咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 294 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 728 篇 工学
    • 573 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 130 篇 信息与通信工程
    • 81 篇 电子科学与技术(可...
    • 76 篇 控制科学与工程
    • 55 篇 生物工程
    • 54 篇 机械工程
    • 41 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 建筑学
    • 12 篇 农业工程
    • 11 篇 交通运输工程
    • 11 篇 环境科学与工程(可...
  • 279 篇 理学
    • 176 篇 数学
    • 58 篇 生物学
    • 47 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 22 篇 化学
  • 185 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 农学
  • 9 篇 教育学
  • 7 篇 医学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 46 篇 distributed proc...
  • 44 篇 laboratories
  • 42 篇 computational mo...
  • 31 篇 kernel
  • 29 篇 algorithm design...
  • 28 篇 concurrent compu...
  • 28 篇 computer archite...
  • 27 篇 graphics process...
  • 27 篇 benchmark testin...
  • 25 篇 fault tolerance
  • 25 篇 hardware
  • 24 篇 feature extracti...
  • 23 篇 throughput
  • 23 篇 semantics
  • 22 篇 servers
  • 22 篇 cloud computing
  • 21 篇 parallel process...
  • 21 篇 protocols
  • 21 篇 training
  • 20 篇 deep learning

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 103 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 school of comput...
  • 38 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 16 篇 laboratory of di...
  • 15 篇 national univers...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 42 篇 wang huaimin
  • 39 篇 li dongsheng
  • 38 篇 dou yong
  • 37 篇 liu jie
  • 37 篇 wang ji
  • 36 篇 dongsheng li
  • 36 篇 huaimin wang
  • 35 篇 ji wang
  • 31 篇 jie liu
  • 30 篇 yijie wang
  • 29 篇 xiaodong wang
  • 29 篇 wang yijie
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 gang yin
  • 22 篇 tao wang
  • 21 篇 zhigang luo
  • 21 篇 xicheng lu

语言

  • 1,070 篇 英文
  • 63 篇 中文
  • 10 篇 其他
检索条件"机构=National Key Laboratory of Parallel and Distributed Processing"
1143 条 记 录,以下是711-720 订阅
排序:
Reduced complexity tree-structured conditional random field for all-words word sense disambiguation
收藏 引用
Journal of Computational Information Systems 2012年 第3期8卷 1177-1186页
作者: Zhou, Yun Wang, Ting Wang, Zhiyuan Xie, Songxian Computer School National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
In this paper, we apply tree-structured conditional random field (TCRF) to all-words word sense disambiguation (WSD), where the graphical structure of TCRF is the dependency syntax tree produced by Minipar. The extrem... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Longming Dong Liqian Chen Jiangchao Liu Renjian Li National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures
Invalid Pointer Dereferences Detection for CPS Software Base...
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Longming Dong Wei Dong Liqian Chen National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Invalid pointer dereferences, such as null pointer dereferences, dangling pointer dereferences and double frees, are a prevalent source of software bugs in CPS software, due to flexible dereferencing pointers along va... 详细信息
来源: 评论
Skyline Query processing on Interval Uncertain Data
Skyline Query Processing on Interval Uncertain Data
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Xiaoyong Li Yijie Wang Xiaoling Li Guangdong Wang National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Many recent applications involve processing and analyzing uncertain data. Recently, several research efforts have addressed answering skyline queries efficiently on massive uncertain datasets. However, the research la... 详细信息
来源: 评论
A study of strategies to restrain the C&C activities of structured P2P botnets
A study of strategies to restrain the C&C activities of stru...
收藏 引用
International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Tianzuo Wang Bo Liu Huaimin Wang Hao Ren Xiaolong Ma School of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense and Technology Changsha China
Botnets are threatening the Internet heavily, and more and more botnets are utilizing the P2P technology to build their C&C (Command and Control) mechanisms. Some research have been made to compare the resilience ... 详细信息
来源: 评论
SMP-SIM: An event-driven performance simulator for SMP
SMP-SIM: An event-driven performance simulator for SMP
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Xin Zhang Yuhua Tang Yufei Lin Xinhai Xu Xiaowei Guo Xiaoguang Ren National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Performance prediction for the high performance computer system is of great importance for designing, implementing, and optimizing system. As a widely used technique for predicting performance, simulation method attra... 详细信息
来源: 评论
Bodhi: Detecting Buffer Overflows with a Game
Bodhi: Detecting Buffer Overflows with a Game
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Jie Chen Xiaoguang Mao School of Computer National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论
Detecting faults by tracing companion states in cloud computing systems
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第5期35卷 856-870页
作者: Rao, Xiang Wang, Huai-Min Chen, Zhen-Bang Zhou, Yang-Fan Cai, Hua Zhou, Qi Sun, Ting-Tao National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China Department of Computing Platform Alibaba Cloud Computing Company Hangzhou 310011 China
A common way to construct a fault model is injecting the fault into the system and observing the subsequent symptoms, e. g. event logs. However, fault features would vary during the propagation period, and present dif... 详细信息
来源: 评论
Server-uncertain spectrum trading in cognitive radio networks: A queueing-theoretic modeling approach
Server-uncertain spectrum trading in cognitive radio network...
收藏 引用
International Conference on Cognitive Radio Oriented Wireless Networks and Communications
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Department of Network Engineering College of Computer National University of Defense Technology Changsha China
Spectrum trading is the promising method to improve spectrum efficiency from the perspective of economics. In this paper we propose a queueing-theory based spectrum trading model, where the primary user plays the serv... 详细信息
来源: 评论
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论