咨询与建议

限定检索结果

文献类型

  • 479 篇 会议
  • 178 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 427 篇 工学
    • 323 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 78 篇 信息与通信工程
    • 51 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 32 篇 生物工程
    • 29 篇 机械工程
    • 27 篇 电气工程
    • 20 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 11 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
    • 9 篇 网络空间安全
    • 8 篇 土木工程
    • 7 篇 农业工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 建筑学
    • 6 篇 化学工程与技术
  • 165 篇 理学
    • 103 篇 数学
    • 33 篇 生物学
    • 30 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 10 篇 化学
  • 113 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 24 篇 concurrent compu...
  • 21 篇 distributed proc...
  • 20 篇 fault tolerance
  • 20 篇 benchmark testin...
  • 18 篇 laboratories
  • 16 篇 application soft...
  • 15 篇 algorithm design...
  • 15 篇 feature extracti...
  • 15 篇 kernel
  • 15 篇 distributed comp...
  • 14 篇 computer archite...
  • 14 篇 servers
  • 14 篇 cloud computing
  • 14 篇 training
  • 13 篇 parallel process...
  • 13 篇 deep learning
  • 13 篇 protocols
  • 13 篇 hardware
  • 13 篇 delay

机构

  • 94 篇 college of compu...
  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 45 篇 national laborat...
  • 39 篇 school of comput...
  • 31 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 19 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 national laborat...
  • 10 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...

作者

  • 27 篇 wang huaimin
  • 24 篇 wang yijie
  • 21 篇 dongsheng li
  • 21 篇 yijie wang
  • 20 篇 zhigang luo
  • 20 篇 huaimin wang
  • 18 篇 peng yuxing
  • 17 篇 naiyang guan
  • 17 篇 ji wang
  • 15 篇 li dongsheng
  • 15 篇 ding bo
  • 15 篇 yin gang
  • 14 篇 yuxing peng
  • 14 篇 wang ji
  • 12 篇 xiang zhang
  • 12 篇 liu jie
  • 12 篇 wang huai-min
  • 12 篇 jie liu
  • 11 篇 jia jia
  • 11 篇 fu yongquan

语言

  • 617 篇 英文
  • 40 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer"
659 条 记 录,以下是371-380 订阅
排序:
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yunlong Wu Chen Chen Huiquan Wang Jie Zhou Xinhai Xu National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan P. R. China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Java: From "Hard Coding" to Using an Integrated Development Environment
Java: From "Hard Coding" to Using an Integrated Development ...
收藏 引用
International Conference on (DFMA) distributed Frameworks for Multimedia Applications
作者: Ali R. Mustafa Kattan Rosni Abdullah Rosalina Abdul Salam Parallel & Distributed Processing Laboratory School ofComputer Sciences Universiti Sains Islam Malaysia Penang Malaysia Parallel & Distributed Processing Lab School of Computer Sciences Universiti Sains Malaysia
Being a Java developer the decision of starting to use an integrated development environment (IDE) instead of a set of discrete programming tools, is to be taken sooner or later. This paper identifies the favorite fea... 详细信息
来源: 评论
Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly Detection
Attention-based Encoder-Decoder Recurrent Neural Networks fo...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Shang Wu Yijie Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Attack payloads are often short segments hidden in HTTP requests; thus they can be found by HTTP payload anomaly detection. Deep learning models learn data features during training without manual feature extraction, a... 详细信息
来源: 评论
Minimum Redundancy Gene Selection Based on Grey Relational Analysis
Minimum Redundancy Gene Selection Based on Grey Relational A...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Li-juan Zhang Zhou-jun Li Huo-wang Chen Jian Wen National Laboratory for Parallel and Distributed Processing Changsha China School of Computer Science & Engineering Beihang University Beijing China
In this article we describe a method for selecting informative genes from microarray data. The method is based on clustering, namely, it first find similar genes, group them and then select informative genes from thes... 详细信息
来源: 评论
Automatic generation of fast BLAS3-GEMM: A portable compiler approach  17
Automatic generation of fast BLAS3-GEMM: A portable compiler...
收藏 引用
International Symposium on Code Generation and Optimization (CGO)
作者: Xing Su Xiangke Liao Jingling Xue College of Computer National Laboratory for Parallel and Distributed Processing Changsha China UNSW School of Computer Science and Engineering Sydney NSW Australia
GEMM is the main computational kernel in BLAS3. Its micro-kernel is either hand-crafted in assembly code or generated from C code by general-purpose compilers (guided by architecture-specific directives or auto-tuning... 详细信息
来源: 评论
Laser-driven inertial ion focusing
收藏 引用
Physical Review E 2009年 第1期79卷 015401(R)-015401(R)页
作者: H. B. Zhuo Wei Yu M. Y. Yu H. Xu X. Wang B. F. Shen Z. M. Sheng J. Zhang National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China Shanghai Institute of Optics and Fine Mechanics Chinese Academy of Sciences Shanghai 201800 China Institute for Fusion Theory and Simulation Zhejiang University Hangzhou 310027 China Institute for Theoretical Physics I Ruhr University Bochum D-44780 Germany Department of Physics Jiaotong University Shanghai 200240 China
A Hohlraum-like configuration is proposed for realizing a simple compact source for neutrons. A laser pulse enters a tiny thin-shelled hollow-sphere target through a small opening and is self-consistently trapped in t... 详细信息
来源: 评论
Design, Implementation and Evaluation of an Application-Layer Virtualized Network
Design, Implementation and Evaluation of an Application-Laye...
收藏 引用
2015 IEEE Symposium on Service-Oriented System Engineering
作者: Yiming Zhang Dongsheng Li Yijie Wang Zhigang Sun Feng Zhao Jinshu Su National University of Defense Technology Changsha Hunan CN School of Computer National Laboratory for Parallel and Distributed Processing (PDL) Changsha China
The performance of virtualized networks is critical to cloud applications. The "distributed line graphs" (DLG) are a universal technique for designing network topologies based on arbitrary regular graphs. In... 详细信息
来源: 评论
Research on Online Failure Prediction Model and Status Pretreatment Method for Exascale System
Research on Online Failure Prediction Model and Status Pretr...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Hao Zhou Yanhuang Jiang National Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executin... 详细信息
来源: 评论
Creating Virtual Networks for distributed Virtual Computing Environment
Creating Virtual Networks for Distributed Virtual Computing ...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Dongsheng Li Yixin Chen Feng Huang National Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
Virtual network is an important approach to support multiple legacy applications running unmodified in distributed virtual computing environments. A virtual networking approach called VirNet is proposed in this paper.... 详细信息
来源: 评论
Compiler-Assisted Application-Level Checkpointing for MPI Programs
Compiler-Assisted Application-Level Checkpointing for MPI Pr...
收藏 引用
IEEE International Conference on distributed Computing Systems
作者: Xuejun Yang Panfeng Wang Hongyi Fu Yunfei Du Zhiyuan Wang Jia Jia National Laboratory for Parallel & Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
Application-level checkpointing can decrease the overhead of fault tolerance by minimizing the amount of checkpoint data. However this technique requires the programmer to manually choose the critical data that should... 详细信息
来源: 评论