咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 167 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 310 篇 工学
    • 257 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 47 篇 信息与通信工程
    • 36 篇 生物工程
    • 34 篇 控制科学与工程
    • 23 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 12 篇 电气工程
    • 10 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 127 篇 理学
    • 75 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 99 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 507 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
541 条 记 录,以下是411-420 订阅
排序:
A multi-layered emulation platform to verify the effectiveness of consistency control approaches about message ordering
A multi-layered emulation platform to verify the effectivene...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Hangjun Zhou Sha Fu Key Laboratory of Science and Technology for National Defence of Parallel and Distributed P rocessing School of Computer Science National University of Defense Technology Changsha Hunan China Department of Information Management Hunan University of Finance and Economics Changsha Hunan China
It is an important issue to preserve the consistent delivering order of messages at each site in distributed Virtual Environments(DVEs). Currently, the violations of message delivery order are inclined to happen in th... 详细信息
来源: 评论
Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase
Implementing an Inference Engine for RDFS/OWL Constructs and...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Zhengbo Liu Wenbin Yao Dongbin Wang National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ministry of Education for Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The Inference Engine is an integral part of Semantic Data Stores. In this paper, we describe our experience of implementing a scalable inference engine for HBase Semantic Data Store. This inference engine computes pro... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Policy-Driven Configuration Management for NoSQL
Policy-Driven Configuration Management for NoSQL
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Xianqiang Bao Ling Liu Nong Xiao Yang Zhou Qi Zhang State Key Laboratory of High Performance Computing National University of Defense Technology Hunan China Distributed Data Intensive Systems Lab Georgia Institute of Technology Atlanta Georgia USA
NoSQL systems have become the vital components to deliver big data services in the Cloud. However, existing NoSQL systems rely on experienced administrators to configure and tune the wide range of configurable paramet... 详细信息
来源: 评论
Multi-task Pre-training Language Model for Semantic Network Completion
arXiv
收藏 引用
arXiv 2022年
作者: Li, Da Yang, Sen Xu, Kele Yi, Ming He, Yukai Wang, Huaimin Tencent Beijing100084 China Beijing Institute of Microbiology and Epidemiology Beijing100071 China State Key Laboratory of Pathogen and Biosecurity Beijing100071 China National University of Defense Technology Changsha410073 China National Key Lab of Parallel and Distributed Processing Changsha410073 China
Semantic networks, such as the knowledge graph, can represent the knowledge leveraging the graph structure. Although the knowledge graph shows promising values in natural language processing, it suffers from incomplet... 详细信息
来源: 评论
Improvements towards formalizing UML state diagrams in CSP
Improvements towards formalizing UML state diagrams in CSP
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: W.L. Yeung K.R.P.H. Leung Ji Wang Wei Dong Department of Computing and Decision Sciences Lingnan University Hong Kong China Department of Information & Hong Kong Institute of Vocational Education Hong Kong Institute of Vocational Education Hong Kong China National Laboratory for Parallel and Distributed Processing PDL Hunan China
The Unified Modelling Language (UML) includes a variant of state charts, called state diagrams (SD), for modelling systems with complex interactive behaviour. The official definition of UML specifies the abstract synt... 详细信息
来源: 评论
TNRAS: Tor Nodes Reliability Analysis Scheme  2021
TNRAS: Tor Nodes Reliability Analysis Scheme
收藏 引用
2021 the 11th International Conference on Communication and Network Security
作者: Wenzhen Zhang Tianbo Lu Zeyu Du School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China School of Computer Science (National Pilot Software Engineering School) School of Cyberspace Security Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China
With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication net... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms
Feature and Performance Comparison of FaaS Platforms
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Penghui Ma Peichang Shi Guodong Yi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
来源: 评论
Collaborative deep learning across multiple data centers
arXiv
收藏 引用
arXiv 2018年
作者: Xu, Kele Mi, Haibo Feng, Dawei Wang, Huaimin Chen, Chuan Zheng, Zibin Lan, Xu National Key Laboratory of Parallel and Distributed Processing Changsha China College of Computer National University of Defense Technology Changsha China School of Data and Computer Science Sun Yat-Sen University Guangzhou China Queen Mary University of London London United Kingdom
Valuable training data is often owned by independent organizations and located in multiple data centers. Most deep learning approaches require to centralize the multi-datacenter data for performance purpose. In practi... 详细信息
来源: 评论