咨询与建议

限定检索结果

文献类型

  • 389 篇 会议
  • 137 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 25 篇 电气工程
    • 21 篇 机械工程
    • 20 篇 生物工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 材料科学与工程(可...
    • 5 篇 冶金工程
  • 137 篇 理学
    • 91 篇 数学
    • 27 篇 系统科学
    • 21 篇 生物学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 8 篇 化学
  • 85 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
    • 7 篇 作物学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 29 篇 computational mo...
  • 18 篇 benchmark testin...
  • 18 篇 distributed proc...
  • 17 篇 concurrent compu...
  • 17 篇 laboratories
  • 15 篇 algorithm design...
  • 14 篇 fault tolerance
  • 14 篇 computer archite...
  • 13 篇 deep learning
  • 13 篇 feature extracti...
  • 13 篇 kernel
  • 13 篇 training
  • 12 篇 computer science
  • 12 篇 parallel process...
  • 12 篇 cloud computing
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 servers
  • 11 篇 semantics
  • 11 篇 hardware

机构

  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 52 篇 college of compu...
  • 35 篇 school of comput...
  • 25 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 20 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...

作者

  • 20 篇 yijie wang
  • 19 篇 wang yijie
  • 15 篇 zhigang luo
  • 15 篇 peng yuxing
  • 15 篇 wang huaimin
  • 14 篇 ji wang
  • 13 篇 naiyang guan
  • 12 篇 dongsheng li
  • 12 篇 liu jie
  • 12 篇 huaimin wang
  • 12 篇 jie liu
  • 11 篇 wang ji
  • 10 篇 wang huai-min
  • 10 篇 fu yongquan
  • 9 篇 yuxing peng
  • 9 篇 peichang shi
  • 9 篇 guibin wang
  • 9 篇 xuhui huang
  • 9 篇 xu xinhai
  • 9 篇 kai lu

语言

  • 497 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Science and Technology"
528 条 记 录,以下是331-340 订阅
排序:
SMP-SIM: An event-driven performance simulator for SMP
SMP-SIM: An event-driven performance simulator for SMP
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Xin Zhang Yuhua Tang Yufei Lin Xinhai Xu Xiaowei Guo Xiaoguang Ren National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Performance prediction for the high performance computer system is of great importance for designing, implementing, and optimizing system. As a widely used technique for predicting performance, simulation method attra... 详细信息
来源: 评论
Bodhi: Detecting Buffer Overflows with a Game
Bodhi: Detecting Buffer Overflows with a Game
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Jie Chen Xiaoguang Mao School of Computer National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yunlong Wu Chen Chen Huiquan Wang Jie Zhou Xinhai Xu National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan P. R. China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Reduced complexity tree-structured conditional random field for all-words word sense disambiguation
收藏 引用
Journal of Computational Information Systems 2012年 第3期8卷 1177-1186页
作者: Zhou, Yun Wang, Ting Wang, Zhiyuan Xie, Songxian Computer School National University of Defense Technology Changsha 410073 China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
In this paper, we apply tree-structured conditional random field (TCRF) to all-words word sense disambiguation (WSD), where the graphical structure of TCRF is the dependency syntax tree produced by Minipar. The extrem... 详细信息
来源: 评论
Research on Malicious Code Detection Based on Least-squares Estimation
Research on Malicious Code Detection Based on Least-squares ...
收藏 引用
International Conference on computer science and Electronics Engineering (ICCSEE)
作者: Yunlong Wu Chen Chen Huiquan Wang Xinhai Xu Jie Zhou National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan P. R. China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairness View
Cooperative Spectrum Sharing in Relay-Trading Mode: A Fairne...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Lixia Liu Gang Hu Ming Xu Yuxing Peng National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China Department of Networks Engineering School of Computer National University of Defense Technology Changsha China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
Speeding up the MATLAB complex networks package using graphic processors
收藏 引用
Chinese Physics B 2011年 第9期20卷 460-467页
作者: 张百达 唐玉华 吴俊杰 李鑫 National laboratory for Parallel and Distributed Processing School of ComputerNational University of Defense Technology Department of Computer Science and Technology School of ComputerNational University of Defense Technology
The availability of computers and communication networks allows us to gather and analyse data on a far larger scale than previously. At present, it is believed that statistics is a suitable method to analyse networks ... 详细信息
来源: 评论
Betweenness-based algorithm for a partition scale-free graph
收藏 引用
Chinese Physics B 2011年 第11期20卷 556-564页
作者: 张百达 吴俊杰 唐玉华 周静 National Laboratory for Parallel and Distributed Processing School of ComputersNational University of Defense Technology Department of Computer Science and Technology School of ComputersNational University of Defense Technology
Many real-world networks are found to be scale-free. However, graph partition technology, as a technology capable of parallel computing, performs poorly when scale-free graphs are provided. The reason for this is that... 详细信息
来源: 评论
A Programming Language Approach to Internet-Based Virtual Computing Environment
收藏 引用
Journal of computer science & technology 2011年 第4期26卷 600-615页
作者: 王戟 沈锐 王怀民 National Laboratory for Parallel and Distributed Processing School of ComputerNational University of Defense Technology
There is an increasing need to build scalable distributed systems over the Internet infrastructure. However the development of distributed scalable applications suffers from lack of a wide accepted virtual computing e... 详细信息
来源: 评论
Topology-Aware Deployment of Scientific Applications in Cloud Computing
Topology-Aware Deployment of Scientific Applications in Clou...
收藏 引用
IEEE International Conference on Cloud Computing, CLOUD
作者: Pei Fan Zhenbang Chen Ji Wang Zibin Zheng Michael R. Lyu National Laboratory for Parallel & Distributed Processing National University of Defense Technology Changsha P.R.China Dept. of Computer Science & Engineering The Chinese University of Hong Kong Hong Kong China
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论