咨询与建议

限定检索结果

文献类型

  • 510 篇 会议
  • 195 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 464 篇 工学
    • 358 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 87 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 54 篇 控制科学与工程
    • 35 篇 机械工程
    • 35 篇 生物工程
    • 29 篇 电气工程
    • 18 篇 仪器科学与技术
    • 16 篇 动力工程及工程热...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
  • 168 篇 理学
    • 101 篇 数学
    • 36 篇 生物学
    • 29 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
  • 121 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 法学
    • 11 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 22 篇 training
  • 19 篇 benchmark testin...
  • 18 篇 fault tolerance
  • 18 篇 distributed proc...
  • 18 篇 feature extracti...
  • 17 篇 kernel
  • 16 篇 computer archite...
  • 16 篇 semantics
  • 15 篇 deep learning
  • 15 篇 concurrent compu...
  • 15 篇 laboratories
  • 14 篇 servers
  • 14 篇 hardware
  • 13 篇 algorithm design...
  • 13 篇 cloud computing
  • 12 篇 parallel process...
  • 12 篇 graphics process...
  • 12 篇 optimization
  • 12 篇 protocols

机构

  • 112 篇 college of compu...
  • 81 篇 national laborat...
  • 77 篇 science and tech...
  • 47 篇 national laborat...
  • 35 篇 school of comput...
  • 30 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 science and tech...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 college of compu...
  • 11 篇 science and tech...
  • 10 篇 national laborat...
  • 10 篇 national key lab...

作者

  • 32 篇 dongsheng li
  • 29 篇 wang yijie
  • 28 篇 yijie wang
  • 27 篇 li dongsheng
  • 27 篇 wang huaimin
  • 21 篇 huaimin wang
  • 20 篇 zhigang luo
  • 18 篇 naiyang guan
  • 18 篇 peng yuxing
  • 16 篇 yuxing peng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 dou yong
  • 14 篇 liu jie
  • 14 篇 ji wang
  • 13 篇 wang ji
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 wang huai-min

语言

  • 661 篇 英文
  • 42 篇 中文
  • 4 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing College of Computer"
707 条 记 录,以下是121-130 订阅
排序:
Survey of DHT topology construction techniques in virtual computing environments
收藏 引用
Science China(Information Sciences) 2011年 第11期54卷 2221-2235页
作者: ZHANG YiMing 1,2,LU XiCheng 1,2 & LI DongSheng 1,21 national laboratory for parallel and distributed processing (PDL),Changsha 410073,China 2 School of computer,national University of Defense Technology,Changsha 410073,China 1. National Laboratory for Parallel and Distributed Processing (PDL) Changsha 410073 China2. School of Computer National University of Defense Technology Changsha 410073 China
The Internet-based virtual computing environment (iVCE) is a novel network computing *** characteristics of growth,autonomy,and diversity of Internet resources present great challenges to resource sharing in *** DHT o... 详细信息
来源: 评论
Storage allocation for redundancy scheme in reliability-aware cloud systems
Storage allocation for redundancy scheme in reliability-awar...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011
作者: Huang, Zhen Yuan, Yuan Peng, Yuxing National Laboratory of Parallel and Distributed Processing Computer Department National University of Defense Technology Changsha China
As the burst increasing of created and demand on information and data, the efficient solution on storage management is highly required in the cloud storage systems. As an important component of management, storage all... 详细信息
来源: 评论
Automated WCET analysis based on program modes
Automated WCET analysis based on program modes
收藏 引用
1st International Workshop on Automation of Software Test, AST'06, Co-located with the 28th International Conference on Software Engineering, ICSE 2009
作者: Ji, Meng-Luo Wang, Ji Li, Shuhao Qi, Zhi-Chang School of Computer National University of Defense Technology China National Laboratory for Parallel and Distributed Processing China
Program mode is a regular trajectory of the execution of a program that is determined by the values of its input variables. By exploiting program modes we may make Worst Case Execution Time (WCET) analysis more precis... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Liu, Jiangchao Chen, Liqian Dong, Longming Wang, Ji National Laboratory for Parallel and Distributed Processing School of Computer National University of Defence Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
Automating software FMEA via formal analysis of dependence relations
Automating software FMEA via formal analysis of dependence r...
收藏 引用
32nd Annual IEEE International computer Software and Applications Conference, COMPSAC 2008
作者: Dong, Wei Wang, Ji Zhao, Changzhi Zhang, Xian Tian, Jie School of Computer National University of Defense Technology China National Laboratory for Parallel and Distributed Processing China
The paper presents the ongoing work of studying FMEA method for embedded safety critical software via formal analysis of various dependence relations among software elements, which can fairly improve the automation an... 详细信息
来源: 评论
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking
收藏 引用
Frontiers of computer Science 2019年 第2期13卷 247-263页
作者: Pengfei WANG Kai LU Gen LI Xu ZHOU Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China College of Computer National University of Defense Technology Changsha 410073 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha 410073 China
A race condition is a common trigger for concurrency bugs. As a special case, a race condition can also occur across the kernel and user space causing a doublefetch bug, which is a field that has received little resea... 详细信息
来源: 评论
Impact of imprecise programming of memristor on building hardware neural network
Impact of imprecise programming of memristor on building har...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Zhu, Xuan National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology ChangSha China
The application of memristor in building hardware neural network has accepted widespread interests, and may bring novel opportunities to neural computing. However, due to the limitation of programming precision, the c... 详细信息
来源: 评论
iRank: Supporting proximity ranking for peer-to-peer applications
iRank: Supporting proximity ranking for peer-to-peer applica...
收藏 引用
15th International Conference on parallel and distributed Systems, ICPADS '09
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China
Proximity ranking according to end-to-end network distances (e.g., Round-Trip Time, RTT) can reveal detailed proximity information, which is important in network management and performance diagnosis in distributed sys... 详细信息
来源: 评论
A case study of SWIM: Optimization of memory intensive application on GPGPU
A case study of SWIM: Optimization of memory intensive appli...
收藏 引用
International Symposium on parallel Architectures, Algorithms, and Programming
作者: Yi, Wei Tang, Yuhua Wang, Guibin Fang, Xudong National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Recently, GPGPU has been adopted well in the High Performance Computing (HPC) field. The limited global memory bandwidth poses a great challenge to many GPGPU programmers trying to exploit parallelism within the CPUGP... 详细信息
来源: 评论
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory
收藏 引用
Journal of computer Science & Technology 2018年 第3期33卷 587-602页
作者: Kai Lu Peng-Fei Wang Gen Li Xu Zhou College of Computer National University of Defense Technology Changsha 410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China Collaborative Innovation Center of High-Performance Computing National University of Defense Technology Changsha 410073 China
The double fetch problem occurs when the data is maliciously changed between two kernel reads of the supposedly same data, which can cause serious security problems in the kernel. Previous research focused on the doub... 详细信息
来源: 评论