咨询与建议

限定检索结果

文献类型

  • 123 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 105 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 24 篇 信息与通信工程
    • 22 篇 生物工程
    • 19 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
  • 51 篇 理学
    • 26 篇 数学
    • 23 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
  • 41 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 医学

主题

  • 9 篇 computational mo...
  • 9 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 performance eval...
  • 5 篇 task analysis
  • 5 篇 anomaly detectio...
  • 4 篇 self-supervised ...
  • 4 篇 graph neural net...
  • 4 篇 predictive model...
  • 4 篇 semantics
  • 4 篇 machine learning
  • 4 篇 kernel
  • 4 篇 graphics process...
  • 4 篇 accuracy
  • 4 篇 cryptography
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 neural networks

机构

  • 36 篇 college of compu...
  • 14 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 xiangjiang lab
  • 6 篇 college of compu...
  • 6 篇 science and tech...
  • 5 篇 key laboratory o...
  • 5 篇 school of advanc...
  • 5 篇 national key lab...
  • 4 篇 school of automa...
  • 4 篇 national univers...
  • 4 篇 national key lab...
  • 4 篇 college of compu...
  • 4 篇 sino-german coll...
  • 4 篇 college of syste...
  • 4 篇 nuclear power in...

作者

  • 13 篇 li dongsheng
  • 13 篇 wang yijie
  • 12 篇 wang huaimin
  • 11 篇 huaimin wang
  • 10 篇 lai zhiquan
  • 8 篇 dongsheng li
  • 8 篇 ding bo
  • 7 篇 peichang shi
  • 7 篇 xu hongzuo
  • 7 篇 xu kele
  • 6 篇 dou yong
  • 6 篇 yijie wang
  • 6 篇 wang wei
  • 6 篇 zhiquan lai
  • 6 篇 qiao peng
  • 6 篇 wang xiaodong
  • 6 篇 yue yu
  • 5 篇 guodong yi
  • 5 篇 wang tao
  • 5 篇 jinshu su

语言

  • 176 篇 英文
  • 7 篇 中文
  • 5 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Computing College of Computer"
188 条 记 录,以下是81-90 订阅
排序:
Local-Adaptive Transformer for Multivariate Time Series Anomaly Detection and Diagnosis
Local-Adaptive Transformer for Multivariate Time Series Anom...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiaohui Zhou Yijie Wang Hongzuo Xu Mingyu Liu Ruyi Zhang National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
Time series data are pervasive in varied real-world applications, and accurately identifying anomalies in time series is of great importance. Many current methods are insufficient to model long-term dependence, wherea...
来源: 评论
Rethinking the distributed DNN Training Cluster Design from the Cost-effectiveness View
Rethinking the Distributed DNN Training Cluster Design from ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Zhiquan Lai Yujie Liu Wei Wang Yanqi Hao Dongsheng Li National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
As deep learning grows rapidly, model training heavily relies on parallel methods and there exist numerous cluster configurations. However, current preferences for parallel training focus on data centers, overlooking ...
来源: 评论
Communication Analysis for Multidimensional parallel Training of Large-scale DNN Models
Communication Analysis for Multidimensional Parallel Trainin...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Zhiquan Lai Yanqi Hao Shengwei Li Dongsheng Li National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
Multidimensional parallel training has been widely applied to train large-scale deep learning models like GPT-3. The efficiency of parameter communication among training devices/processes is often the performance bott...
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features  10th
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Li, Ming Liu, Bo Xing, Guangsheng Wang, Xiaodong Wang, Zhihui College of Intelligence Science and Technology National University of Defence Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
Efficient Large Models Fine-tuning on Commodity Servers via Memory-balanced Pipeline parallelism
Efficient Large Models Fine-tuning on Commodity Servers via ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Yujie Liu Zhiquan Lai Weijie Liu Wei Wang Dongsheng Li National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
Large models have achieved impressive performance in many downstream tasks. Using pipeline parallelism to fine-tune large models on commodity GPU servers is an important way to make the excellent performance of large ...
来源: 评论
Boundary-Driven Active Learning for Anomaly Detection in Time Series Data Streams
Boundary-Driven Active Learning for Anomaly Detection in Tim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaohui Zhou Yijie Wang Hongzuo Xu Mingyu Liu National Key Laboratory of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China
The key to anomaly detection in time series data streams (TSDS) lies in the ability to adapt to evolving data. Active learning for anomaly detection has shown such ability by leveraging expert feedback. However, many ...
来源: 评论
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for Highly-Effective Drug-Protein Interaction Representation
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Qiu, Yanlong Wang, Siqi Yang, Xi Qiu, Xinyuan Wu, Chengkun Cui, Yingbo Yang, Canqun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science Hunan Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Hunan Changsha410073 China National University of Defense Technology Department of Biology and Chemistry College of Science Hunan Changsha410073 China
With the exponential growth of biomedical knowledge in unstructured text repositories such as PubMed, it is imminent to establish a knowledge graph-style, efficient searchable and targeted database that can support th... 详细信息
来源: 评论
HSDP: Accelerating Large-scale Model Training via Efficient Sharded Data parallelism
HSDP: Accelerating Large-scale Model Training via Efficient ...
收藏 引用
International Symposium on parallel and distributed Processing with Applications, ISPA
作者: Yanqi Hao Zhiquan Lai Wei Wang Shengwei Li Weijie Liu Keshi Ge Dongsheng Li National Key Laboratory of Parallel and Distributed Computing(PDL) College of Computer National University of Defense Technology Changsha China
Large deep neural network (DNN) models have demonstrated exceptional performance across diverse downstream tasks. Sharded data parallelism (SDP) has been widely used to reduce the memory footprint of model states. In ... 详细信息
来源: 评论
A novel hybrid architecture for high speed regular expression matching  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Xu, Chengcheng Zhao, Baokang Chen, Shuhui Su, Jinshu College of Computer National University of Defense Technology No. 137 Yanwachi Street ChangshaHunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Mobile devices play an important role in our everyday lives, but they also bring great security threats. Deep packet inspection (DPI) is one of the most efficient methods to detect the malicious information hidden in ... 详细信息
来源: 评论
Understanding User Interests Acquisition in Personalized Online Course Recommendation
收藏 引用
Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Conference on Web and Big Data, APWeb-WAIM 2018
作者: Li, Xiao Wang, Ting Wang, Huaimin Tang, Jintao Information Center National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
MOOCs have attracted a large number of learners with different education background all over the world. Despite its increasing popularity, MOOCs still suffer from the problem of high drop-out rate. One important reaso... 详细信息
来源: 评论