咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 166 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 265 篇 计算机科学与技术...
    • 205 篇 软件工程
    • 51 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 36 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 16 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 128 篇 理学
    • 76 篇 数学
    • 38 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 101 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 505 篇 英文
  • 26 篇 中文
  • 9 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing"
540 条 记 录,以下是461-470 订阅
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fanfeixue Meng Jingchen Wu Feifan Song Xu Wu Lan Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT School of Economics and Finance Changchun Finance College
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst...
来源: 评论
Modulation Recognition based on Incremental Deep Learning
Modulation Recognition based on Incremental Deep Learning
收藏 引用
International Conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Yong Yang Menghan Chen XiaoYa Wang Piming Ma The 54th Research Institute of CETC Shijiazhuang China School of Information Science and Engineering Shandong University Qingdao China School of Information and Communication Engineering National Engineering Laboratory for Mobile Network Security Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications line Beijing China
Incremental learning has emerged to solve the problem of incrementally updating the classification model as the number of data classes grows. There are many challenges in incremental learning such as catastrophic forg... 详细信息
来源: 评论
A Particle Swarm Optimization based Feature Selection Method for Accident Severity Analysis
A Particle Swarm Optimization based Feature Selection Method...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems
作者: Chenye Qiu Xingquan Zuo Fei Xiang School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Reducing accident severity is an effective mean to improve road safety level. Many researches have been done to identify the risky features which would influence the accident severity. Many risky features need to be c... 详细信息
来源: 评论
Study of test classification algorithm based on domain knowledge
Study of test classification algorithm based on domain knowl...
收藏 引用
Third International Conference on Cyberspace Technology (CCT 2015)
作者: Yutong Gao Feifan Song Xiaqing Xie Qing Sun Xu Wu Department of Computer Science and Information Engineering National Taipei University of Technology China School of Economics andManagement Beijing University of Posts and Telecommunications China Beijing University of Posts and Telecommunications Library China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
When facing various and massive data resources, how to effectively utilize the resources according to the division field is one of the core problem of the institutional repository research. In this paper, we improved ... 详细信息
来源: 评论
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI C...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Yihao Yang Xiaolei Dong Jiachen Shen Zhenfu Cao Yunbo Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Zongyang Hou Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan Print-Rite Technology Development Co. Ltd. Of Zhuhai China
Private Set Intersection (PSI) is one of the most important functions in secure multiparty computation (MPC). PSI protocols have been a practical cryptographic primitive and there are many privacy-preserving applicati...
来源: 评论
Efficient detection of dangling pointer error for C/C++ programs
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Wenzhe Zhang Science and Technology on Parallel and Distributed Laboratory State Key Laboratory of High Performance Computing State Key Laboratory of High-end Server & Storage Technology College of Computer National University of Defense Technology Changsha PR China
Dangling pointer error is pervasive in C/C++ programs and it is very hard to detect. This paper introduces an efficient detector to detect dangling pointer error in C/C++ programs. By selectively leave some memory acc...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
parallel Bayesian Network Structure Learning for Genome-Scale Gene Networks
Parallel Bayesian Network Structure Learning for Genome-Scal...
收藏 引用
Supercomputing Conference
作者: Sanchit Misra Md. Vasimuddin Kiran Pamnany Sriram P. Chockalingam Yong Dong Min Xie Maneesha R. Aluru Srinivas Aluru Parallel Computing Lab Intel Corporation Bangalore India Dept. of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai India State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China School of Biology Georgia Institute of Technology Atlanta USA School of Computational Science and Engineering Georgia Institute of Technology Atlanta USA
Learning Bayesian networks is NP-hard. Even with recent progress in heuristic and parallel algorithms, modeling capabilities still fall short of the scale of the problems encountered. In this paper, we present a massi... 详细信息
来源: 评论