咨询与建议

限定检索结果

文献类型

  • 379 篇 会议
  • 132 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 326 篇 工学
    • 250 篇 计算机科学与技术...
    • 185 篇 软件工程
    • 65 篇 信息与通信工程
    • 36 篇 电子科学与技术(可...
    • 34 篇 控制科学与工程
    • 24 篇 电气工程
    • 20 篇 机械工程
    • 18 篇 生物工程
    • 15 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 材料科学与工程(可...
    • 5 篇 冶金工程
    • 4 篇 建筑学
  • 131 篇 理学
    • 87 篇 数学
    • 27 篇 系统科学
    • 19 篇 物理学
    • 19 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 5 篇 化学
  • 88 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
    • 7 篇 作物学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 医学
  • 1 篇 艺术学

主题

  • 28 篇 computational mo...
  • 18 篇 distributed proc...
  • 17 篇 benchmark testin...
  • 15 篇 concurrent compu...
  • 15 篇 laboratories
  • 14 篇 computer archite...
  • 13 篇 deep learning
  • 13 篇 fault tolerance
  • 13 篇 algorithm design...
  • 13 篇 feature extracti...
  • 13 篇 kernel
  • 12 篇 cloud computing
  • 11 篇 parallel process...
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 servers
  • 11 篇 semantics
  • 10 篇 computer science
  • 10 篇 conferences
  • 10 篇 educational inst...

机构

  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 52 篇 college of compu...
  • 35 篇 school of comput...
  • 26 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 20 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 science and tech...
  • 5 篇 school of advanc...
  • 5 篇 xiangjiang lab

作者

  • 20 篇 yijie wang
  • 20 篇 wang yijie
  • 15 篇 zhigang luo
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 14 篇 ji wang
  • 13 篇 naiyang guan
  • 13 篇 huaimin wang
  • 12 篇 dongsheng li
  • 12 篇 liu jie
  • 12 篇 jie liu
  • 11 篇 wang ji
  • 10 篇 yuxing peng
  • 10 篇 wang huai-min
  • 10 篇 fu yongquan
  • 9 篇 peichang shi
  • 9 篇 guibin wang
  • 9 篇 xuhui huang
  • 9 篇 xu xinhai
  • 9 篇 kai lu

语言

  • 479 篇 英文
  • 32 篇 中文
  • 2 篇 其他
检索条件"机构=National Laboratory for Parallel and Distributed Processing School of Computer Science"
513 条 记 录,以下是1-10 订阅
FMCC-RT: a scalable and fine-grained all-reduce algorithm for large-scale SMP clusters
收藏 引用
science China(Information sciences) 2025年 第5期68卷 362-379页
作者: Jintao PENG Jie LIU Jianbin FANG Min XIE Yi DAI Zhiquan LAI Bo YANG Chunye GONG Xinjun MAO Guo MAO Jie REN School of Computer Science and Technology National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology National Supercomputer Center in Tianjin School of Computer Science Shaanxi Normal University
All-reduce is a widely used communication technique for distributed and parallel applications typically implemented using either a tree-based or ring-based scheme. Each of these approaches has its own limitations: tre... 详细信息
来源: 评论
Isolate Sets Based parallel Louvain Method for Community Detection
收藏 引用
Journal of computer science & Technology 2023年 第2期38卷 373-390页
作者: 郄航 窦勇 黄震 熊运生 Science and Technology on Parallel and Distributed Laboratory School of Computer National University of Defense TechnologyChangsha 410073China
Community detection is a vital task in many fields,such as social networks and financial analysis,to name a *** Louvain method,the main workhorse of community detection,is a popular heuristic *** apply it to large-sca... 详细信息
来源: 评论
YFLM: An Improved Levenberg-Marquardt Algorithm for Global Bundle Adjustment  41st
YFLM: An Improved Levenberg-Marquardt Algorithm for Global ...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Peng, Jiaxin Li, Tao Jiang, Qin Liu, Jie Wang, Ruibo Laboratory of Software Engineering for Complex Systems School of Computer Science National University of Defense Technology Hunan Changsha410073 China Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Hunan Changsha410073 China
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ... 详细信息
来源: 评论
AFMA-Track: Adaptive Fusion of Motion and Appearance for Robust Multi-object Tracking  27th
AFMA-Track: Adaptive Fusion of Motion and Appearance for ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Liao, Wei Luo, Lei Zhang, Chunyuan College of Computer Science and Technology National University of Defence Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory College of Computer Science and Technology National University of Defense Technology Changsha China
Motion and appearance cues play a crucial role in Multi-object Tracking (MOT) algorithms for associating objects across consecutive frames. While most MOT methods prioritize accurate motion modeling and distincti... 详细信息
来源: 评论
Smoothing Point Adjustment-Based Evaluation of Time Series Anomaly Detection  48
Smoothing Point Adjustment-Based Evaluation of Time Series A...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Liu, Mingyu Wang, Yijie Xu, Hongzuo Zhou, Xiaohui Li, Bin Wang, Yongjun National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory College of Computer Changsha China
Anomalies in time series appear consecutively, forming anomaly segments. Applying the classical point-based evaluation metrics to evaluate the detection performance of segments leads to considerable underestimation, s... 详细信息
来源: 评论
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPUs  22nd
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPU...
收藏 引用
22nd International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2022
作者: Zhou, Tianyang Wang, Qinglin Yin, Shangfei Hao, Ruochen Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China School of Computer Science National University of Defense Technology Changsha410073 China
K-Means algorithm is one of the most common clustering algorithms widely applied in various data analysis applications. Yinyang K-Means algorithm is a popular enhanced K-Means algorithm that avoids most unnecessary ca... 详细信息
来源: 评论
Fast flow field prediction of pollutant leakage diffusion based on deep learning
收藏 引用
Environmental science and Pollution Research 2024年 第36期31卷 49393-49412页
作者: YunBo, Wan Zhong, Zhao Jie, Liu KuiJun, Zuo Yong, Zhang Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Computational Aerodynamics Institute China Aerodynamics Research and Development Center Mianyang621000 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China School of Aeronautics Northwestern Polytechnical University Xi’an710072 China
Abstract: Predicting pollutant leakage and diffusion processes is crucial for ensuring people’s safety. While the deep learning method offers high simulation efficiency and superior generalization, there is currently... 详细信息
来源: 评论
High-performance Network Traffic Classification Based on Graph Neural Network  6
High-performance Network Traffic Classification Based on Gra...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Pang, Bo Fu, Yongquan Ren, Siyuan Jia, Yan Harbin Institute of Technology College of Computer Science and Technology Shenzhen China National University of Defense Technology National Key Laboratory for Parallel and Distributed Processing College of Computer Changsha China Peng Cheng Laboratory Shen Zhen China
Network traffic classification is crucial for network security and network management and is one of the most important network tasks. Current state-of-the-art traffic classifiers are based on deep learning models to a... 详细信息
来源: 评论
A prompt-based approach to adversarial example generation and robustness enhancement
收藏 引用
Frontiers of computer science 2024年 第4期18卷 85-96页
作者: Yuting YANG Pei HUANG Juan CAO Jintao LI Yun LIN Feifei MA Key Lab of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing TechnologyCASBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China Department of Computer Science Stanford UniversityCA 94305USA School of Computing National University of SingaporeSingapore 119077Singapore Laboratory of Parallel Software and Computational Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
Recent years have seen the wide application of natural language processing(NLP)models in crucial areas such as finance,medical treatment,and news media,raising concerns about the model robustness and *** find that pro... 详细信息
来源: 评论
Optimizing Depthwise Convolutions on ARMv8 Architecture  23rd
Optimizing Depthwise Convolutions on ARMv8 Architecture
收藏 引用
23rd International Conference on parallel and distributed Computing, Applications, and Technologies, PDCAT 2022
作者: Hao, Ruochen Wang, Qinglin Yin, Shangfei Zhou, Tianyang Zhang, Qingyang Mei, Songzhu Shen, Siqi Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China College of Computer National University of Defense Technology Changsha410073 China Xiamen University Xiamen China
Depthwise convolutions are widely used in lightweight convolutional neural networks (CNNs). The performance of depthwise convolutions is mainly bounded by the memory access rather than the arithmetic operations for cl... 详细信息
来源: 评论