咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 167 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 314 篇 工学
    • 260 篇 计算机科学与技术...
    • 202 篇 软件工程
    • 49 篇 信息与通信工程
    • 36 篇 生物工程
    • 35 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电子科学与技术(可...
    • 14 篇 电气工程
    • 12 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 100 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 deep learning
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 507 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
541 条 记 录,以下是11-20 订阅
排序:
Memory Replay with Unlabeled Data for Semi-Supervised Class-Incremental Learning via Temporal Consistency
收藏 引用
Frontiers of Computer Science 2025年 第12期19卷 0-0页
作者: Wang, Qiang Xu, Kele Feng, Dawei Ding, Bo Wang, Huaimin National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China
来源: 评论
PEbfs: Implement High-Performance Breadth-First Search on PEZY-SC3s  24th
PEbfs: Implement High-Performance Breadth-First Search on P...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2024
作者: Guo, Weihao Wang, Qinglin Liu, Xiaodong Peng, Muchun Yang, Shun Liang, Yaling Shi, Yongzhen Cao, Ligang Liu, Jie Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha410073 China Engineering Research Center for National Fundamental Software National University of Defense Technology Changsha410073 China
The breadth-first search (BFS) algorithm is a fundamental algorithm in graph theory, and it’s parallelization can significantly improve performance. Therefore, there have been numerous efforts to leverage the powerfu... 详细信息
来源: 评论
Deep anomaly detection with partition contrastive learning for tabular data
收藏 引用
Data Mining and Knowledge Discovery 2025年 第4期39卷 1-38页
作者: Li, Yizhou Wang, Yijie Xu, Hongzuo Li, Bin Zhou, Xiaohui National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised anomaly detection (AD) methods define transformations and surrogate tasks to deeply learn data “normality”, presenting superior performance. Different from most existing work designed for images, thi... 详细信息
来源: 评论
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles  18th
Recommendation-Aware Collaborative Edge Caching Strategy in...
收藏 引用
18th International Conference on Wireless Artificial Intelligent computing Systems and Applications, WASA 2024
作者: Ou, Pingjie Chen, Ningjiang Huang, Zizhan School of Computer and Electronic Information Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi University Guangxi Nanning530004 China
Due to the limited resources of edge networks, the heterogeneity of user content requests, high-cost caching from direct resource hits, and redundancy in resource retention time hinder system performance. Traditional ... 详细信息
来源: 评论
Highly parallelized Reinforcement Learning Training with Relaxed Assignment Dependencies
arXiv
收藏 引用
arXiv 2025年
作者: He, Zhouyu Qiao, Peng Li, Rongchun Dou, Yong Tan, Yusong College of Computer Science and Technology National University of Defense Technology China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China
As the demands for superior agents grow, the training complexity of Deep Reinforcement Learning (DRL) becomes higher. Thus, accelerating training of DRL has become a major research focus. Dividing the DRL training pro... 详细信息
来源: 评论
Open source oriented cross-platform survey
收藏 引用
Information and Software Technology 2025年 182卷
作者: Yao, Simeng Zhang, Xunhui Zhang, Yang Wang, Tao College of Computer Science and Technology National University of Defense Technology Changsha410073 China State Key Laboratory of Complex & Critical Software Environment Changsha410073 China National Key Laboratory of Parallel and Distributed Computing Changsha410073 China
Context: Open-source software development has become a widely adopted approach to software creation. However, developers’ activities extend beyond social coding platforms (e.g., GitHub), encompassing social Q&A p... 详细信息
来源: 评论
Deep Time Series Anomaly Detection with Local Temporal Pattern Learning
Deep Time Series Anomaly Detection with Local Temporal Patte...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yizhou Li Yijie Wang Hongzuo Xu Xiaohui Zhou National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised time series anomaly detection (TSAD) demonstrates remarkable performance improvement by extracting high-level data semantics through proxy tasks. Nonetheless, most existing self-supervised TSAD techniq... 详细信息
来源: 评论
A Counterfactual Ultrasound Anti-Interference Self-Supervised Network for B-mode Ultrasound Tongue Extraction
A Counterfactual Ultrasound Anti-Interference Self-Supervise...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yan Jia Yuqing Cheng Kele Xu Yong Dou Peng Qiao Zhouyu He National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Systems Engineering National University of Defense Technology Changsha China
B-mode ultrasound tongue imaging is a non-invasive and real-time method for visualizing vocal tract deformation. However, accurately extracting the tongue’s surface contour remains a significant challenge due to the ... 详细信息
来源: 评论
Graph Structure Learning via Transfer Entropy for Multivariate Time Series Anomaly Detection
Graph Structure Learning via Transfer Entropy for Multivaria...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingyu Liu Yijie Wang Xiaohui Zhou Yongjun Wang National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology National University of Defense Technology Changsha China
Multivariate time series anomaly detection (MTAD) poses a challenge due to temporal and feature dependencies. The critical aspects of enhancing the detection performance lie in accurately capturing the dependencies be... 详细信息
来源: 评论
SMDPG: Identifying Metabolite-Disease Associations via Optimized Negative Sampling and Sparse Graph Convolutional Network
IEEE Transactions on Computational Biology and Bioinformatic...
收藏 引用
IEEE Transactions on Computational Biology and Bioinformatics 2025年 第2期22卷 672-683页
作者: Yiran Huang Qiulong Pu Wei Lan Cuiyu Huang Cheng Zhong School of Computer Electronics and Information Guangxi University Nanning China Guangxi Universities Key Laboratory of Parallel and Distributed Computing and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China College of Chemistry Nankai University Tianjin China
Identifying disease-associated metabolites could provide critical clues for the diagnosis and treatment of diseases. Although computational approaches have been proposed to predict disease-associated metabolites by tr... 详细信息
来源: 评论