咨询与建议

限定检索结果

文献类型

  • 351 篇 会议
  • 105 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 283 篇 工学
    • 222 篇 计算机科学与技术...
    • 162 篇 软件工程
    • 61 篇 信息与通信工程
    • 31 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 控制科学与工程
    • 19 篇 机械工程
    • 15 篇 生物工程
    • 13 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 7 篇 环境科学与工程(可...
    • 6 篇 材料科学与工程(可...
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 4 篇 建筑学
  • 110 篇 理学
    • 73 篇 数学
    • 20 篇 系统科学
    • 16 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 9 篇 化学
  • 70 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 8 篇 法学
    • 7 篇 社会学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 医学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 36 篇 concurrent compu...
  • 28 篇 parallel process...
  • 26 篇 laboratories
  • 23 篇 computational mo...
  • 18 篇 application soft...
  • 17 篇 computer archite...
  • 17 篇 distributed comp...
  • 15 篇 computer science
  • 15 篇 algorithm design...
  • 15 篇 distributed proc...
  • 12 篇 fault tolerance
  • 12 篇 graphics process...
  • 12 篇 benchmark testin...
  • 12 篇 hardware
  • 11 篇 processor schedu...
  • 10 篇 throughput
  • 10 篇 servers
  • 10 篇 semantics
  • 10 篇 analytical model...
  • 10 篇 clustering algor...

机构

  • 81 篇 national laborat...
  • 35 篇 school of comput...
  • 32 篇 science and tech...
  • 25 篇 national laborat...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 college of compu...
  • 16 篇 national laborat...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 parallel process...
  • 12 篇 national key lab...
  • 8 篇 national laborat...
  • 8 篇 parallel process...
  • 8 篇 national key lab...
  • 7 篇 national laborat...
  • 6 篇 college of compu...
  • 5 篇 school of advanc...
  • 5 篇 xiangjiang lab
  • 5 篇 department of co...

作者

  • 19 篇 h.j. siegel
  • 19 篇 li kuan-ching
  • 19 篇 yang chao-tung
  • 14 篇 peng yuxing
  • 10 篇 wang huai-min
  • 10 篇 wang huaimin
  • 9 篇 xiaodong wang
  • 9 篇 liu jie
  • 9 篇 wang yijie
  • 9 篇 wang ji
  • 9 篇 ji wang
  • 9 篇 jie liu
  • 9 篇 xu xinhai
  • 8 篇 yuxing peng
  • 8 篇 dongsheng li
  • 8 篇 guibin wang
  • 7 篇 zhou jing
  • 7 篇 jia jia
  • 7 篇 wang guibin
  • 7 篇 huaimin wang

语言

  • 432 篇 英文
  • 23 篇 中文
  • 3 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Engineering"
458 条 记 录,以下是191-200 订阅
排序:
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
Support efficient and fault-tolerant multicast in bufferless network-on-chip
Support efficient and fault-tolerant multicast in bufferless...
收藏 引用
作者: Feng, Chaochao Lu, Zhonghai Jantsch, Axel Zhang, Minxuan Yang, Xianju National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China Department of Electronic Systems Royal Institute of Technology Sweden
SUMMARY In this paper, we propose three Deflection-Routing-based Multicast (DRM) schemes for a bufferless NoC. The DRM scheme without packets replication (DRM-noPR) sends multicast packet through a non deterministic p... 详细信息
来源: 评论
Topology awareness algorithm for virtual network mapping
收藏 引用
Journal of Zhejiang University-Science C(computers and Electronics) 2012年 第3期13卷 178-186页
作者: Xiao-ling LI Huai-min WANG Chang-guo GUO Bo DING Xiao-yong LI Wen-qi BI Shuang TAN National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology.Changsha 410073China School of Computer National University of Defense TechnologyChangsha 410073China China Electronic Systems Engineering Corporation Beijing 100039China The Northern Institute of Electronic Equipment of China Beijing 100083China
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne... 详细信息
来源: 评论
Inducing taxonomy from tags: An agglomerative hierarchical clustering framework
Inducing taxonomy from tags: An agglomerative hierarchical c...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Li, Xiang Wang, Huaimin Yin, Gang Wang, Tao Yang, Cheng Yu, Yue Tang, Dengqing National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China College of Mechatronics Engineering and Automation National University of Defense Technology Changsha China
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on computer Science and Electronics engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
Topology-aware deployment of scientific applications in cloud computing
Topology-aware deployment of scientific applications in clou...
收藏 引用
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012
作者: Fan, Pei Chen, Zhenbang Wang, Ji Zheng, Zibin Lyu, Michael R. National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论
Game-based software errors detection
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第15期4卷 426-433页
作者: Chen, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is... 详细信息
来源: 评论
Simulation-based evaluation of the Imagine stream processor with scientific programs
收藏 引用
International Journal of High Performance Computing and Networking 2012年 第2期7卷 99-110页
作者: Che, Yonggang Xu, Chuanfu Lu, Pingjing Wang, Zhenghua National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 Hunan China
This paper evaluates the performance and efficiency of Imagine stream processor for scientific programs. It classifies scientific programs into three classes based on their computation to memory access ratios. Typical... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Jiangchao Liu Liqian Chen Longming Dong Ji Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论