咨询与建议

限定检索结果

文献类型

  • 510 篇 会议
  • 191 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 703 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 459 篇 工学
    • 353 篇 计算机科学与技术...
    • 258 篇 软件工程
    • 86 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 35 篇 机械工程
    • 35 篇 生物工程
    • 28 篇 电气工程
    • 18 篇 仪器科学与技术
    • 16 篇 动力工程及工程热...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
  • 168 篇 理学
    • 101 篇 数学
    • 36 篇 生物学
    • 29 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
  • 120 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 法学
    • 11 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 22 篇 training
  • 19 篇 benchmark testin...
  • 18 篇 fault tolerance
  • 18 篇 distributed proc...
  • 18 篇 feature extracti...
  • 17 篇 kernel
  • 16 篇 computer archite...
  • 16 篇 semantics
  • 15 篇 deep learning
  • 15 篇 concurrent compu...
  • 15 篇 laboratories
  • 14 篇 servers
  • 14 篇 hardware
  • 13 篇 algorithm design...
  • 13 篇 cloud computing
  • 12 篇 parallel process...
  • 12 篇 graphics process...
  • 12 篇 optimization
  • 12 篇 protocols

机构

  • 112 篇 college of compu...
  • 81 篇 national laborat...
  • 77 篇 science and tech...
  • 47 篇 national laborat...
  • 35 篇 school of comput...
  • 30 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 science and tech...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 10 篇 national key lab...
  • 10 篇 national key lab...

作者

  • 32 篇 dongsheng li
  • 28 篇 yijie wang
  • 28 篇 wang yijie
  • 26 篇 li dongsheng
  • 25 篇 wang huaimin
  • 21 篇 huaimin wang
  • 20 篇 zhigang luo
  • 18 篇 naiyang guan
  • 18 篇 peng yuxing
  • 16 篇 yuxing peng
  • 14 篇 dou yong
  • 14 篇 liu jie
  • 14 篇 ji wang
  • 14 篇 yin gang
  • 13 篇 wang ji
  • 13 篇 ding bo
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 yong dou

语言

  • 658 篇 英文
  • 42 篇 中文
  • 3 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing College of Computer"
703 条 记 录,以下是401-410 订阅
排序:
Power and performance analysis of the Graph 500 benchmark on the Single-chip Cloud computer
Power and performance analysis of the Graph 500 benchmark on...
收藏 引用
International Conference on Cloud Computing and Internet of Things (CCIOT)
作者: Zhiquan Lai King Tin Lam Cho-Li Wang Jinshu Su College of Computer National University of Defense Technology Changsha China Department of Computer Science The University of Hong Kong Hong Kong China National Key Laboratory of Parallel and Distributed Processing (PDL) Changsha China
The concerns of data-intensiveness and energy awareness are actively reshaping the design of high-performance computing (HPC) systems nowadays. The Graph500 is a widely adopted benchmark for evaluating the performance... 详细信息
来源: 评论
Translation Non-negative Matrix Factorization with Fast Optimization
Translation Non-negative Matrix Factorization with Fast Opti...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Yuanyuan Wang Naiyang Guan Bin Mao Xuhui Huang Zhigang Luo Department of Basic Courses Army Officer Academy Science and Technology on Parallel and Distributed Processing Laboratory College of Computer Science National University of Defense Technology College of Science National University of Defense Technology College of Computer Science National University of Defense Technology
Non-negative matrix factorization (NMF) reconstructs the original samples in a lower dimensional space and has been widely used in pattern recognition and data mining because it usually yields sparse representation. S... 详细信息
来源: 评论
Enhancing the Security of parallel Programs via Reducing Scheduling Space
Enhancing the Security of Parallel Programs via Reducing Sch...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Xu Zhou Gen Li Kai Lu Shuangxi Wang School of Computer National University of Defense Technology Changsha PR China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha PR China
parallel programs face a new security problem - concurrency vulnerability, which is caused by a special thread scheduling instead of inputs. In this paper, we propose to automatically fix concurrency vulnerabilities b... 详细信息
来源: 评论
Single image defogging with single and multiple hybrid scattering model
Single image defogging with single and multiple hybrid scatt...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Weijiang Feng Naiyang Guan Xiang Zhang Xuhui Huang Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan P.R. China Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan P.R. China
Image defogging (IDF) removes influences of fogs from an image to improve its quality. Since defogged images can significantly boost the performance of subsequent processing, IDF has attracted many attentions from the... 详细信息
来源: 评论
Effective hierarchical routing algorithm for large-scale wireless mobile networks
收藏 引用
Journal of Networks 2014年 第2期9卷 344-352页
作者: Yan, Guofeng Peng, Yuxing Hu, Ying Liu, Junyi School of Computer and Communication Hunan Institute of Engineering Hunan 411104 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China School of Computer National University of Defense Technology Changsha 410073 China
The growing interest in wireless mobile network techniques has resulted in many routing protocol proposals. The unpredictable motion and the unreliable behavior of mobile nodes is one of the key issues in wireless mob... 详细信息
来源: 评论
RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers
RAFlow: Read Ahead Accelerated I/O Flow through Multiple Vir...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Zhaoning Zhang Kui Wu Huiba Li Jinghua Feng Yuxing Peng Xicheng Lu National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China Computer Science Department University of Victoria B.C. Canada National Super Computing Center Tianjin China
Virtualization is the foundation for cloud computing, and the virtualization can not be achieved without software defined, elastic, flexible and scalable virtual layers. Unfortunately, if multiple virtual storage devi... 详细信息
来源: 评论
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems
A Runtime Verification Based Trace-Oriented Monitoring Frame...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Jingwen Zhou Zhenbang Chen Ji Wang Zibin Zheng Wei Dong College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China
Cloud computing provides a new paradigm for resource utilization and sharing. However, the reliability problems, like system failures, often happen in cloud systems and bring enormous loss. Trace-oriented monitoring i... 详细信息
来源: 评论
Soft-Constrained Nonnegative Matrix Factorization via Normalization
Soft-Constrained Nonnegative Matrix Factorization via Normal...
收藏 引用
International Joint Conference on Neural Networks
作者: Long Lan Naiyang Guan Xiang Zhang Dacheng Tao Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Centre for Quantum Computation & Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology
Semi-supervised clustering aims at boosting the clustering performance on unlabeled samples by using labels from a few labeled samples. Constrained NMF (CNMF) is one of the most significant semi-supervised clustering ... 详细信息
来源: 评论
Box-constrained Projective Nonnegative Matrix Factorization via Augmented Lagrangian Method
Box-constrained Projective Nonnegative Matrix Factorization ...
收藏 引用
International Joint Conference on Neural Networks
作者: Xiang Zhang Naiyang Guan Long Lan Dacheng Tao Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Centre for Quantum Computation & Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology
Projective non-negative matrix factorization (PNMF) projects a set of examples onto a subspace spanned by a non-negative basis whose transpose is regarded as the projection matrix. Since PNMF learns a natural parts-ba... 详细信息
来源: 评论
Approximate Maximum Common Sub-graph Isomorphism Based on Discrete-Time Quantum Walk
Approximate Maximum Common Sub-graph Isomorphism Based on Di...
收藏 引用
International Conference on Pattern Recognition
作者: Kai Lu Yi Zhang Kai Xu Yinghui Gao Richard C. Wilson Science and Technology on Parallel and Distributed Processing Laboratory and College of Computer National University of Defense Technology Changsha P.R. China College of Electronic Science and Engineering National University of Defense Technology Changsha P.R. China Department of Computer Science University of York York UK
Maximum common sub-graph isomorphism (MCS) is a famous NP-hard problem in graph processing. The problem has found application in many areas where the similarity of graphs is important, for example in scene matching, v... 详细信息
来源: 评论