咨询与建议

限定检索结果

文献类型

  • 390 篇 会议
  • 137 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 252 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 25 篇 电气工程
    • 21 篇 机械工程
    • 20 篇 生物工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 材料科学与工程(可...
    • 5 篇 冶金工程
  • 137 篇 理学
    • 91 篇 数学
    • 27 篇 系统科学
    • 21 篇 生物学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 8 篇 化学
  • 85 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
    • 7 篇 作物学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 29 篇 computational mo...
  • 18 篇 benchmark testin...
  • 18 篇 distributed proc...
  • 17 篇 concurrent compu...
  • 17 篇 laboratories
  • 15 篇 algorithm design...
  • 14 篇 fault tolerance
  • 14 篇 computer archite...
  • 13 篇 deep learning
  • 13 篇 feature extracti...
  • 13 篇 kernel
  • 13 篇 training
  • 12 篇 computer science
  • 12 篇 parallel process...
  • 12 篇 cloud computing
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 servers
  • 11 篇 semantics
  • 11 篇 hardware

机构

  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 52 篇 college of compu...
  • 35 篇 school of comput...
  • 25 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 20 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...

作者

  • 20 篇 yijie wang
  • 19 篇 wang yijie
  • 16 篇 wang huaimin
  • 15 篇 zhigang luo
  • 15 篇 peng yuxing
  • 14 篇 ji wang
  • 13 篇 naiyang guan
  • 12 篇 dongsheng li
  • 12 篇 liu jie
  • 12 篇 huaimin wang
  • 12 篇 jie liu
  • 11 篇 wang ji
  • 11 篇 fu yongquan
  • 10 篇 wang huai-min
  • 10 篇 kai lu
  • 9 篇 yuxing peng
  • 9 篇 peichang shi
  • 9 篇 guibin wang
  • 9 篇 xuhui huang
  • 9 篇 xu xinhai

语言

  • 497 篇 英文
  • 30 篇 中文
  • 2 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Science and Technology"
529 条 记 录,以下是161-170 订阅
排序:
A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor
A secure light-weight public auditing scheme in cloud comput...
收藏 引用
作者: Wu, Yilun Lin, Xinye Lu, Xicheng Su, Jinshu Chen, Peixin College of Computer National University of Defense Technology China School of Computer Science McGill University Montreal Canada National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology China
Public auditing is a new technique to protect the integrity of outsourced data in the remote cloud. Users delegate the ability of auditing to a third party auditor (TPA), and assume that each result from the TPA is co... 详细信息
来源: 评论
MixedCache: Enabling Flow Directed Rule-Caching Scheme based on Heterogeneous Cache for OpenFlow  3
MixedCache: Enabling Flow Directed Rule-Caching Scheme based...
收藏 引用
2020 3rd International Conference on computer Information science and Artificial Intelligence, CISAI 2020
作者: Yang, Jialun Yang, Yi Liu, Jiahao Liu, Rulin Qiao, Peng Wang, Baosheng College of Computer Science and Technology National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China
OpenFlow switches in SDN use Multiple Flow Tables (MFTs) for fine-grained flow control. Commodity switches integrate hardware storage resources such as SRAM and TCAM to store flow tables to achieve high-speed lookups.... 详细信息
来源: 评论
Efficient social network approximate analysis on blogosphere based on network structure characteristics
Efficient social network approximate analysis on blogosphere...
收藏 引用
3rd Workshop on Social Network Mining and Analysis, SNA-KDD '09
作者: Tang, Jintao Wang, Ting Wang, Ji Wei, Dengping School of Computer National University of Defense Technology ChangSha Hunan 410073 China National Laboratory for Parallel and Distributed Processing ChangSha Hunan 410073 China
As a typical social media in Web 2.0, blogs have attracted a surge of researches. Unlike the traditional studies, the social networks mined from Internet are very large, which makes a lot of social network analyzing a... 详细信息
来源: 评论
A simulated annealing technique for optimizing timewarp simulation
A simulated annealing technique for optimizing timewarp simu...
收藏 引用
2010 International Conference on computer Modeling and Simulation, ICCMS 2010
作者: Zhang, Wei Meraji, Sina Wang, Jun Tropper, Carl National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology ChangSha 410073 China School of Computer Science McGill University Montreal H3A 2A7 Canada
According to Moore's law the complexity of VLSI circuits has doubled approximately every two years, resulting in simulation becoming the major bottleneck in the circuit design process. parallel and distributed sim... 详细信息
来源: 评论
Grid computing in China
收藏 引用
Journal of Grid Computing 2004年 第2期2卷 193-206页
作者: Yang, Guangwen Jin, Hai Li, Minglu Xiao, Nong Li, Wei Wu, Zhaohui Wu, Yongwei Tang, Feilong Department of Computer Science and Technology Tsinghua University Beijing China School of Computer Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China College of Computer Science Zhejiang University Hangzhou 310027 China
Grid computing presents a new trend to distributed computation and Internet applications, which can construct a virtual single image of heterogeneous resources, provide uniform application interface and integrate wide... 详细信息
来源: 评论
An efficient packing algorithm for spatial keyword queries
An efficient packing algorithm for spatial keyword queries
收藏 引用
6th International Conference on Convergence and Hybrid Information technology, ICHIT 2012
作者: Pan, Jinkun Li, Dongsheng Li, Liming National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology 410073 Changsha China Shanghai Garrision 200040 Shanghai China
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel... 详细信息
来源: 评论
Inducing taxonomy from tags: An agglomerative hierarchical clustering framework
Inducing taxonomy from tags: An agglomerative hierarchical c...
收藏 引用
8th International Conference on Advanced Data Mining and Applications, ADMA 2012
作者: Li, Xiang Wang, Huaimin Yin, Gang Wang, Tao Yang, Cheng Yu, Yue Tang, Dengqing National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China College of Mechatronics Engineering and Automation National University of Defense Technology Changsha China
By amassing 'wisdom of the crowd', social tagging systems draw more and more academic attention in interpreting Internet folk knowledge. In order to uncover their hidden semantics, several researches have atte... 详细信息
来源: 评论
Model transformation based verification of Web services composition
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Yang, YanPing Tan, QingPing Xiao, Yong School of Computer Science National University of Defense Technology Changsha 410073 China National Lab. of Parallel Distributed Processing Changsha 410073 China
Current Web services composition proposals, such as BPEL, BPSS, BPMN and WSCI, provide notations for describing the control and message flows in Web service collaborations. However, such proposals remain at the descri... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on computer science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论