咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 165 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 316 篇 工学
    • 263 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 51 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 36 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 16 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 化学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 9 篇 系统科学
  • 101 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 30 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 23 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 504 篇 英文
  • 26 篇 中文
  • 9 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
539 条 记 录,以下是291-300 订阅
排序:
An in-depth Exploration of LAMOST Unknown Spectra Based on Density Clustering
收藏 引用
Research in Astronomy and Astrophysics 2023年 第5期23卷 52-65页
作者: Hai-Feng Yang Xiao-Na Yin Jiang-Hui Cai Yu-Qing Yang A-Li Luo Zhong-Rui Bai Li-Chan Zhou Xu-Jun Zhao Ya-Ling Xun Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Technology North University of ChinaTaiyuan 030051China National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China
Large sky Area Multi-Object fiber Spectroscopic Telescope(LAMOST) has completed the observation of nearly 20 million celestial objects,including a class of spectra labeled “Unknown.” Besides low signal-to-noise rati... 详细信息
来源: 评论
Reduced complexity tree-structured conditional random field for all-words word sense disambiguation
收藏 引用
Journal of Computational Information Systems 2012年 第3期8卷 1177-1186页
作者: Zhou, Yun Wang, Ting Wang, Zhiyuan Xie, Songxian Computer School National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
In this paper, we apply tree-structured conditional random field (TCRF) to all-words word sense disambiguation (WSD), where the graphical structure of TCRF is the dependency syntax tree produced by Minipar. The extrem... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms  14
Feature and Performance Comparison of FaaS Platforms
收藏 引用
14th IEEE International Conference on Software Engineering and Service Science, ICSESS 2023
作者: Ma, Penghui Shi, Peichang Yi, Guodong College of Computer Science National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China College of Computer Science National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems Changsha410073 China Xiangjiang Lab Changsha410073 China School of Advanced Interdisciplinary Studies Hunan University of Technology and Business Changsha410073 China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove... 详细信息
来源: 评论
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffi...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Xin Wang Shuhui Chen Jinshu Su College of Computer Science and Technology National University of Defense Technology National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology
With the exponential growth of mobile traffic data, mobile traffic classification is in a great need. It is an essential step to improve the performance of network services such as QoS and security monitoring. However... 详细信息
来源: 评论
HPDedup: A Hybrid prioritized data deduplication mechanism for primary storage in the cloud  33
HPDedup: A Hybrid prioritized data deduplication mechanism f...
收藏 引用
33rd International Conference on Massive Storage Systems and Technology, MSST 2017
作者: Wu, Huijun Wang, Chen Fu, Yinjin Sakr, Sherif Zhu, Liming Lux, Kai Data CSIRO University of New South Wales Australia PLA University of Science and Technology China Science and Technology on Parallel and Distributed Laboratory State Key Laboratory of High Performance Computing State Key Lab. of High-end Server and Storage Technology Coll. of Computer Natl. Univ. of Def. Technol. China
Eliminating duplicate data in primary storage of clouds increases the cost-efficiency of cloud service providers as well as reduces the cost of users for using cloud services. Most existing primary deduplication techn... 详细信息
来源: 评论
Unsupervised Learning-based Depth Estimation aided Visual SLAM Approach
arXiv
收藏 引用
arXiv 2019年
作者: Geng, Mingyang Shang, Suning Ding, Bo Wang, Huaimin Zhang, Pengfei Zhang, Lei National Key Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology China National Key Laboratory of Integrated Automation of Process Industry Northeastern University China
Existing visual-based SLAM systems mainly utilize the three-dimensional environmental depth information from RGB-D cameras to complete the robotic synchronization localization and map construction task. However, the R... 详细信息
来源: 评论
RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers
RAFlow: Read Ahead Accelerated I/O Flow through Multiple Vir...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Zhaoning Zhang Kui Wu Huiba Li Jinghua Feng Yuxing Peng Xicheng Lu National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China Computer Science Department University of Victoria B.C. Canada National Super Computing Center Tianjin China
Virtualization is the foundation for cloud computing, and the virtualization can not be achieved without software defined, elastic, flexible and scalable virtual layers. Unfortunately, if multiple virtual storage devi... 详细信息
来源: 评论
Routing with uncertainty in wireless mesh networks
Routing with uncertainty in wireless mesh networks
收藏 引用
International Workshop on Quality of Service
作者: Fajun Chen Jiangchuan Liu Zongpeng Li Yijie Wang Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing National University of Defense Technology China School of Computing Science Simon Fraser University Department of Computer Science University of Caglary
Existing routing protocols for Wireless Mesh Networks (WMNs) are generally optimized with statistical link measures, while not addressing on the intrinsic uncertainty of wireless links. We show evidence that, with the... 详细信息
来源: 评论
Constrained Projective Non-negative Matrix Factorization for Semi-supervised Multi-label Learning
Constrained Projective Non-negative Matrix Factorization for...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Xiang Zhang Naiyang Guan Zhigang Luo Xuejun Yang College of Computer National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China The State key Laboratory of High Performance Computing National University of Defense Technology Changsha China
This paper formulates multi-label learning as a constrained projective non-negative matrix factorization (CPNMF) problem which concentrates on a variant of the original projective NMF (PNMF) and explicitly introduces ... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things  24
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shang, Jiaze Lu, Tianbo Cai, Yingjie Luo, Shuang Jin, Zhaoxin School of Computer Science National Pilot Software Enginerring School Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
The application of blockchain in the Internet of Things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论