收藏 引用
10th European Conference on Computer Systems, EuroSys 2015
作者: Xia, Yubin Liu, Yutao Tan, Cheng Ma, Mingyang Guan, Haibing Zang, Binyu Chen, Haibo Shanghai Key Laboratory of Scalable Computing and Systems China Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Department of Computer Science Shanghai Jiao Tong University China
The wide adoption of smart devices has stimulated a fast shift of security-critical data from desktop to mobile devices. However, recurrent device theft and loss expose mobile devices to various security threats and e... 详细信息
来源: 评论
Ranking Open Source Software Based on Crowd Wisdom
Ranking Open Source Software Based on Crowd Wisdom
收藏 引用
2015 6th IEEE International Conference on Software Engineering and Service Science(ICSESS 2015)
作者: Qiang Fan Huaimin Wang Gang Yin Tao Wang National Laboratory of Parallel and Distributed Computing School of Computer National University of Defense Technology
Software reuse is critical in open source based software development, but it is very difficult to find a excellent reusable from large amount of similar candidate software in communities. Currently, lots of research w... 详细信息
来源: 评论
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
VButton: Practical attestation of user-driven operations in mobile apps  18
VButton: Practical attestation of user-driven operations in ...
收藏 引用
16th ACM International Conference on Mobile Systems, Applications, and Services,MobiSys 2018
作者: Li, Wenhao Luo, Shiyu Sun, Zhichuang Xia, Yubin Lu, Long Chen, Haibo Zang, Binyu Guan, Haibing Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China Northeastern University United States
More and more malicious apps and mobile rootkits are found to perform sensitive operations on behalf of legitimate users without their awareness. Malware does so by either forging user inputs or tricking users into ma... 详细信息
来源: 评论
Merge-Weighted Dynamic Time Warping for Speech Recognition
收藏 引用
Journal of Computer Science & Technology 2014年 第6期29卷 1072-1082页
作者: 张湘莉兰 骆志刚 李明 State Key Laboratory of Pathogen and Biosecurity Beijing Institute of Microbiology and Epidemiology Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology David R.Cheriton School of Computer Science University of WaterlooWaterlooOntario N2L 3G1Canada ACM IEEE
Obtaining training material for rarely used English words and common given names from countries where English is not spoken is difficult due to excessive time, storage and cost factors. By considering personal privacy... 详细信息
来源: 评论
An Efficient Broadcast Authentication Protocol in Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 368-372页
作者: Xin Zhao Xiaodong Wang Wanrong Yu Xingming Zhou National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Broadcast authentication is a critical security service in wireless sensor networks. A protocol named $\mu\text{TESLA}$ [1] has been proposed to provide efficient authentication service for such networks. However, w... 详细信息
来源: 评论