咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 297 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 572 篇 计算机科学与技术...
    • 418 篇 软件工程
    • 127 篇 信息与通信工程
    • 78 篇 电子科学与技术(可...
    • 73 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 38 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 280 篇 理学
    • 177 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 185 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 135 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 17 篇 laboratory of di...
  • 16 篇 national laborat...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...

作者

  • 44 篇 wang huaimin
  • 42 篇 yong dou
  • 40 篇 li dongsheng
  • 39 篇 liu jie
  • 38 篇 dou yong
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 30 篇 wang yijie
  • 29 篇 xiaodong wang
  • 27 篇 yin gang
  • 26 篇 peng yuxing
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,073 篇 英文
  • 63 篇 中文
  • 10 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Processing"
1146 条 记 录,以下是271-280 订阅
排序:
An improved independent set ordering algorithm for solving large-scale sparse linear systems
An improved independent set ordering algorithm for solving l...
收藏 引用
International Conference on Intelligent Human-Machine Systems and Cybernetics
作者: Yao, Lu Cao, Wei Li, Zongzhe Wang, Yongxian Wang, Zhenghua National Key Lab. for Parallel and Distributed Processing National Univ. of Defense Technology Changsha China
The independent set ordering algorithm is a heuristic algorithm based on finding maximal independent sets of vertices in the matrix adjacency graph, which is commonly used for parallel matrix factorization. However, D... 详细信息
来源: 评论
Modeling organization structure of multi-agent system
Modeling organization structure of multi-agent system
收藏 引用
2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology
作者: Xinjun, Mao Ji, Wang Jiajia, Chen National Laboratory for Parallel and Distributed Processing 300 Lichen Road Changsha Hunan Province 410073 China
Organization concepts can act as abstractions to analyze and design multi-agent system (MAS). Organizational structure is such an abstraction used to describe the overall architecture of MAS and therefore to design AO... 详细信息
来源: 评论
Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data  27
Effective Anomaly Detection Based on Reinforcement Learning ...
收藏 引用
27th IEEE International Conference on parallel and distributed Systems, ICPADS 2021
作者: Wang, Zhongyang Wang, Yijie Xu, Hongzuo Wang, Yongjun National University of Defense Technology Science and Technology on Parallel Distributed Processing Laboratory College of Computer China
Mixed-type data with both categorical and numerical features are ubiquitous in network security, but the existing methods are minimal to deal with them. Existing methods usually process mixed-type data through feature... 详细信息
来源: 评论
Fault tolerant Lu factorization in transactional memory system
Fault tolerant Lu factorization in transactional memory syst...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Song, Wei Jia, Jia National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
With the popularization of multi-core processors, transaction memory, as a concurrent control mechanism with easy programing and high scalability, has attracted more and more attention. As a result, the reliability pr... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Versionized process based on non-volatile random-access memory for fine-grained fault tolerance
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2018年 第2期19卷 192-205页
作者: Wen-zhe ZHANG Kai LU Xiao-ping WANG Science and Technology on Parallel and Distributed Processing Laboratory College of ComputerNational University of Defense Technology
Non-volatile random-access memory(NVRAM) technology is maturing rapidly and its byte-persistence feature allows the design of new and efficient fault tolerance mechanisms. In this paper we propose the versionized pr... 详细信息
来源: 评论
Automatic Data Distribution for Improving Data Locality on the Cell BE Architecture
Automatic Data Distribution for Improving Data Locality on t...
收藏 引用
22nd International Workshop on Languages and Compilers for parallel Computing
作者: Wang, Miao Bodin, Francois Matz, Sebastien National Laboratory for Parallel and Distributed Processing NUDT China CAPS Entreprise Rennes France University of Rennes 1 Rennes France
Multicore systems provide potential to improve the performance of the applications. However, substantial programming effort is required to exploit the power of the parallelism. This paper presents a single source comp... 详细信息
来源: 评论
Exploring the patterns of social behavior in Github  1
Exploring the patterns of social behavior in Github
收藏 引用
1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014
作者: Yu, Yue Yin, Gang Wang, Huaimin Wang, Tao National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha410073 China
Social coding paradigm is reshaping the distributed soft- ware development with a surprising speed in recent years. Github, a remarkable social coding community, attracts a huge number of developers in a short time. V... 详细信息
来源: 评论
Bodhi: Detecting buffer overflows with a game
Bodhi: Detecting buffer overflows with a game
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Chen, Jie Mao, Xiaoguang National Laboratory for Parallel and Distributed Processing Changsha China School of Computer National University of Defense Technology Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论
RScam: Cloud-based anti-malware via reversible sketch  11th
RScam: Cloud-based anti-malware via reversible sketch
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Sun, Hao Wang, Xiaofeng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Cybercrime caused by malware becomes a persistent and damaging threat which makes the trusted security solution urgently demanded, especially for resource-constrained ends. The existing industry and academic approache... 详细信息
来源: 评论