咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 178 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 427 篇 工学
    • 323 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 78 篇 信息与通信工程
    • 51 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 27 篇 电气工程
    • 20 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
    • 9 篇 网络空间安全
    • 8 篇 土木工程
    • 7 篇 农业工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
  • 165 篇 理学
    • 103 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 10 篇 化学
  • 113 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 24 篇 concurrent compu...
  • 21 篇 distributed proc...
  • 20 篇 fault tolerance
  • 20 篇 benchmark testin...
  • 18 篇 laboratories
  • 16 篇 application soft...
  • 15 篇 algorithm design...
  • 15 篇 feature extracti...
  • 15 篇 kernel
  • 15 篇 distributed comp...
  • 14 篇 computer archite...
  • 14 篇 servers
  • 14 篇 cloud computing
  • 14 篇 training
  • 13 篇 parallel process...
  • 13 篇 deep learning
  • 13 篇 protocols
  • 13 篇 hardware
  • 13 篇 delay

机构

  • 94 篇 college of compu...
  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 45 篇 national laborat...
  • 39 篇 school of comput...
  • 31 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 19 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...

作者

  • 27 篇 wang huaimin
  • 24 篇 wang yijie
  • 21 篇 dongsheng li
  • 21 篇 yijie wang
  • 20 篇 zhigang luo
  • 20 篇 huaimin wang
  • 18 篇 peng yuxing
  • 17 篇 naiyang guan
  • 17 篇 ji wang
  • 15 篇 li dongsheng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 yuxing peng
  • 14 篇 wang ji
  • 12 篇 xiang zhang
  • 12 篇 liu jie
  • 12 篇 wang huai-min
  • 12 篇 jie liu
  • 11 篇 jia jia
  • 11 篇 fu yongquan

语言

  • 617 篇 英文
  • 40 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer"
659 条 记 录,以下是91-100 订阅
排序:
SMP-SIM: An event-driven performance simulator for SMP
SMP-SIM: An event-driven performance simulator for SMP
收藏 引用
2012 International Conference on Systems and Informatics, ICSAI 2012
作者: Zhang, Xin Tang, Yuhua Lin, Yufei Xu, Xinhai Guo, Xiaowei Ren, Xiaoguang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Performance prediction for the high performance computer system is of great importance for designing, implementing, and optimizing system. As a widely used technique for predicting performance, simulation method attra... 详细信息
来源: 评论
Program optimization of array-intensive SPEC2k benchmarks on multithreaded GPU using CUDA and brook+
Program optimization of array-intensive SPEC2k benchmarks on...
收藏 引用
15th International Conference on parallel and distributed Systems, ICPADS '09
作者: Wang, Guibin Tang, Tao Fang, Xudong Ren, Xiaoguang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Graphic processing Unit (GPU), with many lightweight data-parallel cores, can provide substantial parallel computing power to accelerate several general purpose applications. Both the AMD and NVIDIA corps provide thei... 详细信息
来源: 评论
CANSE: A churn adaptive approach to network size estimation
CANSE: A churn adaptive approach to network size estimation
收藏 引用
16th IEEE International Conference on parallel and distributed Systems, ICPADS 2010
作者: Ma, Xing-Kong Wang, Yi-Jie Zheng, Zhong National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Network size is one of the fundamental information of distributed applications. The approach to estimate network size must feature both high accuracy and robustness in order to adapt to the dynamic environment in diff... 详细信息
来源: 评论
Tag recommendation for open source software
收藏 引用
Frontiers of computer Science 2014年 第1期8卷 69-82页
作者: Tao WANG Huaimin WANG Gang YIN Charles X. LING Xiao LI Peng ZOU National Laboratory for Parallel and Distributed Processing College of Computer Department of Computer Science The University of Western Ontario London N6A5B7 Canada Academy of Equipment Beijing 101400 China
Nowadays open source software becomes highly popular and is of great importance for most software engi- neering activities. To facilitate software organization and re- trieval, tagging is extensively used in open sour... 详细信息
来源: 评论
Data dependence-based optimistic data consistency maintenance method
Data dependence-based optimistic data consistency maintenanc...
收藏 引用
6th IEEE International Conference on computer and Information Technology, CIT 2006
作者: Zhou, Jing Wang, Yijie Li, Sikun National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology China
Data replication introduces well-known consistency issues. This paper puts forward the question about data dependence in data consistency, which embodies pseudo-conflict updates and update dependency. According to tha... 详细信息
来源: 评论
Error detection by redundant transaction in transactional memory system
Error detection by redundant transaction in transactional me...
收藏 引用
IEEE International Conference on Networking, Architecture and Storage
作者: Song, Wei Jia, Jia Peng, Yu-Xing National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
This paper addresses the issue of error detection in transactional memory, and proposes a new method of error detection based on redundant transaction (EDRT). This method creates a transaction copy for every transacti... 详细信息
来源: 评论
Power analysis and optimizations for GPU architecture using a power simulator
Power analysis and optimizations for GPU architecture using ...
收藏 引用
2010 3rd International Conference on Advanced computer Theory and Engineering, ICACTE 2010
作者: Wang, Guibin National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
As one of the most popular many-core architecture, GPUs have illustrated power in many non-graphic applications. Traditional general purpose computing systems tend to integrate GPU as the co-processor to accelerate pa... 详细信息
来源: 评论
Invalid pointer dereferences detection for CPS software based on extended pointer structures
Invalid pointer dereferences detection for CPS software base...
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Dong, Longming Dong, Wei Chen, Liqian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Invalid pointer dereferences, such as null pointer dereferences, dangling pointer dereferences and double frees, are a prevalent source of software bugs in CPS software, due to flexible dereferencing pointers along va... 详细信息
来源: 评论
Fault tolerant Lu factorization in transactional memory system
Fault tolerant Lu factorization in transactional memory syst...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Song, Wei Jia, Jia National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
With the popularization of multi-core processors, transaction memory, as a concurrent control mechanism with easy programing and high scalability, has attracted more and more attention. As a result, the reliability pr... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论