咨询与建议

限定检索结果

文献类型

  • 509 篇 会议
  • 191 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 702 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 459 篇 工学
    • 353 篇 计算机科学与技术...
    • 258 篇 软件工程
    • 86 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 35 篇 机械工程
    • 35 篇 生物工程
    • 28 篇 电气工程
    • 18 篇 仪器科学与技术
    • 16 篇 动力工程及工程热...
    • 11 篇 土木工程
    • 10 篇 材料科学与工程(可...
    • 10 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 8 篇 农业工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
  • 168 篇 理学
    • 101 篇 数学
    • 36 篇 生物学
    • 29 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 化学
  • 120 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 法学
    • 11 篇 社会学
  • 9 篇 农学
    • 8 篇 作物学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 computational mo...
  • 22 篇 training
  • 19 篇 benchmark testin...
  • 18 篇 fault tolerance
  • 18 篇 distributed proc...
  • 18 篇 feature extracti...
  • 17 篇 kernel
  • 16 篇 computer archite...
  • 16 篇 semantics
  • 15 篇 deep learning
  • 15 篇 concurrent compu...
  • 15 篇 laboratories
  • 14 篇 servers
  • 14 篇 hardware
  • 13 篇 algorithm design...
  • 13 篇 cloud computing
  • 12 篇 parallel process...
  • 12 篇 graphics process...
  • 12 篇 optimization
  • 12 篇 protocols

机构

  • 112 篇 college of compu...
  • 81 篇 national laborat...
  • 77 篇 science and tech...
  • 47 篇 national laborat...
  • 35 篇 school of comput...
  • 30 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 science and tech...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...
  • 10 篇 national laborat...
  • 10 篇 national key lab...
  • 10 篇 national key lab...

作者

  • 32 篇 dongsheng li
  • 28 篇 yijie wang
  • 28 篇 wang yijie
  • 26 篇 li dongsheng
  • 25 篇 wang huaimin
  • 21 篇 huaimin wang
  • 20 篇 zhigang luo
  • 18 篇 naiyang guan
  • 18 篇 peng yuxing
  • 16 篇 yuxing peng
  • 14 篇 dou yong
  • 14 篇 liu jie
  • 14 篇 ji wang
  • 14 篇 yin gang
  • 13 篇 wang ji
  • 13 篇 ding bo
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 11 篇 zhiquan lai

语言

  • 657 篇 英文
  • 42 篇 中文
  • 3 篇 其他
检索条件"机构=National Laboratory of Parallel and Distributed Processing College of Computer"
702 条 记 录,以下是21-30 订阅
排序:
A Connectivity-Enhanced Multi-Task Learning based on Anatomical Priors for 3D Class-Balanced Pulmonary Airway Segmentation
A Connectivity-Enhanced Multi-Task Learning based on Anatomi...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Jia, Yan Dou, Yong Qiao, Peng Cheng, Yuqing Xu, Kele He, Zhouyu National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology Changsha China National University of Defense Technology College of Systems Engineering Changsha China
Accurate and efficient airway segmentation is essential for evaluating pulmonary diseases, aiding diagnosis, reducing the preoperative burden of airway identification, and minimizing patient discomfort during prolonge... 详细信息
来源: 评论
DMSA: Decentralized and Multi-keyword Selective Data Sharing and Acquisition  22
DMSA: Decentralized and Multi-keyword Selective Data Sharing...
收藏 引用
22nd IEEE International Symposium on parallel and distributed processing with Applications, ISPA 2024
作者: Lin, Moheng Shi, Peichang Fu, Xiang Jiang, Feng Yi, Guodong National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Changsha410073 China Xiangjiang Lab Changsha410073 China
Blockchain technology has been extensively uti-lized in decentralized data-sharing applications, with the immutability of blockchain providing a witness for the circulation of data. However, current blockchain data-sh... 详细信息
来源: 评论
FedEAE: Federated Learning Based Privacy-Preserving Event Argument Extraction  12th
FedEAE: Federated Learning Based Privacy-Preserving Event Ar...
收藏 引用
12th national CCF Conference on Natural Language processing and Chinese Computing, NLPCC 2023
作者: Hu, Fei Dong, Shenpo Chang, Tao Zhou, Jie Li, Haili Wang, Jingnan Chen, Rui Liu, Haijiao Wang, Xiaodong National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Benefiting from Pre-trained Language Model (PLM), Event Argument Extraction (EAE) methods have achieved SOTA performance in general scenarios of Event Extraction (EE). However, with increasing concerns and regulations... 详细信息
来源: 评论
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework  24th
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2024
作者: Lei, Tong Chen, Zongjing Che, Yonggang Xu, Chuanfu Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Currently, the landscape of computer hardware architecture presents the characteristics of heterogeneity and diversity, prompting widespread attention to cross-platform portable parallel programming techniques. Most e... 详细信息
来源: 评论
Adaptive and augmented active anomaly detection on dynamic network traffic streams
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2024年 第3期25卷 446-460页
作者: Bin LI Yijie WANG Li CHENG National Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense TechnologyChangsha 410073China College of System Engineering National University of Defense TechnologyChangsha 410073China
Active anomaly detection queries labels of sampled instances and uses them to incrementally update the detection model,and has been widely adopted in detecting network ***,existing methods cannot achieve desirable per... 详细信息
来源: 评论
Optimizing Depthwise Convolutions on ARMv8 Architecture  23rd
Optimizing Depthwise Convolutions on ARMv8 Architecture
收藏 引用
23rd International Conference on parallel and distributed Computing, Applications, and Technologies, PDCAT 2022
作者: Hao, Ruochen Wang, Qinglin Yin, Shangfei Zhou, Tianyang Zhang, Qingyang Mei, Songzhu Shen, Siqi Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China College of Computer National University of Defense Technology Changsha410073 China Xiamen University Xiamen China
Depthwise convolutions are widely used in lightweight convolutional neural networks (CNNs). The performance of depthwise convolutions is mainly bounded by the memory access rather than the arithmetic operations for cl... 详细信息
来源: 评论
Why API documentation is insufficient for developers: an empirical study
收藏 引用
Science China(Information Sciences) 2021年 第1期64卷 248-250页
作者: Qiang FAN Yue YU Tao WANG Gang YIN Huaimin WANG Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense Technology
Dear editor,Application programming interface (API) documentation plays an important role in software development and reuse [1] for both API maintainers and API *** documentation helps developers understand and reuse ... 详细信息
来源: 评论
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPUs  22nd
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPU...
收藏 引用
22nd International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2022
作者: Zhou, Tianyang Wang, Qinglin Yin, Shangfei Hao, Ruochen Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China School of Computer Science National University of Defense Technology Changsha410073 China
K-Means algorithm is one of the most common clustering algorithms widely applied in various data analysis applications. Yinyang K-Means algorithm is a popular enhanced K-Means algorithm that avoids most unnecessary ca... 详细信息
来源: 评论
Jammer Localization for Wireless Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 735-738页
作者: SUN Yanqiang WANG Xiaodong ZHOU Xingming National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
Jamming attack can severely affect the performance of Wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, we in this paper propose a jammer ... 详细信息
来源: 评论
A Float-Point Arithmetic Logic Unit for High Performance RISC-V Processor  6
A Float-Point Arithmetic Logic Unit for High Performance RIS...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Wei, Chunyuan Yuan, Chuan Qi, Yu Xu, Bangjian Niu, Xin College of Computer Science and Electronic Engineering Hunan University Changsha China College of Electrical and Information Engineering Hunan University Changsha China College of Computer National University of Defense Technology Science and Technology on Parallel and Distributed Laboratory Changsha China
With the rapid advancement of artificial intelligence, chips have become increasingly important. The emerging RISC-V instruction set gradually provides powerful computing support for this field. In this context, along... 详细信息
来源: 评论