咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 178 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 427 篇 工学
    • 323 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 78 篇 信息与通信工程
    • 51 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 27 篇 电气工程
    • 20 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
    • 9 篇 网络空间安全
    • 8 篇 土木工程
    • 7 篇 农业工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
  • 165 篇 理学
    • 103 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 10 篇 化学
  • 113 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 24 篇 concurrent compu...
  • 21 篇 distributed proc...
  • 20 篇 fault tolerance
  • 20 篇 benchmark testin...
  • 18 篇 laboratories
  • 16 篇 application soft...
  • 15 篇 algorithm design...
  • 15 篇 feature extracti...
  • 15 篇 kernel
  • 15 篇 distributed comp...
  • 14 篇 computer archite...
  • 14 篇 servers
  • 14 篇 cloud computing
  • 14 篇 training
  • 13 篇 parallel process...
  • 13 篇 deep learning
  • 13 篇 protocols
  • 13 篇 hardware
  • 13 篇 delay

机构

  • 94 篇 college of compu...
  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 45 篇 national laborat...
  • 39 篇 school of comput...
  • 31 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 19 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...

作者

  • 27 篇 wang huaimin
  • 24 篇 wang yijie
  • 21 篇 dongsheng li
  • 21 篇 yijie wang
  • 20 篇 zhigang luo
  • 20 篇 huaimin wang
  • 18 篇 peng yuxing
  • 17 篇 naiyang guan
  • 17 篇 ji wang
  • 15 篇 li dongsheng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 yuxing peng
  • 14 篇 wang ji
  • 12 篇 xiang zhang
  • 12 篇 liu jie
  • 12 篇 wang huai-min
  • 12 篇 jie liu
  • 11 篇 jia jia
  • 11 篇 fu yongquan

语言

  • 617 篇 英文
  • 40 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer"
659 条 记 录,以下是171-180 订阅
排序:
Asycome: A JointCloud Data Asynchronous Collaboration Mechanism Based on Blockchain  3rd
Asycome: A JointCloud Data Asynchronous Collaboration Mechan...
收藏 引用
3rd International Conference on Blockchain and Trustworthy Systems, Blocksys 2021
作者: Li, Linhui Shi, Peichang Fu, Xiang Zhang, Shengtian Zhong, Tao Chen, Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha410073 China
In the Internet of Everything (IoE), due to its issues of complexity and heterogeneity, message delay cannot be guaranteed, and it is not enough to leverage a centralized model for data collaboration. By leveraging th... 详细信息
来源: 评论
Modeling complex relationship paths for knowledge graph completion
Modeling complex relationship paths for knowledge graph comp...
收藏 引用
作者: Zeng, Ping Tan, Qingping Meng, Xiankai Zhang, Haoyu Xu, Jianjun College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China
Determining the validity of knowledge triples and filling in the missing entities or relationships in the knowledge graph are the crucial tasks for large-scale knowledge graph completion. So far, the main solutions us... 详细信息
来源: 评论
Support efficient and fault-tolerant multicast in bufferless network-on-chip
Support efficient and fault-tolerant multicast in bufferless...
收藏 引用
作者: Feng, Chaochao Lu, Zhonghai Jantsch, Axel Zhang, Minxuan Yang, Xianju National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China Department of Electronic Systems Royal Institute of Technology Sweden
SUMMARY In this paper, we propose three Deflection-Routing-based Multicast (DRM) schemes for a bufferless NoC. The DRM scheme without packets replication (DRM-noPR) sends multicast packet through a non deterministic p... 详细信息
来源: 评论
Ladder: A Blockchain Model of Low-Overhead Storage  3rd
Ladder: A Blockchain Model of Low-Overhead Storage
收藏 引用
3rd International Conference on Blockchain and Trustworthy Systems, Blocksys 2021
作者: Chen, Peng Zhang, Xunhui Liu, Hui Xiang, Liangliang Shi, Peichang National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha410073 China
Emerging blockchain accounting mechanism allow mutually distributed parties to transport trusted information and ensure the correctness of data. Every blockchain node stores the complete block locally. Although this m... 详细信息
来源: 评论
Merge-Weighted Dynamic Time Warping for Speech Recognition
收藏 引用
Journal of computer Science & Technology 2014年 第6期29卷 1072-1082页
作者: 张湘莉兰 骆志刚 李明 State Key Laboratory of Pathogen and Biosecurity Beijing Institute of Microbiology and Epidemiology Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology David R.Cheriton School of Computer Science University of WaterlooWaterlooOntario N2L 3G1Canada ACM IEEE
Obtaining training material for rarely used English words and common given names from countries where English is not spoken is difficult due to excessive time, storage and cost factors. By considering personal privacy... 详细信息
来源: 评论
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking
收藏 引用
Frontiers of computer Science 2019年 第2期13卷 247-263页
作者: Pengfei WANG Kai LU Gen LI Xu ZHOU Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China College of Computer National University of Defense Technology Changsha 410073 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha 410073 China
A race condition is a common trigger for concurrency bugs. As a special case, a race condition can also occur across the kernel and user space causing a doublefetch bug, which is a field that has received little resea... 详细信息
来源: 评论
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory
收藏 引用
Journal of computer Science & Technology 2018年 第3期33卷 587-602页
作者: Kai Lu Peng-Fei Wang Gen Li Xu Zhou College of Computer National University of Defense Technology Changsha 410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China Collaborative Innovation Center of High-Performance Computing National University of Defense Technology Changsha 410073 China
The double fetch problem occurs when the data is maliciously changed between two kernel reads of the supposedly same data, which can cause serious security problems in the kernel. Previous research focused on the doub... 详细信息
来源: 评论
Identifying repeated interleavings to improve the efficiency of concurrency bug detection  15th
Identifying repeated interleavings to improve the efficiency...
收藏 引用
15th International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2015
作者: Wu, Zhendong Lu, Kai Wang, Xiaoping Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha410073 China
Detecting concurrency bugs is becoming increasingly important. Many pattern-based concurrency bug detectors focus on the specific types of interleavings that are correlated to concurrency bugs. To detect multiple type... 详细信息
来源: 评论
A distributed topology-aware overlays construction algorithm  08
A distributed topology-aware overlays construction algorithm
收藏 引用
15th ACM Mardi Gras Conference, MG '08
作者: Zhang, Xiaoming Li, Zhoujun Wang, Yijie School of Computer Science and Engineering Beihang University Beijing 100083 China National Laboratory for Parallel and Distributed Processing NUDT Changsha 410073 China
Peer-to-Peer (P2P) computing systems are rapidly growing in importance as the medium of choice for the mass storage. Peers in the most P2P systems randomly choose logical neighbors without any knowledge about underlyi... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论