咨询与建议

限定检索结果

文献类型

  • 123 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 105 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 24 篇 信息与通信工程
    • 22 篇 生物工程
    • 19 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
  • 51 篇 理学
    • 26 篇 数学
    • 23 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
  • 41 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 医学

主题

  • 9 篇 computational mo...
  • 9 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 performance eval...
  • 5 篇 task analysis
  • 5 篇 anomaly detectio...
  • 4 篇 self-supervised ...
  • 4 篇 graph neural net...
  • 4 篇 predictive model...
  • 4 篇 semantics
  • 4 篇 machine learning
  • 4 篇 kernel
  • 4 篇 graphics process...
  • 4 篇 accuracy
  • 4 篇 cryptography
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 neural networks

机构

  • 36 篇 college of compu...
  • 14 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 6 篇 college of compu...
  • 6 篇 science and tech...
  • 5 篇 key laboratory o...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 4 篇 school of automa...
  • 4 篇 national univers...
  • 4 篇 national key lab...
  • 4 篇 college of compu...
  • 4 篇 sino-german coll...
  • 4 篇 college of syste...
  • 4 篇 nuclear power in...

作者

  • 13 篇 li dongsheng
  • 13 篇 wang yijie
  • 12 篇 wang huaimin
  • 11 篇 huaimin wang
  • 10 篇 lai zhiquan
  • 8 篇 dongsheng li
  • 8 篇 ding bo
  • 7 篇 peichang shi
  • 7 篇 xu hongzuo
  • 7 篇 xu kele
  • 6 篇 dou yong
  • 6 篇 yijie wang
  • 6 篇 wang wei
  • 6 篇 zhiquan lai
  • 6 篇 qiao peng
  • 6 篇 wang xiaodong
  • 6 篇 yue yu
  • 5 篇 guodong yi
  • 5 篇 wang tao
  • 5 篇 jinshu su

语言

  • 176 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing College of Computer"
188 条 记 录,以下是61-70 订阅
排序:
Adaptive and augmented active anomaly detection on dynamic network traffic streams
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2024年 第3期25卷 446-460页
作者: Bin LI Yijie WANG Li CHENG National Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense TechnologyChangsha 410073China College of System Engineering National University of Defense TechnologyChangsha 410073China
Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model,and has been widely adopted in detecting network ***,existing methods cannot achieve desirable per... 详细信息
来源: 评论
Efficient detection of dangling pointer error for C/C++ programs  2
Efficient detection of dangling pointer error for C/C++ prog...
收藏 引用
2nd Annual International Conference on Information System and Artificial Intelligence, ISAI 2017
作者: Zhang, Wenzhe Science and Technology on Parallel and Distributed Laboratory State Key Laboratory of High Performance Computing State Key Laboratory of High-end Server and Storage Technology College of Computer National University of Defense Technology Changsha China
Dangling pointer error is pervasive in C/C++ programs and it is very hard to detect. This paper introduces an efficient detector to detect dangling pointer error in C/C++ programs. By selectively leave some memory acc... 详细信息
来源: 评论
Galaxyfly: A novel family of flexible-radix low-diameter topologies for large-scales interconnection networks  16
Galaxyfly: A novel family of flexible-radix low-diameter top...
收藏 引用
30th International Conference on Supercomputing, ICS 2016
作者: Lei, Fei Dong, Dezun Liao, Xiangke Su, Xing Li, Cunlu National Laboratory for Parallel and Distributed Processing Collaborative Innovation Center of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China
Interconnection network plays an essential role in the architecture of large-scale high performance computing (HPC) systems. In the paper, we construct a novel family of lowdiameter topologies, Galaxyfly, using techni... 详细信息
来源: 评论
Exploiting contention and congestion aware switch allocation in network-on-chips  17
Exploiting contention and congestion aware switch allocation...
收藏 引用
50th ACM Turing Conference - China, ACM TUR-C 2017
作者: Li, Cunlu Dongy, Dezun Liao, Xiangke National Laboratory for Parallel and Distributed Processing Collaborative Innovation Center of High Performance Computing College of Computer National University of Defense Technology Changsha Hunan410073 China
Network-on-chip system plays an important role to improve the performance of chip multiprocessor systems. As the complexity of the network increases, congestion problem has become the major performance bottleneck and ... 详细信息
来源: 评论
RScam: Cloud-based anti-malware via reversible sketch  11th
RScam: Cloud-based anti-malware via reversible sketch
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Sun, Hao Wang, Xiaofeng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Cybercrime caused by malware becomes a persistent and damaging threat which makes the trusted security solution urgently demanded, especially for resource-constrained ends. The existing industry and academic approache... 详细信息
来源: 评论
Crowd intelligence in AI 2.0 era
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2017年 第1期18卷 15-43页
作者: Wei LI Wen-jun WU Huai-min WANG Xue-qi CHENG Hua-jun CHEN Zhi-hua ZHOU Rong DING State Key Laboratory of Software Development Beihang University National Laboratory for Parallel and Distributed Processing College of ComputerNational University of Defense Technology Institute of Computing Technology Chinese Academy of Sciences College of Computer Science and Technology Zhejiang University National Key Laboratory for Novel Software Technology Nanjing University
The Internet based cyber-physical world has profoundly changed the information environment for the development of artificial intelligence(AI), bringing a new wave of AI research and promoting it into the new era of AI... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
Unified virtual memory support for deep CNN accelerator on soC FPGA  1
收藏 引用
15th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2015
作者: Xiao, Tao Qiao, Yuran Shen, Junzhong Yang, Qianming Wen, Mei College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Cooperation of CPU and hardware accelerator on SoC FPGA to accomplish computational intensive tasks, provides significant advantages in performance and energy efficiency. However, current operating systems provide lit... 详细信息
来源: 评论
Comparing performance of hierarchical identity-based signature schemes
Comparing performance of hierarchical identity-based signatu...
收藏 引用
作者: Chen, Peixin Wu, Yilun Su, Jinshu Wang, Xiaofeng College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
The key escrow problem and high computational cost are the two major problems that hinder the wider adoption of hierarchical identity-based signature (HIBS) scheme. HIBS schemes with either escrow-free (EF) or online/... 详细信息
来源: 评论
A novel L1 cache based on volatile STT-RAM  20th
A novel L1 cache based on volatile STT-RAM
收藏 引用
20th Annual Conference on computer Engineering and Technology, NCCET 2016
作者: Hongguang, Zhang Minxuan, Zhang College of Computer National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Spin-transfer torque random access memory (STT-RAM) is one of the most promising substitutes for universal main memory and cache due to its excellent scalability, high density and low leakage power. Nevertheless, the ... 详细信息
来源: 评论