咨询与建议

限定检索结果

文献类型

  • 123 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 105 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 24 篇 信息与通信工程
    • 22 篇 生物工程
    • 19 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
  • 51 篇 理学
    • 26 篇 数学
    • 23 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
  • 41 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 医学

主题

  • 9 篇 computational mo...
  • 9 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 performance eval...
  • 5 篇 task analysis
  • 5 篇 anomaly detectio...
  • 4 篇 self-supervised ...
  • 4 篇 graph neural net...
  • 4 篇 predictive model...
  • 4 篇 semantics
  • 4 篇 machine learning
  • 4 篇 kernel
  • 4 篇 graphics process...
  • 4 篇 accuracy
  • 4 篇 cryptography
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 neural networks

机构

  • 36 篇 college of compu...
  • 14 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 6 篇 college of compu...
  • 6 篇 science and tech...
  • 5 篇 key laboratory o...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 4 篇 school of automa...
  • 4 篇 national univers...
  • 4 篇 national key lab...
  • 4 篇 college of compu...
  • 4 篇 sino-german coll...
  • 4 篇 college of syste...
  • 4 篇 nuclear power in...

作者

  • 13 篇 li dongsheng
  • 13 篇 wang yijie
  • 12 篇 wang huaimin
  • 11 篇 huaimin wang
  • 10 篇 lai zhiquan
  • 8 篇 dongsheng li
  • 8 篇 ding bo
  • 7 篇 peichang shi
  • 7 篇 xu hongzuo
  • 7 篇 xu kele
  • 6 篇 dou yong
  • 6 篇 yijie wang
  • 6 篇 wang wei
  • 6 篇 zhiquan lai
  • 6 篇 qiao peng
  • 6 篇 wang xiaodong
  • 6 篇 yue yu
  • 5 篇 guodong yi
  • 5 篇 wang tao
  • 5 篇 jinshu su

语言

  • 176 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing College of Computer"
188 条 记 录,以下是91-100 订阅
排序:
Pro-Prophet: A Systematic Load Balancing Method for Efficient parallel Training of Large-scale MoE Models
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Wei Lai, Zhiquan Li, Shengwei Liu, Weijie Ge, Keshi Shen, Ao Su, Huayou Li, Dongsheng The National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Hunan Changsha China
he size of deep learning models has been increasing to enhance model quality. The linear increase in training computation budget with model size means that training an extremely large-scale model is exceedingly time-c... 详细信息
来源: 评论
Grid computing in China
收藏 引用
Journal of Grid computing 2004年 第2期2卷 193-206页
作者: Yang, Guangwen Jin, Hai Li, Minglu Xiao, Nong Li, Wei Wu, Zhaohui Wu, Yongwei Tang, Feilong Department of Computer Science and Technology Tsinghua University Beijing China School of Computer Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China College of Computer Science Zhejiang University Hangzhou 310027 China
Grid computing presents a new trend to distributed computation and Internet applications, which can construct a virtual single image of heterogeneous resources, provide uniform application interface and integrate wide... 详细信息
来源: 评论
Temporal Closing Path for PLM-based Temporal Knowledge Graph Completion
Temporal Closing Path for PLM-based Temporal Knowledge Graph...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xin Zhou Yongxue Shan Zixuan Dong Haijiao Liu Xiaodong Wang National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Denfense Technology Changsha China
Temporal Knowledge Graph Completion (TKGC) aims to predict missing parts of quadruples, which is crucial for real-life knowledge graphs. Compared with methods that only use graph neural networks, the emergence of pre-... 详细信息
来源: 评论
Fast query over encrypted data based on B+ tree
Fast query over encrypted data based on B+ tree
收藏 引用
2009 International Conference on Apperceiving computing and Intelligence Analysis, ICACIA 2009
作者: Wang, Zheng-Fei Tang, Ai-Guo Wang, Wei Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China School of Computer Science Fudan University Shanghai 200433 China
There are a lot of important and sensitive data in databases, which need to be protected from attacks. To secure the data, Cryptography support is an effective mechanism. However, a tradeoff must be made between the p... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
OLM2: Automatic Optimal Strategy Generating for Large-Scale Model Training with Limited-Memory
OLM2: Automatic Optimal Strategy Generating for Large-Scale ...
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Zhilin Yang Yu Tang Linbo Qiao Xi Yang Zhen Huang National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China
The scale of model parameters and the amount of training data is exponentially increasing. It requires more GPU memory with the exponential increasement of model parameters. Recomputation and swapping are two main mem...
来源: 评论
A Novel Evaluation Strategy to Artificial Neural Network Model Based on Bionics
收藏 引用
Journal of Bionic Engineering 2022年 第1期19卷 224-239页
作者: Sen Tian Jin Zhang Xuanyu Shu Lingyu Chen Xin Niu You Wang School of Mathematics and Statistics Hunan Normal UniversityChangsha410081China College of Information Science and Engineering Hunan Normal UniversityChangsha410081China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China Key Laboratory of Industrial Control Technology Zhejiang UniversityHangzhou310058China Science and Technology on Parallel and Distributed Laboratory College of ComputerNational University of Defense TechnologyChangsha410199China Key Laboratory of Industrial Control Technology Institute of Cyber Systems and ControlZhejiang UniversityHangzhou310027China
With the continuous deepening of Artificial Neural Network(ANN)research,ANN model structure and function are improving towards diversification and ***,the model is more evaluated from the pros and cons of the problem-... 详细信息
来源: 评论
Cooperative monitoring BGP among autonomous systems
收藏 引用
Security and Communication Networks 2015年 第10期8卷 1943-1957页
作者: Hu, Ning Wang, BaoSheng Liu, Xin National Key Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
As the de facto Internet inter-domain routing protocol, BGP protocol has a number of vulnerabilities and weakness. Monitoring BGP is an effective way to improve the security of inter-domain routing. This paper present... 详细信息
来源: 评论
A Survey on Talking Head Generation: The Methods, Status and Challenges
SSRN
收藏 引用
SSRN 2023年
作者: Cai, Yali Qiao, Peng Li, Dongsheng National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
The talking head generation aims to synthesize a speech video of the source identity from a driving video or audio or text data irrelevant to the source identity. It can not only be applied to games and virtual realit... 详细信息
来源: 评论
TeeSwap: Private Data Exchange using Smart Contract and Trusted Execution Environment  23
TeeSwap: Private Data Exchange using Smart Contract and Trus...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Peng Shi, Peichang Xu, Jie Fu, Xiang Li, Linhui Zhong, Tao Xiang, Liangliang Kong, Jinzhu College of Computer National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China Zhejiang Lab Hangzhou311100 China Kylin Software Co. Ltd Changsha410073 China
With importance of data value is approved, data-sharing will create more and greater value has become consensus. However, data exchange has to use a trusted third party(TTP) as an intermediary in an untrusted network ... 详细信息
来源: 评论