咨询与建议

限定检索结果

文献类型

  • 857 篇 会议
  • 255 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 697 篇 工学
    • 555 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 125 篇 信息与通信工程
    • 69 篇 控制科学与工程
    • 67 篇 电子科学与技术(可...
    • 51 篇 生物工程
    • 45 篇 机械工程
    • 36 篇 电气工程
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 18 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 13 篇 环境科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
  • 270 篇 理学
    • 179 篇 数学
    • 56 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 35 篇 物理学
    • 21 篇 化学
  • 177 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 6 篇 文学
  • 5 篇 医学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 51 篇 distributed proc...
  • 49 篇 laboratories
  • 40 篇 computational mo...
  • 38 篇 concurrent compu...
  • 33 篇 algorithm design...
  • 30 篇 distributed comp...
  • 29 篇 computer archite...
  • 29 篇 benchmark testin...
  • 29 篇 kernel
  • 27 篇 hardware
  • 26 篇 parallel process...
  • 26 篇 fault tolerance
  • 26 篇 graphics process...
  • 22 篇 servers
  • 22 篇 feature extracti...
  • 22 篇 cloud computing
  • 22 篇 training
  • 21 篇 throughput
  • 21 篇 bandwidth
  • 21 篇 protocols

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 93 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 35 篇 school of comput...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...
  • 10 篇 parallel and dis...
  • 10 篇 national laborat...

作者

  • 40 篇 wang huaimin
  • 37 篇 wang ji
  • 37 篇 yong dou
  • 36 篇 ji wang
  • 35 篇 liu jie
  • 32 篇 jie liu
  • 29 篇 huaimin wang
  • 28 篇 dou yong
  • 27 篇 dongsheng li
  • 27 篇 xiaodong wang
  • 26 篇 peng yuxing
  • 26 篇 yin gang
  • 25 篇 yuxing peng
  • 25 篇 li dongsheng
  • 24 篇 yijie wang
  • 23 篇 wang yijie
  • 21 篇 xicheng lu
  • 21 篇 li kuan-ching
  • 21 篇 xingming zhou
  • 20 篇 gang yin

语言

  • 1,043 篇 英文
  • 63 篇 中文
  • 9 篇 其他
检索条件"机构=Parallel Distributed Processing Laboratory"
1115 条 记 录,以下是781-790 订阅
排序:
Automatic synthesis of processor arrays with local memories on FPGAs
Automatic synthesis of processor arrays with local memories ...
收藏 引用
2010 International Conference on Field-Programmable Technology, FPT'10
作者: Wu, Guiming Dou, Yong Wang, Miao National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Jiangnan Institute of Computing Technology Wuxi 214083 China
In this paper, we present an automatic synthesis framework to map loop nests to processor arrays with local memories on FPGAs. An affine transformation approach is firstly proposed to address space-time mapping proble... 详细信息
来源: 评论
Window memory accesses method in alternate row/column matrix access systems
Window memory accesses method in alternate row/column matrix...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology, ICCET 2010
作者: Jie, Zhou Dou, Yong Lei, Yuanwu Dong, Yazhuo National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Unit 91655 People's Republic of China Beijing China
Many systems, such as Synthetic Aperture Radar (SAR) processing, two-dimensional image processing, 2d-FFT calculation, need access the row and column data of their matrix alternately. The DRAM memory should be used du... 详细信息
来源: 评论
A distributed Approach to Consistent Order Delivery of Concurrent Events in Asynchronous DVEs
A Distributed Approach to Consistent Order Delivery of Concu...
收藏 引用
2010 2nd International Conference on Education Technology and Computer(第二届IEEE教育技术与计算机国际会议 ICETC 2010)
作者: Hangjun Zhou Wei Zhang Yuxing Peng Sikun Li Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing
In large-scale asynchronous distributed virtual environments(DVEs), one of the difficult problems is to deliver the concurrent events in a consistent order at each node. Generally, the previous consistency control app... 详细信息
来源: 评论
Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc Networks
Media Access Control Protocol Based on Hybrid Antennas in Ad...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yanrong Ding Xiaodong Wang Hu Shen Pengyu Guo National Key Laboratory for Parallel and Distributed Processing Changsha China
Nested Circular Directional MAC, a modified medium access control protocol of DMAC protocol, is proposed in this paper to support both directional antennas and omni-directional antennas simultaneously in one Ad Hoc ne... 详细信息
来源: 评论
A load balancing-supported constant degree DHT ID assignment method
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第11期38卷 2649-2654页
作者: Wang, Xiao-Hai Peng, Yu-Xing Li, Dong-Sheng Key Laboratory of Science and Technology for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan 410073 China
A Load Balancing-Supported ID assignment method is the foundation to implement and maintain DHT overlays, realized constant degree DHTs usually use simple pure centralized or distributed ID management strategies, whic... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural Computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论
The composability problem of events and threads in distributed systems
ICETC 2010 - 2010 2nd International Conference on Education ...
收藏 引用
ICETC 2010 - 2010 2nd International Conference on Education Technology and Computer 2010年 4卷 V4311-V4315页
作者: Li, Huiba Peng, Yuxing Lu, Xicheng National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Event-driven programming has been a relatively hot topic in distributed systems development. Having worked on these systems for years, we now believe that it is not the best choice. Besides the well-known "stack ... 详细信息
来源: 评论
Simulation research of communication networks based on prim algorithm
Simulation research of communication networks based on prim ...
收藏 引用
International Forum on Information Technology and Applications
作者: Yang, Chenghui Ren, ChuanJun College of Electrical Engineering Northwest University for Nationalities Lanzhou 730030 China National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
In order to improve the efficiency of the communication networks, we used the Kruskal algorithm and the Prim algorithm through algorithm comparison and analysis methods of data structure. A dynamic framework for the c... 详细信息
来源: 评论
Two improved GPU acceleration strategies for force-directed graph layout
Two improved GPU acceleration strategies for force-directed ...
收藏 引用
International Conference on Computer Application and System Modeling (ICCASM)
作者: Yong-Xian Wang Zong-Zhe Li Lu Yao Wei Cao Zheng-Hua Wang National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Force directed approach is one of the most widely used methods in graph drawing research. However, the running time is increased intolerablely along with the enlargement of the graph size, which restricts the algorith... 详细信息
来源: 评论
Improving cluster computing performance based on job futurity prediction
Improving cluster computing performance based on job futurit...
收藏 引用
International Conference on Advanced Computer Theory and Engineering, ICACTE
作者: Hossein Salami Hamid Saadatfar Farhad Rahmani Fard S. Kazem Shekofteh Hossein Deldari Parallel and Distributed Processing Laboratory Engineering Department Ferdowsi University of Mashhad Mashhad Iran
By recognizing the necessity for preventative and proactive management for today's large scale and fault prone distributed systems, a tendency for these mechanisms has been appeared in recent researchers' effo... 详细信息
来源: 评论