咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 294 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 728 篇 工学
    • 573 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 130 篇 信息与通信工程
    • 81 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 41 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 279 篇 理学
    • 176 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 185 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 16 篇 laboratory of di...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 42 篇 wang huaimin
  • 39 篇 li dongsheng
  • 38 篇 dou yong
  • 37 篇 liu jie
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 29 篇 xiaodong wang
  • 29 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,070 篇 英文
  • 63 篇 中文
  • 10 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Processing"
1143 条 记 录,以下是671-680 订阅
排序:
Accurate and simplified prediction of L2 cache vulnerability for cost-efficient soft error protection
Accurate and simplified prediction of L2 cache vulnerability...
收藏 引用
作者: Cheng, Yu Ma, Anguo Zhang, Minxuan National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China
Soft errors caused by energetic particle strikes in on-chip cache memories have become a critical challenge for microprocessor design. Architectural vulnerability factor (AVF), which is defined as the probability that... 详细信息
来源: 评论
Modular heap abstractionion-based code clone detection for heap-manipulating programs
Modular heap abstractionion-based code clone detection for h...
收藏 引用
12th International Conference on Quality Software, QSIC 2012
作者: Dong, Longming Wang, Ji Chen, Liqian National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Code clone is a prevalent activity during the development of softwares. However, it may be harmful to the maintenance and evolution of softwares. Current techniques for detecting code clones are most syntax-based, and... 详细信息
来源: 评论
A logistic regression model for Semantic Web service matchmaking
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1715-1720页
作者: WEI DengPing 1 ,WANG Ting 1 & WANG Ji 2 1 School of Computer,national University of Defense Technology,Changsha 410073,China 2 national laboratory for parallel and distributed processing,Changsha 410073,China 1. School of Computer National University of Defense Technology Changsha 410073 China2. National Laboratory for Parallel and Distributed Processing Changsha 410073 China
Semantic Web service matchmaking,as one of the most challenging problems in Semantic Web services (SWS),aims to filter and rank a set of services with respect to a service query by using a certain matching *** this pa... 详细信息
来源: 评论
Runtime monitoring for cyber-physical systems: A case study of cooperative adaptive cruise control
Runtime monitoring for cyber-physical systems: A case study ...
收藏 引用
2nd International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2012
作者: Mao, Jianhui Chen, Liqian National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Cyber-Physical Systems (CPS) involve deep interactions between computation cores, communication networks, and physical environments. These systems are inherently complex and highly nondeterministic. This makes the tra... 详细信息
来源: 评论
Research of context situation awareness technology
Research of context situation awareness technology
收藏 引用
作者: Shi, Dianxi Wu, Zhendong Ding, Bo Yan, Huining National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
Workload-awared HPC system scalability analysis based on electronic technology developing
Workload-awared HPC system scalability analysis based on ele...
收藏 引用
2012 International Conference on Mechanical and Electronic Engineering, ICMEE 2012
作者: Lin, Yufei Tang, Yuhua Zhang, Xin National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
As the electronic technology develops, the integration levels of CPUs and memories keep growing, and the speeds of communication devices are improved. The high-performance computing (HPC) systems consist of processing... 详细信息
来源: 评论
On the feasibility of common-friend measurements for the distributed online social networks
On the feasibility of common-friend measurements for the dis...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme th... 详细信息
来源: 评论
BCE: A privacy-preserving common-friend estimation method for distributed online social networks without cryptography
BCE: A privacy-preserving common-friend estimation method fo...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed online social networks (DOSN) have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose BCE (Bloom Filter based Common-Friend Est... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Liu, Jiangchao Chen, Liqian Dong, Longming Wang, Ji National Laboratory for Parallel and Distributed Processing School of Computer National University of Defence Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
Speculative symbolic execution
Speculative symbolic execution
收藏 引用
2012 IEEE 23rd International Symposium on Software Reliability Engineering, ISSRE 2012
作者: Zhang, Yufeng Chen, Zhenbang Wang, Ji National Laboratory for Parallel and Distributed Processing Department of Computing Science National University of Defense Technology Changsha China
Symbolic execution is an effective path oriented and constraint based program analysis technique. Recently, there is a significant development in the research and application of symbolic execution. However, symbolic e... 详细信息
来源: 评论