咨询与建议

限定检索结果

文献类型

  • 509 篇 会议
  • 191 篇 期刊文献

馆藏范围

  • 700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 459 篇 工学
    • 353 篇 计算机科学与技术...
    • 258 篇 软件工程
    • 86 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 35 篇 机械工程
    • 35 篇 生物工程
    • 28 篇 电气工程
    • 18 篇 仪器科学与技术
    • 16 篇 动力工程及工程热...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
  • 168 篇 理学
    • 101 篇 数学
    • 36 篇 生物学
    • 29 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
  • 120 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 法学
    • 11 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 22 篇 training
  • 19 篇 benchmark testin...
  • 18 篇 fault tolerance
  • 18 篇 distributed proc...
  • 18 篇 feature extracti...
  • 17 篇 kernel
  • 16 篇 computer archite...
  • 16 篇 semantics
  • 15 篇 deep learning
  • 15 篇 concurrent compu...
  • 15 篇 laboratories
  • 14 篇 servers
  • 14 篇 hardware
  • 13 篇 algorithm design...
  • 13 篇 cloud computing
  • 12 篇 parallel process...
  • 12 篇 graphics process...
  • 12 篇 optimization
  • 12 篇 protocols

机构

  • 112 篇 college of compu...
  • 81 篇 national laborat...
  • 77 篇 science and tech...
  • 47 篇 national laborat...
  • 35 篇 school of comput...
  • 30 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 science and tech...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 10 篇 national key lab...
  • 10 篇 national key lab...

作者

  • 32 篇 dongsheng li
  • 28 篇 yijie wang
  • 28 篇 wang yijie
  • 26 篇 li dongsheng
  • 25 篇 wang huaimin
  • 21 篇 huaimin wang
  • 20 篇 zhigang luo
  • 18 篇 naiyang guan
  • 18 篇 peng yuxing
  • 16 篇 yuxing peng
  • 14 篇 dou yong
  • 14 篇 liu jie
  • 14 篇 ji wang
  • 14 篇 yin gang
  • 13 篇 wang ji
  • 13 篇 ding bo
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 11 篇 zhiquan lai

语言

  • 655 篇 英文
  • 42 篇 中文
  • 3 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing College of Computer"
700 条 记 录,以下是161-170 订阅
排序:
Correlation-based software search by leveraging software term database
收藏 引用
Frontiers of computer Science 2018年 第5期12卷 923-938页
作者: Zhixing LI Gang YIN Tao WANG Yang ZHANG Yue YU Huaimin WANG National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha 410073 China
Internet-scale open source software (OSS) pro- duction in various communities generates abundant reusable resources for software developers. However, finding the de- sired and mature software with keyword queries fr... 详细信息
来源: 评论
Analysis of single-event transient sensitivity in fully depleted silicon-on-insulator MOSFETs
收藏 引用
Nuclear Science and Techniques 2018年 第4期29卷 108-113页
作者: Jing-Yan Xu Shu-Ming Chen Rui-Qiang Song Zhen-Yu Wu Jian-Jun Chen College of Computer National University of Defense Technology National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Based on 3 D-TCAD simulations, single-event transient(SET) effects and charge collection mechanisms in fully depleted silicon-on-insulator(FDSOI) transistors are investigated. This work presents a comparison between28... 详细信息
来源: 评论
A clustering-based approach for mining dockerfile evolutionary trajectories
收藏 引用
Science China(Information Sciences) 2019年 第1期62卷 211-213页
作者: Yang ZHANG Huaimin WANG Vladimir FILKOV Key Laboratory of Parallel and Distributed Computing National University of Defense Technology College of Computer National University of Defense Technology DECAL Lab University of California Computer Science Department University of California
Dear editor,Docker1), as a de-facto industry standard [1], enables the packaging of an application with all its dependencies and execution environment in a light-weight, self-contained unit, i.e., *** launching the co... 详细信息
来源: 评论
A Survey on Approaches and Applications of Knowledge Representation Learning
A Survey on Approaches and Applications of Knowledge Represe...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Chenchen Li Aiping Li Ye Wang Hongkui Tu Yichen Song College of Computer National University of Defense Technology ChangSha China College of Computer Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology ChangSha China
Knowledge representation learning (KRL) is one of the important research topics in artificial intelligence and Natural language processing. It can efficiently calculate the semantics of entities and relations in a low...
来源: 评论
Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks
Hybrid Routing: Towards Resilient Routing in Anonymous Commu...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yusheng Xia Rongmao Chen Jinshu Su Chen Pan Han Su College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Anonymous communication networks (ACNs) are intended to protect the metadata during communication. As classic ACNs, onion mix-nets are famous for strong anonymity, in which the source defines a static path and wraps t... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
作者: Ming Li Bo Liu Guangsheng Xing Xiaodong Wang Zhihui Wang College of Intelligence Science and Technology National University of Defence Technology National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论
Deep Learning for Social Network Information Cascade Analysis: a survey
Deep Learning for Social Network Information Cascade Analysi...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Liqun Gao Bin Zhou Yan Jia Hongkui Tu Ye Wang Chenguang Chen Haiyang Wang Hongwu Zhuang College of Computer National University of Defense Technology ChangSha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology ChangSha China
The following topics are dealt with: learning (artificial intelligence); text analysis; natural language processing; pattern classification; graph theory; data mining; security of data; social networking (online); fea...
来源: 评论
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI C...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Yihao Yang Xiaolei Dong Jiachen Shen Zhenfu Cao Yunbo Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Zongyang Hou Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan Print-Rite Technology Development Co. Ltd. Of Zhuhai China
Private Set Intersection (PSI) is one of the most important functions in secure multiparty computation (MPC). PSI protocols have been a practical cryptographic primitive and there are many privacy-preserving applicati...
来源: 评论
NUMA-aware FFT-based convolution on ARMv8 many-core CPUs
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Xiandong Wang, Qinglin Lu, Shuyu Hao, Ruochen Mei, Songzhu Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China School of Computer Science National University of Defense Technology Changsha410073 China Department of Biomedical Informatics University of Pittsburgh Pittsburgh United States
Convolutional Neural Networks (CNNs), one of the most representative algorithms of deep learning, are widely used in various artificial intelligence applications. Convolution operations often take most of the computat... 详细信息
来源: 评论
Clustering-preserving Network Flow Sketching
Clustering-preserving Network Flow Sketching
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yongquan Fu Dongsheng Li Siqi Shen Yiming Zhang Kai Chen Science and Technology Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology SING Lab Hong Kong University of Science and Technology
Network monitoring is vital in modern clouds and data center networks that need diverse traffic statistics ranging from flow size distributions to heavy hitters. To cope with increasing network rates and massive traff... 详细信息
来源: 评论