咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 167 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 310 篇 工学
    • 257 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 47 篇 信息与通信工程
    • 36 篇 生物工程
    • 34 篇 控制科学与工程
    • 23 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 12 篇 电气工程
    • 10 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 99 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 507 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
541 条 记 录,以下是351-360 订阅
排序:
Secure Live Migration of SGX Enclaves on Untrusted Cloud
Secure Live Migration of SGX Enclaves on Untrusted Cloud
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jinyu Gu Zhichao Hua Yubin Xia Haibo Chen Binyu Zang Haibing Guan Jinming Li Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Institute of Parallel and Distributed Systems (IPADS) Shanghai Jiao Tong University Huawei Technologies Inc.
The recent commercial availability of Intel SGX (Software Guard eXtensions) provides a hardware-enabled building block for secure execution of software modules in an untrusted cloud. As an untrusted hypervisor/OS has ... 详细信息
来源: 评论
Density-Attentive Head Detector for Crowd Counting
Density-Attentive Head Detector for Crowd Counting
收藏 引用
International Conference on Data Science and Business Analytics (ICDSBA)
作者: Ziyu Zhao Xingyu Shen Long Lan Xiaoyao Yin Xiang Zhang Yonggang Che Zhigang Luo College of Computer National University of Defense Technology Changsha China Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing National University of Defense Technology Changsha China
In crowd counting, regression-based method shows better performance in extreme density scenes by introduces a density map. However, the regression-based method fails to locate the positions of each head, which signifi... 详细信息
来源: 评论
PTQ-SO: A Scale Optimization-based Approach for Post-training Quantization of Edge computing
PTQ-SO: A Scale Optimization-based Approach for Post-trainin...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kangkang Liu Ningjiang Chen College of Computer and Electronic Information Guangxi University Nanning China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University Nanning China
With the increasing performance of deep convolutional neural networks, they have been widely used in many computer vision tasks. However, a huge convolutional neural network model requires a lot of memory and computin... 详细信息
来源: 评论
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairne...
收藏 引用
International Conference on Cyber-Enabled distributed computing and Knowledge Discovery, CyberC
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Networks Engineering School of Computer National University of Defense Technology Changsha China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
A distributed Relation Detection Approach in the Internet of Things
收藏 引用
Mobile Information Systems 2017年 第1期2017卷
作者: Zhu, Weiping Lu, Hongliang Cui, Xiaohui Cao, Jiannong International School of Software Wuhan University Wuhan China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong
In the Internet of Things, it is important to detect the various relations among objects for mining useful knowledge. Existing works on relation detection are based on centralized processing, which is not suitable for... 详细信息
来源: 评论
R-TAR: A Resilient Traffic Anomaly Recognition Mechanism for Backbone Network  10
R-TAR: A Resilient Traffic Anomaly Recognition Mechanism for...
收藏 引用
10th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2018
作者: Li, Xueyu Zhang, Xu Wang, Dongbin School of Network Education Beijing University of Posts and Telecommunications Beijing100876 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service School of CyberSpace Security Beijing University of Posts and Telecommunications Beijing100876 China
The development of backbone networks leads to an increase in heterogeneous anomalies and cyberspace situation complexity, and traditional traffic monitoring cannot meet multiple-point concurrency design and resilience... 详细信息
来源: 评论
Calibrated One-class Classification for Unsupervised Time Series Anomaly Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Hongzuo Wang, Yijie Jian, Songlei Liao, Qing Wang, Yongjun Pang, Guansong Beijing100091 China The National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Hunan410073 China The College of Computer National University of Defense Technology Hunan410073 China Guangdong518055 China The School of Computing and Information Systems Singapore Management University Singapore178902 Singapore
Time series anomaly detection is instrumental in maintaining system availability in various domains. Current work in this research line mainly focuses on learning data normality deeply and comprehensively by devising ... 详细信息
来源: 评论
Enhancing 2D Representation via Adjacent Views for 3D Shape Retrieval
Enhancing 2D Representation via Adjacent Views for 3D Shape ...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Cheng Xu Zhaoqun Li Qiang Qiu Biao Leng Jingfei Jiang School of Computer Science & Engineering Beihang University Duke University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beihang University National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Multi-view shape descriptors obtained from various 2D images are commonly adopted in 3D shape retrieval. One major challenge is that significant shape information are discarded during 2D view rendering through project... 详细信息
来源: 评论
An Efficient Approximation for Weapon-Target Assignment
An Efficient Approximation for Weapon-Target Assignment
收藏 引用
ISECS International Colloquium on computing, Communication, Control, and Management, CCCM
作者: Lina Chen ChuanJun Ren Su Deng C4ISR Technology National Defense Science and Technology Key Laboratory National University of Defense Technology Changsha Hunan China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
The weapon-target assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. The WTA problem can be formulated as a nonlinear integer programming problem and is k... 详细信息
来源: 评论
Enabling Tissue-Scale Cardiac Simulations Using Heterogeneous computing on Tianhe-2
Enabling Tissue-Scale Cardiac Simulations Using Heterogeneou...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Johannes Langguth Qiang Lan Namit Gaur Xing Cai Mei Wen Chun-Yuan Zhang Simula Research Laboratory Lysaker Norway College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing Changsha China Department of Informatics University of Oslo Oslo Norway
We develop a simulator for 3D tissue of the human cardiac ventricle with a physiologically realistic cell model and deploy it on the supercomputer Tianhe-2. In order to attain the full performance of the heterogeneous... 详细信息
来源: 评论