咨询与建议

限定检索结果

文献类型

  • 857 篇 会议
  • 255 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 696 篇 工学
    • 554 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 124 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 67 篇 电子科学与技术(可...
    • 51 篇 生物工程
    • 45 篇 机械工程
    • 35 篇 电气工程
    • 23 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
    • 18 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 13 篇 环境科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
  • 271 篇 理学
    • 180 篇 数学
    • 56 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 35 篇 物理学
    • 21 篇 化学
  • 176 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 6 篇 文学
  • 5 篇 医学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 51 篇 distributed proc...
  • 49 篇 laboratories
  • 40 篇 computational mo...
  • 38 篇 concurrent compu...
  • 33 篇 algorithm design...
  • 30 篇 distributed comp...
  • 29 篇 computer archite...
  • 29 篇 benchmark testin...
  • 29 篇 kernel
  • 27 篇 hardware
  • 26 篇 parallel process...
  • 26 篇 fault tolerance
  • 26 篇 graphics process...
  • 22 篇 servers
  • 22 篇 feature extracti...
  • 22 篇 cloud computing
  • 22 篇 training
  • 21 篇 throughput
  • 21 篇 bandwidth
  • 21 篇 protocols

机构

  • 169 篇 national laborat...
  • 135 篇 science and tech...
  • 93 篇 college of compu...
  • 88 篇 national laborat...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 35 篇 school of comput...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 national laborat...
  • 12 篇 national key lab...
  • 11 篇 laboratory of di...
  • 10 篇 parallel and dis...

作者

  • 41 篇 wang huaimin
  • 37 篇 liu jie
  • 37 篇 wang ji
  • 37 篇 yong dou
  • 36 篇 ji wang
  • 32 篇 jie liu
  • 29 篇 huaimin wang
  • 28 篇 dou yong
  • 27 篇 dongsheng li
  • 27 篇 xiaodong wang
  • 27 篇 yin gang
  • 26 篇 peng yuxing
  • 25 篇 yuxing peng
  • 25 篇 li dongsheng
  • 24 篇 yijie wang
  • 23 篇 wang yijie
  • 21 篇 xicheng lu
  • 21 篇 li kuan-ching
  • 21 篇 xingming zhou
  • 20 篇 gang yin

语言

  • 1,047 篇 英文
  • 63 篇 中文
  • 5 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory"
1115 条 记 录,以下是241-250 订阅
排序:
Data dependence-based optimistic data consistency maintenance method
Data dependence-based optimistic data consistency maintenanc...
收藏 引用
6th IEEE International Conference on Computer and Information Technology, CIT 2006
作者: Zhou, Jing Wang, Yijie Li, Sikun National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology China
Data replication introduces well-known consistency issues. This paper puts forward the question about data dependence in data consistency, which embodies pseudo-conflict updates and update dependency. According to tha... 详细信息
来源: 评论
Research on online failure prediction model and status pretreatment method for exascale system
Research on online failure prediction model and status pretr...
收藏 引用
3rd International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2011
作者: Zhou, Hao Jiang, Yanhuang National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executin... 详细信息
来源: 评论
Error detection by redundant transaction in transactional memory system
Error detection by redundant transaction in transactional me...
收藏 引用
IEEE International Conference on Networking, Architecture and Storage
作者: Song, Wei Jia, Jia Peng, Yu-Xing National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
This paper addresses the issue of error detection in transactional memory, and proposes a new method of error detection based on redundant transaction (EDRT). This method creates a transaction copy for every transacti... 详细信息
来源: 评论
Model-directed multi-level parallelization for multi-task programs on the Cell BE
Model-directed multi-level parallelization for multi-task pr...
收藏 引用
2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
作者: Wang, Miao Benoit, Nicolas Bodin, François National Laboratory for Parallel and Distributed Processing NUDT Changsha 410073 China University of Rennes 1 Rennes 35000 France
Multi-core architectures can deliver high processing power if the multiple levels of parallelism they expose are exploited. However, it is non-trivial to orchestrate the computational and memory resources allocation. ... 详细信息
来源: 评论
Pegasus:a distributed and load-balancing fingerprint identification system
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2016年 第8期17卷 766-780页
作者: Yun-xiang ZHAO Wan-xin ZHANG Dong-sheng LI Zhen HUANG Min-ne LI Xi-cheng LU National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha 410003 China
Fingerprint has been widely used in a variety of biometric identification systems in the past several years due to its uniqueness and immutability. With the rapid development of fingerprint identification techniques, ... 详细信息
来源: 评论
Fault tolerant Lu factorization in transactional memory system
Fault tolerant Lu factorization in transactional memory syst...
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Song, Wei Jia, Jia National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
With the popularization of multi-core processors, transaction memory, as a concurrent control mechanism with easy programing and high scalability, has attracted more and more attention. As a result, the reliability pr... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information Science and Technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Exploring the patterns of social behavior in Github  1
Exploring the patterns of social behavior in Github
收藏 引用
1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014
作者: Yu, Yue Yin, Gang Wang, Huaimin Wang, Tao National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha410073 China
Social coding paradigm is reshaping the distributed soft- ware development with a surprising speed in recent years. Github, a remarkable social coding community, attracts a huge number of developers in a short time. V... 详细信息
来源: 评论
Large-scale virtual machines provisioning in clouds: challenges and approaches
收藏 引用
Frontiers of Computer Science 2016年 第1期10卷 2-18页
作者: Zhaoning ZHANG Dongsheng LI Kui WU National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China Computer Science Department University of Victoria Victoria V8W 2Y2 Canada
The scale of global data center market has been explosive in recent years. As the market grows, the demand for fast provisioning of the virtual resources to support elas- tic, manageable, and economical computing over... 详细信息
来源: 评论
Bodhi: Detecting buffer overflows with a game
Bodhi: Detecting buffer overflows with a game
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Chen, Jie Mao, Xiaoguang National Laboratory for Parallel and Distributed Processing Changsha China School of Computer National University of Defense Technology Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论