咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 294 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 728 篇 工学
    • 573 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 130 篇 信息与通信工程
    • 81 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 41 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 279 篇 理学
    • 176 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 185 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 16 篇 laboratory of di...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 42 篇 wang huaimin
  • 39 篇 li dongsheng
  • 38 篇 dou yong
  • 37 篇 liu jie
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 29 篇 xiaodong wang
  • 29 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,070 篇 英文
  • 63 篇 中文
  • 10 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Processing"
1143 条 记 录,以下是701-710 订阅
排序:
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
Security issues and solutions in cloud computing
Security issues and solutions in cloud computing
收藏 引用
32nd IEEE International Conference on distributed Computing Systems Workshops, ICDCSW 2012
作者: You, Pengfei Peng, Yuxing Liu, Weidong Xue, Shoufu National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China Jiangsu Automation Research Institute Jiangsu China Air Defense Forces Academy CPLA Zhengzhou Henan China
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and ... 详细信息
来源: 评论
Prediction-based federated management of multi-scale resources in cloud
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第6期4卷 324-334页
作者: Shi, Peichang Wang, Huaimin Yin, Gang Lu, Fengshun Wang, Tianzuo National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China
The connotation of the cloud resources have been extended to be multi-scale resources, which includes central resources as presented by data center, edge resources as presented by Content Delivery Network (CDN) and en... 详细信息
来源: 评论
Topology-aware deployment of scientific applications in cloud computing
Topology-aware deployment of scientific applications in clou...
收藏 引用
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012
作者: Fan, Pei Chen, Zhenbang Wang, Ji Zheng, Zibin Lyu, Michael R. National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论
A Multi-Hash Based Signature Allocation Method in Wireless Network
A Multi-Hash Based Signature Allocation Method in Wireless N...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Xuan Dong Xiaodong Wang Shaohe Lv Quan Liu Hu Shen Wenping Liu Xingming Zhou National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Wireless interference does not necessarily result in the lost of all the information of the desired signal. In this paper, we study the signature allocation in wireless networks by exploiting the retained signal featu... 详细信息
来源: 评论
Game-based software errors detection
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第15期4卷 426-433页
作者: Chen, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is... 详细信息
来源: 评论
Exploiting Attribute Redundancy in Extracting Open Source Forge Websites
Exploiting Attribute Redundancy in Extracting Open Source Fo...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Xiang Li Yanxu Zhu Gang Yin Tao Wang Huaimin Wang National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among ... 详细信息
来源: 评论
Research of Context Situation Awareness Technology
Research of Context Situation Awareness Technology
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Dianxi Shi Zhendong Wu Bo Ding Huining Yan National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
Simulation-based evaluation of the Imagine stream processor with scientific programs
收藏 引用
International Journal of High Performance Computing and Networking 2012年 第2期7卷 99-110页
作者: Che, Yonggang Xu, Chuanfu Lu, Pingjing Wang, Zhenghua National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 Hunan China
This paper evaluates the performance and efficiency of Imagine stream processor for scientific programs. It classifies scientific programs into three classes based on their computation to memory access ratios. Typical... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Jiangchao Liu Liqian Chen Longming Dong Ji Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论