咨询与建议

限定检索结果

文献类型

  • 351 篇 会议
  • 105 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 283 篇 工学
    • 222 篇 计算机科学与技术...
    • 162 篇 软件工程
    • 61 篇 信息与通信工程
    • 31 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 控制科学与工程
    • 19 篇 机械工程
    • 15 篇 生物工程
    • 13 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 7 篇 环境科学与工程(可...
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 4 篇 建筑学
  • 110 篇 理学
    • 73 篇 数学
    • 20 篇 系统科学
    • 16 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 9 篇 化学
  • 70 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 8 篇 法学
    • 7 篇 社会学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 医学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 36 篇 concurrent compu...
  • 28 篇 parallel process...
  • 26 篇 laboratories
  • 23 篇 computational mo...
  • 18 篇 application soft...
  • 17 篇 computer archite...
  • 17 篇 distributed comp...
  • 15 篇 computer science
  • 15 篇 algorithm design...
  • 15 篇 distributed proc...
  • 12 篇 fault tolerance
  • 12 篇 graphics process...
  • 12 篇 benchmark testin...
  • 12 篇 hardware
  • 11 篇 processor schedu...
  • 10 篇 throughput
  • 10 篇 servers
  • 10 篇 semantics
  • 10 篇 analytical model...
  • 10 篇 clustering algor...

机构

  • 81 篇 national laborat...
  • 35 篇 school of comput...
  • 32 篇 science and tech...
  • 25 篇 national laborat...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 college of compu...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 parallel process...
  • 12 篇 national key lab...
  • 8 篇 national laborat...
  • 8 篇 parallel process...
  • 8 篇 national key lab...
  • 7 篇 national laborat...
  • 6 篇 college of compu...
  • 5 篇 school of advanc...
  • 5 篇 xiangjiang lab
  • 5 篇 department of co...

作者

  • 19 篇 h.j. siegel
  • 19 篇 li kuan-ching
  • 19 篇 yang chao-tung
  • 14 篇 peng yuxing
  • 10 篇 wang huai-min
  • 10 篇 wang huaimin
  • 9 篇 xiaodong wang
  • 9 篇 liu jie
  • 9 篇 wang yijie
  • 9 篇 wang ji
  • 9 篇 ji wang
  • 9 篇 jie liu
  • 9 篇 xu xinhai
  • 8 篇 yuxing peng
  • 8 篇 dongsheng li
  • 8 篇 guibin wang
  • 7 篇 zhou jing
  • 7 篇 jia jia
  • 7 篇 wang guibin
  • 7 篇 huaimin wang

语言

  • 434 篇 英文
  • 23 篇 中文
  • 1 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Engineering"
458 条 记 录,以下是1-10 订阅
排序:
FMCC-RT: a scalable and fine-grained all-reduce algorithm for large-scale SMP clusters
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 362-379页
作者: Jintao PENG Jie LIU Jianbin FANG Min XIE Yi DAI Zhiquan LAI Bo YANG Chunye GONG Xinjun MAO Guo MAO Jie REN School of Computer Science and Technology National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology National Supercomputer Center in Tianjin School of Computer Science Shaanxi Normal University
All-reduce is a widely used communication technique for distributed and parallel applications typically implemented using either a tree-based or ring-based scheme. Each of these approaches has its own limitations: tre... 详细信息
来源: 评论
YFLM: An Improved Levenberg-Marquardt Algorithm for Global Bundle Adjustment  41st
YFLM: An Improved Levenberg-Marquardt Algorithm for Global ...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Peng, Jiaxin Li, Tao Jiang, Qin Liu, Jie Wang, Ruibo Laboratory of Software Engineering for Complex Systems School of Computer Science National University of Defense Technology Hunan Changsha410073 China Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Hunan Changsha410073 China
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ... 详细信息
来源: 评论
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPUs  22nd
Optimizing Yinyang K-Means Algorithm on ARMv8 Many-Core CPU...
收藏 引用
22nd International Conference on Algorithms and Architectures for parallel processing, ICA3PP 2022
作者: Zhou, Tianyang Wang, Qinglin Yin, Shangfei Hao, Ruochen Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China School of Computer Science National University of Defense Technology Changsha410073 China
K-Means algorithm is one of the most common clustering algorithms widely applied in various data analysis applications. Yinyang K-Means algorithm is a popular enhanced K-Means algorithm that avoids most unnecessary ca... 详细信息
来源: 评论
CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory  24
CHIME: A Cache-Efficient and High-Performance Hybrid Index o...
收藏 引用
30th ACM Symposium on Operating Systems Principles, SOSP 2024
作者: Luo, Xuchuan Shen, Jiacheng Zuo, Pengfei Wang, Xin Lyu, Michael R. Zhou, Yangfan National Key Laboratory of Parallel and Distributed Computing Changsha China School of Computer Science Fudan University Shanghai China Duke Kunshan University Kunshan China Huawei Cloud Shenzhen China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China The Chinese University of Hong Kong Hong Kong Hong Kong
Disaggregated memory (DM) is a widely discussed datacenter architecture in academia and industry. It decouples computing and memory resources from monolithic servers into two network-connected resource pools. Range in... 详细信息
来源: 评论
A Fast Adversarial Sample Detection Approach for Industrial Internet-of-Things Applications
A Fast Adversarial Sample Detection Approach for Industrial ...
收藏 引用
International Workshop on Quality of Service
作者: Shigeng Zhang Yudong Li Shuxin Chen Xuan Li Jian Zhang School of Computer Science and Engineering Central South University College of Computer Science and Electronic Engineering Hunan University The Science and Technology on Parallel and Distributed Processing Laboratory (PDL) China
Adversarial attacks reveal the inherent vulnerability of deep neural networks, which face serious security issues for their security. Among them, the attack against the Deep Neural Network (DNN) application used in th...
来源: 评论
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsourced Taxis  40
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsou...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Gao, Junhui Wang, Qianru Zhang, Xin Shi, Juan Zhao, Xiang Han, Qingye Pan, Yan School of Computer Science Northwestern Polytechnical University China School of Computer Science and Technology Xidian University China Air Force Engineering University China National University of Defense Technology Laboratory for Big Data and Decision China School of Management Science and Real Estate Chongqing University China National University of Defense Technology National Key Laboratory of Information Systems Engineering China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing China
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t... 详细信息
来源: 评论
A survey of script learning
收藏 引用
Frontiers of Information Technology & Electronic engineering 2021年 第3期22卷 341-373页
作者: Yi HAN Linbo QIAO Jianming ZHENG Hefeng WU Dongsheng LI Xiangke LIAO Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense TechnologyChangsha 410000China Science and Technology on Information Systems Engineering Laboratory National University of Defense TechnologyChangsha 410000China School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510006China
Script is the structured knowledge representation of prototypical real-life event *** the commonsense knowledge inside the script can be helpful for machines in understanding natural language and drawing commonsensibl... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms  14
Feature and Performance Comparison of FaaS Platforms
收藏 引用
14th IEEE International Conference on Software engineering and Service Science, ICSESS 2023
作者: Ma, Penghui Shi, Peichang Yi, Guodong College of Computer Science National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China College of Computer Science National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems Changsha410073 China Xiangjiang Lab Changsha410073 China School of Advanced Interdisciplinary Studies Hunan University of Technology and Business Changsha410073 China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove... 详细信息
来源: 评论
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack
MPS: A Multiple Poisoned Samples Selection Strategy in Backd...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weihong Zou Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu Schoosl of Computer Science and Engineering Central South University Science and Technology on Parallel and Distributed Processing Laboratory (PDL) College of Computer Science and Electronic Engineering Hunan University
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple poisoned samples attacks usually r... 详细信息
来源: 评论