咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 178 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 427 篇 工学
    • 323 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 78 篇 信息与通信工程
    • 51 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 27 篇 电气工程
    • 20 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
    • 9 篇 网络空间安全
    • 8 篇 土木工程
    • 7 篇 农业工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
  • 165 篇 理学
    • 103 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 10 篇 化学
  • 113 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 24 篇 concurrent compu...
  • 21 篇 distributed proc...
  • 20 篇 fault tolerance
  • 20 篇 benchmark testin...
  • 18 篇 laboratories
  • 16 篇 application soft...
  • 15 篇 algorithm design...
  • 15 篇 feature extracti...
  • 15 篇 kernel
  • 15 篇 distributed comp...
  • 14 篇 computer archite...
  • 14 篇 servers
  • 14 篇 cloud computing
  • 14 篇 training
  • 13 篇 parallel process...
  • 13 篇 deep learning
  • 13 篇 protocols
  • 13 篇 hardware
  • 13 篇 delay

机构

  • 94 篇 college of compu...
  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 45 篇 national laborat...
  • 39 篇 school of comput...
  • 31 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 19 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...

作者

  • 27 篇 wang huaimin
  • 24 篇 wang yijie
  • 21 篇 dongsheng li
  • 21 篇 yijie wang
  • 20 篇 zhigang luo
  • 20 篇 huaimin wang
  • 18 篇 peng yuxing
  • 17 篇 naiyang guan
  • 17 篇 ji wang
  • 15 篇 li dongsheng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 yuxing peng
  • 14 篇 wang ji
  • 12 篇 xiang zhang
  • 12 篇 liu jie
  • 12 篇 wang huai-min
  • 12 篇 jie liu
  • 11 篇 jia jia
  • 11 篇 fu yongquan

语言

  • 617 篇 英文
  • 40 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer"
659 条 记 录,以下是201-210 订阅
排序:
Topology awareness algorithm for virtual network mapping
收藏 引用
Journal of Zhejiang University-Science C(computers and Electronics) 2012年 第3期13卷 178-186页
作者: Xiao-ling LI Huai-min WANG Chang-guo GUO Bo DING Xiao-yong LI Wen-qi BI Shuang TAN National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology.Changsha 410073China School of Computer National University of Defense TechnologyChangsha 410073China China Electronic Systems Engineering Corporation Beijing 100039China The Northern Institute of Electronic Equipment of China Beijing 100083China
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne... 详细信息
来源: 评论
An irregular cutting based distributed mapping algorithm for DVE systems
An irregular cutting based distributed mapping algorithm for...
收藏 引用
2009 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, PACIIA 2009
作者: Zhang, Wei Zhou, Hangjun Peng, Yuxing Li, Sikun Xi, Min National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China Department of Computer Science Xi'an Jiaotong University Xi'an 710049 China
distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world in... 详细信息
来源: 评论
Reducing repair traffic in P2P backup systems: Exact regenerating codes on hierarchical codes
Reducing repair traffic in P2P backup systems: Exact regener...
收藏 引用
作者: Huang, Zhen Biersack, Ernst Peng, Yuxing Department of Computer National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China Eurecom Sophia Antipolis France
Peer to peer backup systems store data on "unreliable" peers that can leave the system at any moment. In this case, the only way to assure durability of the data is to add redundancy using either replication... 详细信息
来源: 评论
RScam: Cloud-based anti-malware via reversible sketch  11th
RScam: Cloud-based anti-malware via reversible sketch
收藏 引用
11th International Conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Sun, Hao Wang, Xiaofeng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Cybercrime caused by malware becomes a persistent and damaging threat which makes the trusted security solution urgently demanded, especially for resource-constrained ends. The existing industry and academic approache... 详细信息
来源: 评论
MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military Field  6
MilKBQA: A Complex Knowledge Base Question Answering Dataset...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Xu, Pike Li, Tiejun Huang, Zhen Guo, Min He, Jiezhong Sun, Ding Institute Of Computer National University Of Defense Technology Changsha China National University Of Defense Technology Laboratory Of Parallel And Distributed Processing Changsha China School Of Computer National University Of Defense Technology Changsha China
Facts in military field tend to involve elements of time, space, quantity, status, and so on. Existing methods of representing knowledge in the form of triples fail to adequately express these facts, and also cause ob... 详细信息
来源: 评论
CloudDPI: Cloud-based privacy-preserving deep packet inspection via reversible sketch  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Li, Jie Su, Jinshu Wang, Xiaofeng Sun, Hao Chen, Shuhui School of Computer National University of Defense Technology Changsha Hunan410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan410073 China
Hardware-based middleboxes are ubiquitous in computer networks, which usually incur high deployment and management expenses. A recently arsing trend aims to address those problems by outsourcing the functions of tradi... 详细信息
来源: 评论
Character feature learning for named entity recognition
Character feature learning for named entity recognition
收藏 引用
作者: Zeng, Ping Tan, Qingping Zhang, Haoyu Meng, Xiankai Zhang, Zhuo Xu, Jianjun Lei, Yan College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing Changsha China School of Software Engineering Chongqing University Chongqing China
The deep neural named entity recognition model automatically learns and extracts the features of entities and solves the problem of the traditional model relying heavily on complex feature engineering and obscure prof... 详细信息
来源: 评论
Tree-structured bloom filters for joint optimization of false positive probability and transmission bandwidth
Tree-structured bloom filters for joint optimization of fals...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Fu, Yongquan Biersack, Ernst Science and Technology Laboratory of Parallel and Distributed Processing School of Computer National Univ. of Defense Technology China Www.e-biersack.eu France
Bloom filters are frequently used to perform set queries that test the existence of some items. However, Bloom filters face a dilemma: the transmission bandwidth and the accuracy cannot be optimized simultaneously. Th... 详细信息
来源: 评论
A high efficient in-place transposition scheme for multidimensional arrays
A high efficient in-place transposition scheme for multidime...
收藏 引用
3rd International Conference on Information and Computing, ICIC 2010
作者: Yuan, Jie Wu, Jian-Ping Wang, Zheng-Hua National Lab. of Parallel and Distributed Processing National University of Defense Technology Changsha China School of Computer Science National University of Defense Changsha China
This paper presents a in-place cycle-reducing method for multidimensional arrays transposition in local memory to reduce the memory R/W operations. The resulting method can significantly reduce the number of subcycles... 详细信息
来源: 评论
Inducing taxonomy from tags: An agglomerative hierarchical clustering framework
Inducing taxonomy from tags: An agglomerative hierarchical c...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Li, Xiang Wang, Huaimin Yin, Gang Wang, Tao Yang, Cheng Yu, Yue Tang, Dengqing National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China College of Mechatronics Engineering and Automation National University of Defense Technology Changsha China
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte... 详细信息
来源: 评论