咨询与建议

限定检索结果

文献类型

  • 267 篇 会议
  • 79 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 212 篇 工学
    • 164 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 42 篇 信息与通信工程
    • 27 篇 电子科学与技术(可...
    • 20 篇 电气工程
    • 19 篇 控制科学与工程
    • 11 篇 机械工程
    • 10 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 9 篇 生物工程
    • 6 篇 环境科学与工程(可...
    • 6 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 4 篇 冶金工程
    • 4 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 农业工程
    • 3 篇 生物医学工程(可授...
  • 83 篇 理学
    • 55 篇 数学
    • 19 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 生物学
    • 9 篇 物理学
    • 5 篇 化学
  • 49 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
    • 5 篇 社会学
  • 4 篇 农学
  • 2 篇 医学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 30 篇 concurrent compu...
  • 27 篇 parallel process...
  • 25 篇 laboratories
  • 20 篇 computational mo...
  • 15 篇 application soft...
  • 15 篇 computer archite...
  • 13 篇 distributed proc...
  • 12 篇 graphics process...
  • 12 篇 algorithm design...
  • 11 篇 fault tolerance
  • 11 篇 distributed comp...
  • 10 篇 computer science
  • 10 篇 processor schedu...
  • 10 篇 kernel
  • 10 篇 hardware
  • 9 篇 analytical model...
  • 9 篇 delay
  • 8 篇 scalability
  • 8 篇 parallel machine...
  • 8 篇 costs

机构

  • 81 篇 national laborat...
  • 35 篇 school of comput...
  • 22 篇 national key lab...
  • 22 篇 science and tech...
  • 21 篇 national laborat...
  • 16 篇 national laborat...
  • 14 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 parallel process...
  • 12 篇 national key lab...
  • 9 篇 national laborat...
  • 8 篇 parallel process...
  • 7 篇 national laborat...
  • 7 篇 national key lab...
  • 5 篇 national key lab...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 4 篇 school of advanc...
  • 4 篇 school of comput...
  • 4 篇 xiangjiang lab

作者

  • 19 篇 h.j. siegel
  • 14 篇 peng yuxing
  • 10 篇 wang huai-min
  • 10 篇 wang huaimin
  • 9 篇 wang yijie
  • 9 篇 xu xinhai
  • 8 篇 dongsheng li
  • 8 篇 guibin wang
  • 7 篇 zhou jing
  • 7 篇 jia jia
  • 7 篇 yuxing peng
  • 7 篇 liu jie
  • 7 篇 wang ji
  • 7 篇 wang guibin
  • 7 篇 yuhua tang
  • 7 篇 yin gang
  • 6 篇 lin yufei
  • 6 篇 zhou hangjun
  • 6 篇 yijie wang
  • 6 篇 che yonggang

语言

  • 326 篇 英文
  • 23 篇 中文
检索条件"机构=Parallel and Distribute Processing Laboratory School of Computer"
349 条 记 录,以下是121-130 订阅
排序:
Invalid pointer dereferences detection for CPS software based on extended pointer structures
Invalid pointer dereferences detection for CPS software base...
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Dong, Longming Dong, Wei Chen, Liqian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Invalid pointer dereferences, such as null pointer dereferences, dangling pointer dereferences and double frees, are a prevalent source of software bugs in CPS software, due to flexible dereferencing pointers along va... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Bodhi: Detecting buffer overflows with a game
Bodhi: Detecting buffer overflows with a game
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Chen, Jie Mao, Xiaoguang National Laboratory for Parallel and Distributed Processing Changsha China School of Computer National University of Defense Technology Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论
Providing information services for wireless sensor networks through cloud computing
Providing information services for wireless sensor networks ...
收藏 引用
2012 7th IEEE Asia-Pacific Services Computing Conference, APSCC 2012
作者: You, Pengfei Peng, Yuxing Gao, Hang National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Wireless sensor networks (WSN) is a critical technology for information gathering covering many areas, including health-care, transportation, air traffic control and environment monitoring. Despite wide use, the fast ... 详细信息
来源: 评论
Research of context situation awareness technology
Research of context situation awareness technology
收藏 引用
作者: Shi, Dianxi Wu, Zhendong Ding, Bo Yan, Huining National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
An efficient packing algorithm for spatial keyword queries
An efficient packing algorithm for spatial keyword queries
收藏 引用
6th International Conference on Convergence and Hybrid Information Technology, ICHIT 2012
作者: Pan, Jinkun Li, Dongsheng Li, Liming National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology 410073 Changsha China Shanghai Garrision 200040 Shanghai China
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel... 详细信息
来源: 评论
OONS: An object oriented neuronal simulator
OONS: An object oriented neuronal simulator
收藏 引用
2012 International Applied Mechanics, MechatronicsAutomation and System Simulation Meeting, AMMASS 2012
作者: Xu, Shuai Zhang, Baida Su, Yan Dept.of Information Engineering of the Academy of Armored Force Engineering Beijin China National laboratory for Parallel and Distributed Processing School of Computer NUDT China
OONS is a new Object Oriented Neural Simulator. The goal creating it is making the construction of neural model as quickly and easily as possible for the users, and can run in shorter time than other simulators. OONS ... 详细信息
来源: 评论
Support efficient and fault-tolerant multicast in bufferless network-on-chip
Support efficient and fault-tolerant multicast in bufferless...
收藏 引用
作者: Feng, Chaochao Lu, Zhonghai Jantsch, Axel Zhang, Minxuan Yang, Xianju National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China Department of Electronic Systems Royal Institute of Technology Sweden
SUMMARY In this paper, we propose three Deflection-Routing-based Multicast (DRM) schemes for a bufferless NoC. The DRM scheme without packets replication (DRM-noPR) sends multicast packet through a non deterministic p... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on computer Science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论