咨询与建议

限定检索结果

文献类型

  • 389 篇 会议
  • 137 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 25 篇 电气工程
    • 21 篇 机械工程
    • 20 篇 生物工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 材料科学与工程(可...
    • 5 篇 冶金工程
  • 137 篇 理学
    • 91 篇 数学
    • 27 篇 系统科学
    • 21 篇 生物学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 8 篇 化学
  • 85 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
    • 7 篇 作物学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 29 篇 computational mo...
  • 18 篇 benchmark testin...
  • 18 篇 distributed proc...
  • 17 篇 concurrent compu...
  • 17 篇 laboratories
  • 15 篇 algorithm design...
  • 14 篇 fault tolerance
  • 14 篇 computer archite...
  • 13 篇 deep learning
  • 13 篇 feature extracti...
  • 13 篇 kernel
  • 13 篇 training
  • 12 篇 computer science
  • 12 篇 parallel process...
  • 12 篇 cloud computing
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 servers
  • 11 篇 semantics
  • 11 篇 hardware

机构

  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 52 篇 college of compu...
  • 35 篇 school of comput...
  • 25 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 20 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...

作者

  • 20 篇 yijie wang
  • 19 篇 wang yijie
  • 15 篇 zhigang luo
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 14 篇 ji wang
  • 13 篇 naiyang guan
  • 12 篇 dongsheng li
  • 12 篇 liu jie
  • 12 篇 huaimin wang
  • 12 篇 jie liu
  • 11 篇 wang ji
  • 10 篇 wang huai-min
  • 10 篇 fu yongquan
  • 9 篇 yuxing peng
  • 9 篇 peichang shi
  • 9 篇 guibin wang
  • 9 篇 xuhui huang
  • 9 篇 xu xinhai
  • 9 篇 kai lu

语言

  • 497 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Science and Technology"
528 条 记 录,以下是321-330 订阅
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论
Skyline Query processing on Interval Uncertain Data
Skyline Query Processing on Interval Uncertain Data
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Xiaoyong Li Yijie Wang Xiaoling Li Guangdong Wang National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Many recent applications involve processing and analyzing uncertain data. Recently, several research efforts have addressed answering skyline queries efficiently on massive uncertain datasets. However, the research la... 详细信息
来源: 评论
Game-based software errors detection
收藏 引用
Advances in Information sciences and Service sciences 2012年 第15期4卷 426-433页
作者: Chen, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is... 详细信息
来源: 评论
A study of strategies to restrain the C&C activities of structured P2P botnets
A study of strategies to restrain the C&C activities of stru...
收藏 引用
International Conference on computer sciences and Convergence Information technology (ICCIT)
作者: Tianzuo Wang Bo Liu Huaimin Wang Hao Ren Xiaolong Ma School of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense and Technology Changsha China
Botnets are threatening the Internet heavily, and more and more botnets are utilizing the P2P technology to build their C&C (Command and Control) mechanisms. Some research have been made to compare the resilience ... 详细信息
来源: 评论
A modified estimation scheme of EBT algorithm for RFID system
A modified estimation scheme of EBT algorithm for RFID syste...
收藏 引用
International Conference on Intelligent Control and Information processing (ICICIP)
作者: Ruisi Zhao Yulu Yang Parallel and distributed processing laboratory Department of Computer Science and Technology Nankai University Tianjin China
The paper proposes a scheme to improve the accuracy of tag estimation in the EBT algorithm in RFID system. In the proposed scheme, the mean value of the estimated tag number should be acquired before calculating the o... 详细信息
来源: 评论
Simulation-based evaluation of the Imagine stream processor with scientific programs
收藏 引用
International Journal of High Performance Computing and Networking 2012年 第2期7卷 99-110页
作者: Che, Yonggang Xu, Chuanfu Lu, Pingjing Wang, Zhenghua National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 Hunan China
This paper evaluates the performance and efficiency of Imagine stream processor for scientific programs. It classifies scientific programs into three classes based on their computation to memory access ratios. Typical... 详细信息
来源: 评论
Research of Context Situation Awareness technology
Research of Context Situation Awareness Technology
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Dianxi Shi Zhendong Wu Bo Ding Huining Yan National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
International Conference on Information science and technology (ICIST)
作者: Jiangchao Liu Liqian Chen Longming Dong Ji Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
International Conference on Information science and technology (ICIST)
作者: Longming Dong Liqian Chen Jiangchao Liu Renjian Li National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures
Invalid Pointer Dereferences Detection for CPS Software Base...
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Longming Dong Wei Dong Liqian Chen National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Invalid pointer dereferences, such as null pointer dereferences, dangling pointer dereferences and double frees, are a prevalent source of software bugs in CPS software, due to flexible dereferencing pointers along va... 详细信息
来源: 评论