咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 178 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 427 篇 工学
    • 323 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 78 篇 信息与通信工程
    • 51 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 27 篇 电气工程
    • 20 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
    • 9 篇 网络空间安全
    • 8 篇 土木工程
    • 7 篇 农业工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
  • 165 篇 理学
    • 103 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 10 篇 化学
  • 113 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 24 篇 concurrent compu...
  • 21 篇 distributed proc...
  • 20 篇 fault tolerance
  • 20 篇 benchmark testin...
  • 18 篇 laboratories
  • 16 篇 application soft...
  • 15 篇 algorithm design...
  • 15 篇 feature extracti...
  • 15 篇 kernel
  • 15 篇 distributed comp...
  • 14 篇 computer archite...
  • 14 篇 servers
  • 14 篇 cloud computing
  • 14 篇 training
  • 13 篇 parallel process...
  • 13 篇 deep learning
  • 13 篇 protocols
  • 13 篇 hardware
  • 13 篇 delay

机构

  • 94 篇 college of compu...
  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 45 篇 national laborat...
  • 39 篇 school of comput...
  • 31 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 19 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...

作者

  • 27 篇 wang huaimin
  • 24 篇 wang yijie
  • 21 篇 dongsheng li
  • 21 篇 yijie wang
  • 20 篇 zhigang luo
  • 20 篇 huaimin wang
  • 18 篇 peng yuxing
  • 17 篇 naiyang guan
  • 17 篇 ji wang
  • 15 篇 li dongsheng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 yuxing peng
  • 14 篇 wang ji
  • 12 篇 xiang zhang
  • 12 篇 liu jie
  • 12 篇 wang huai-min
  • 12 篇 jie liu
  • 11 篇 jia jia
  • 11 篇 fu yongquan

语言

  • 617 篇 英文
  • 40 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer"
659 条 记 录,以下是151-160 订阅
排序:
parallel pipeline implementation for moving objects detection in traffic video analysis on a heterogeneous platform  4th
Parallel pipeline implementation for moving objects detectio...
收藏 引用
4th International Conference on computer Engineering and Networks, CENet2014
作者: Li, Teng Dou, Yong Jiang, Jingfei Qiao, Peng Department of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha410073 China
Moving objects detection is important in traffic video analysis, and many algorithms are being increasingly applied to moving objects detection. Most of these algorithms are time-consuming and cannot satisfy real-time... 详细信息
来源: 评论
False-positive probability and compression optimization for tree-structured bloom filters
收藏 引用
ACM Transactions on Modeling and Performance Evaluation of Computing Systems 2016年 第4期1卷 1–39页
作者: Fu, Yongquan Biersack, Ernst National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Sanyi Road Changsha Hunan Province410073 China CAIPY Valbonne06560 France
Bloom filters are frequently used to to check the membership of an item in a set. However, Bloom filters face a dilemma: the transmission bandwidth and the accuracy cannot be optimized simultaneously. This dilemma is ... 详细信息
来源: 评论
DFIS: A scalable distributed fingerprint identification system  15th
DFIS: A scalable distributed fingerprint identification syst...
收藏 引用
15th International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2015
作者: Zhao, Yunxiang Zhang, Wanxin Li, Dongsheng Huang, Zhen National Laboratory for Parallel and Distributed Processing College of Computer National University of Defence Technology ChangshaHunan410073 China
Fingerprint has been widely used in a variety of biometric identification systems. However, with the rapid development of fingerprint identification systems, the amount of fingerprints information stored in systems ha... 详细信息
来源: 评论
A technical capability evaluation model based concept and prerequisite relation in computer education  33
A technical capability evaluation model based concept and pr...
收藏 引用
33rd International Conference on Software Engineering and Knowledge Engineering, SEKE 2021
作者: Luo, Jiwen Wang, Tao Chang, Junsheng Guo, Xiaoting National Key Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha410073 China
Effectively assessing the results of users' online learning and enhancing social recognition has become a major development direction for online education platforms. For computer education, this article constructs... 详细信息
来源: 评论
Stigmergic collaboration: A sign-based perspective of stigmergy
Stigmergic collaboration: A sign-based perspective of stigme...
收藏 引用
2010 International Conference on Intelligent Computation Technology and Automation, ICICTA 2010
作者: Ren, Chuanjun Huang, Hongbing Jin, Shiyao National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Insects build architecturally complex nests and search for remote food by collaboration work despite their limited sensors, minimal individual intelligence and the lack of a central control system. Insets' collabo... 详细信息
来源: 评论
An Efficient and Flexible Deterministic Framework for Multithreaded Programs
收藏 引用
Journal of computer Science & Technology 2015年 第1期30卷 42-56页
作者: 卢凯 周旭 王小平 Tom Bergan 陈沉 Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China College of Computer National University of Defense Technology Changsha 410073 China Department of Computer Science and Engineering University of Washington Seattle WA 98195-2350 U.S.A.
Determinism is very useful to multithreaded programs in debugging, testing, etc. Many deterministic ap- proaches have been proposed, such as deterministic multithreading (DMT) and deterministic replay. However, thes... 详细信息
来源: 评论
A novel rough set approach for classification
A novel rough set approach for classification
收藏 引用
2006 IEEE International Conference on Granular Computing
作者: Zhang, Li-Juan Li, Zhou-Jun National Laboratory for Parallel and Distributed Processing Changsha 410073 China School of Computer Science and Engineering Beihang University Beijing 100083 China
Rough set theory has been widely and successfully used in data mining, especially in classification field. But most existing rough set based classification approaches require computing optimal attribute reduction, whi... 详细信息
来源: 评论
Collaborative search in large-scale unstructured peer-to-peer networks
Collaborative search in large-scale unstructured peer-to-pee...
收藏 引用
36th International Conference on parallel processing in Xi'an, ICPP
作者: Zhang, Yiming Li, Dongsheng Chen, Lei Lu, Xicheng National Laboratory for Parallel and Distributed Processing NUDT Department of Computer Science Hong Kong University of Science and Technology
Searching in large-scale unstructured peer-to-peer networks is challenging due to the lack of effective hint information to guide queries. In this paper, we propose POP, a parallel, cOllaborative and Probabilistic sea... 详细信息
来源: 评论
Word Embedding-based Context-sensitive Network Flow Payload Anomaly Detection  3
Word Embedding-based Context-sensitive Network Flow Payload ...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Li, Yizhou Wang, Yijie Cheng, Li Xu, Hongzuo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Payload anomaly detection can discover malicious beliaviors tiidden in network packets. It is liard to liandle payload due to its various possible characters and complex semantic context, and tlius identifying abnorma... 详细信息
来源: 评论
A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers  6
A Novel Deep Neural Network Model for Credit Risk Prediction...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Xie, Yalong Li, Aiping Liu, Ziniu Chen, Kai Tu, Hongkui College Of Computer National University Of Defense Technology Science And Technology On Parallel And Distributed Processing Laboratory Changsha China
China is a big agricultural county with more than 500 million rural population. In China, farmers usually loan from rural commercial banks or rural credit cooperatives. It is crucial for the national economic developm... 详细信息
来源: 评论