咨询与建议

限定检索结果

文献类型

  • 123 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 105 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 24 篇 信息与通信工程
    • 22 篇 生物工程
    • 19 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
  • 51 篇 理学
    • 26 篇 数学
    • 23 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
  • 41 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 医学

主题

  • 9 篇 computational mo...
  • 9 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 performance eval...
  • 5 篇 task analysis
  • 5 篇 anomaly detectio...
  • 4 篇 self-supervised ...
  • 4 篇 graph neural net...
  • 4 篇 predictive model...
  • 4 篇 semantics
  • 4 篇 machine learning
  • 4 篇 kernel
  • 4 篇 graphics process...
  • 4 篇 accuracy
  • 4 篇 cryptography
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 neural networks

机构

  • 36 篇 college of compu...
  • 14 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 6 篇 college of compu...
  • 6 篇 science and tech...
  • 5 篇 key laboratory o...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 4 篇 school of automa...
  • 4 篇 national univers...
  • 4 篇 national key lab...
  • 4 篇 college of compu...
  • 4 篇 sino-german coll...
  • 4 篇 college of syste...
  • 4 篇 nuclear power in...

作者

  • 13 篇 li dongsheng
  • 13 篇 wang yijie
  • 12 篇 wang huaimin
  • 11 篇 huaimin wang
  • 10 篇 lai zhiquan
  • 8 篇 dongsheng li
  • 8 篇 ding bo
  • 7 篇 peichang shi
  • 7 篇 xu hongzuo
  • 7 篇 xu kele
  • 6 篇 dou yong
  • 6 篇 yijie wang
  • 6 篇 wang wei
  • 6 篇 zhiquan lai
  • 6 篇 qiao peng
  • 6 篇 wang xiaodong
  • 6 篇 yue yu
  • 5 篇 guodong yi
  • 5 篇 wang tao
  • 5 篇 jinshu su

语言

  • 176 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing College of Computer"
188 条 记 录,以下是121-130 订阅
排序:
Unsupervised Learning-based Depth Estimation aided Visual SLAM Approach
arXiv
收藏 引用
arXiv 2019年
作者: Geng, Mingyang Shang, Suning Ding, Bo Wang, Huaimin Zhang, Pengfei Zhang, Lei National Key Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology China National Key Laboratory of Integrated Automation of Process Industry Northeastern University China
Existing visual-based SLAM systems mainly utilize the three-dimensional environmental depth information from RGB-D cameras to complete the robotic synchronization localization and map construction task. However, the R... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
International Conference on Computational Intelligence and Natural computing, CINC
作者: Zheng-Fei Wang Ai-Guo Tang National Key Laboratory of Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Computer Hunan Business College Changsha China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks
Hybrid Routing: Towards Resilient Routing in Anonymous Commu...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yusheng Xia Rongmao Chen Jinshu Su Chen Pan Han Su College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Anonymous communication networks (ACNs) are intended to protect the metadata during communication. As classic ACNs, onion mix-nets are famous for strong anonymity, in which the source defines a static path and wraps t... 详细信息
来源: 评论
An Online/Offline HIBS Scheme for Privacy Protection of People-centric Sensing
An Online/Offline HIBS Scheme for Privacy Protection of Peop...
收藏 引用
International Conference on Industrial Informatics, computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)
作者: Peixin Chen Xiaofeng Wang Jinshu Su College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel Distributed Processing National University of Defense Technology Changsha China
People-Centric Sensing (PCS), which collects information closely related to human activity and interactions in societies, is stepping into a flourishing time. Along with its great benefits, PCS poses new security chal... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
作者: Ming Li Bo Liu Guangsheng Xing Xiaodong Wang Zhihui Wang College of Intelligence Science and Technology National University of Defence Technology National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
Tendency-based caching in Content-Centric Networking
Tendency-based caching in Content-Centric Networking
收藏 引用
International Conference on Ubiquitous and Future Networks, ICUFN
作者: YuSheng Xia YaPing Liu JinShu Su College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
In content-centric networking, the schemes of innetwork caching can affect the performance of the whole network. Existing schemes lack of the global view, which results in inefficient caches. In this paper, we aim to ... 详细信息
来源: 评论
RuleRAG: Rule-Guided Retrieval-Augmented Generation with Language Models for Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhongwu Xu, Chengjin Wang, Dingmin Huang, Zhen Dou, Yong Jiang, Xuhui Guo, Jian National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology China IDEA Research International Digital Economy Academy Department of Computer Science University of Oxford United Kingdom
Retrieval-augmented generation (RAG) has shown promising potential in knowledge intensive question answering (QA). However, existing approaches only consider the query itself, neither specifying the retrieval preferen... 详细信息
来源: 评论
Constrained Projective Non-negative Matrix Factorization for Semi-supervised Multi-label Learning
Constrained Projective Non-negative Matrix Factorization for...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Xiang Zhang Naiyang Guan Zhigang Luo Xuejun Yang College of Computer National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China The State key Laboratory of High Performance Computing National University of Defense Technology Changsha China
This paper formulates multi-label learning as a constrained projective non-negative matrix factorization (CPNMF) problem which concentrates on a variant of the original projective NMF (PNMF) and explicitly introduces ... 详细信息
来源: 评论
Bi-Objective Scheduling Algorithm for Hybrid Workflow in JointCloud
Bi-Objective Scheduling Algorithm for Hybrid Workflow in Joi...
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Rui Li Huaimin Wang Peichang Shi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of Complex & Critica Software Environment College of Computer Science National University of Defense Technology Changsha China
Big data workflows are widely used in IoT, recommended systems, and real-time vision applications, and they continue to grow in complexity. These hybrid workflows consist of both resource-intensive batch jobs and late... 详细信息
来源: 评论
Towards a multi-array architecture for accelerating large-scale matrix multiplication on FPGAs
arXiv
收藏 引用
arXiv 2018年
作者: Shen, Junzhong Qiao, Yuran Huang, You Wen, Mei Zhang, Chunyuan College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Large-scale floating-point matrix multiplication is a fundamental kernel in many scientific and engineering applications. Most existing work only focus on accelerating matrix multiplication on FPGA by adopting a linea... 详细信息
来源: 评论