咨询与建议

限定检索结果

文献类型

  • 390 篇 会议
  • 137 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 252 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 25 篇 电气工程
    • 21 篇 机械工程
    • 20 篇 生物工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 8 篇 环境科学与工程(可...
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 力学(可授工学、理...
    • 5 篇 材料科学与工程(可...
    • 5 篇 冶金工程
  • 137 篇 理学
    • 91 篇 数学
    • 27 篇 系统科学
    • 21 篇 生物学
    • 18 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 8 篇 化学
  • 85 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
    • 7 篇 作物学
  • 3 篇 文学
  • 3 篇 医学
  • 3 篇 军事学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 29 篇 computational mo...
  • 18 篇 benchmark testin...
  • 18 篇 distributed proc...
  • 17 篇 concurrent compu...
  • 17 篇 laboratories
  • 15 篇 algorithm design...
  • 14 篇 fault tolerance
  • 14 篇 computer archite...
  • 13 篇 deep learning
  • 13 篇 feature extracti...
  • 13 篇 kernel
  • 13 篇 training
  • 12 篇 computer science
  • 12 篇 parallel process...
  • 12 篇 cloud computing
  • 11 篇 application soft...
  • 11 篇 graphics process...
  • 11 篇 servers
  • 11 篇 semantics
  • 11 篇 hardware

机构

  • 81 篇 national laborat...
  • 78 篇 science and tech...
  • 52 篇 college of compu...
  • 35 篇 school of comput...
  • 25 篇 national laborat...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 20 篇 national laborat...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 9 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...

作者

  • 20 篇 yijie wang
  • 19 篇 wang yijie
  • 16 篇 wang huaimin
  • 15 篇 zhigang luo
  • 15 篇 peng yuxing
  • 14 篇 ji wang
  • 13 篇 naiyang guan
  • 12 篇 dongsheng li
  • 12 篇 liu jie
  • 12 篇 huaimin wang
  • 12 篇 jie liu
  • 11 篇 wang ji
  • 11 篇 fu yongquan
  • 10 篇 wang huai-min
  • 10 篇 kai lu
  • 9 篇 yuxing peng
  • 9 篇 peichang shi
  • 9 篇 guibin wang
  • 9 篇 xuhui huang
  • 9 篇 xu xinhai

语言

  • 497 篇 英文
  • 30 篇 中文
  • 2 篇 其他
检索条件"机构=Parallel and Distributed Processing Laboratory School of Computer Science and Technology"
529 条 记 录,以下是41-50 订阅
排序:
Recent advances on trusted computing in China
收藏 引用
Chinese science Bulletin 2012年 第35期57卷 4529-4532页
作者: DONG Wei CHEN LiQian School of Computer National University of Defense TechnologyChangsha 410073China National Laboratory for Parallel and Distributed Processing Changsha 410073China
This article highlights some recent research advances on trusted computing in China,focusing mainly on the methodologies and technologies related to trusted computing module,trusted computing platform,trusted network ... 详细信息
来源: 评论
Iaso: an autonomous fault-tolerant management system for supercomputers
收藏 引用
Frontiers of computer science 2014年 第3期8卷 378-390页
作者: Kai LU Xiaoping WANG Gen LI Ruibo WANG Wanqing CHI Yongpeng LIU Hongwei TANG Hua FENG Yinghui GAO Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China College of Computer National University of Defense Technology Changsha 410073 China ATR Laboratory National University of Defense Technology Changsha 410073 China
With the increase of system scale, the inherent reliability of supercomputers becomes lower and lower. The cost of fault handling and task recovery increases so rapidly that the reliability issue will soon harm the us... 详细信息
来源: 评论
An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
收藏 引用
Wuhan University Journal of Natural sciences 2014年 第5期19卷 455-460页
作者: ZHOU Huan WANG Xiaofeng SU Jinshu School of Computer National University of Defense Technology National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Identity-based key agreement protocol affords a natural way to combine the participant's identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) e... 详细信息
来源: 评论
Data dependence-based optimistic data consistency maintenance method
Data dependence-based optimistic data consistency maintenanc...
收藏 引用
6th IEEE International Conference on computer and Information technology, CIT 2006
作者: Zhou, Jing Wang, Yijie Li, Sikun National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology China
Data replication introduces well-known consistency issues. This paper puts forward the question about data dependence in data consistency, which embodies pseudo-conflict updates and update dependency. According to tha... 详细信息
来源: 评论
Merge-Weighted Dynamic Time Warping for Speech Recognition
收藏 引用
Journal of computer science & technology 2014年 第6期29卷 1072-1082页
作者: 张湘莉兰 骆志刚 李明 State Key Laboratory of Pathogen and Biosecurity Beijing Institute of Microbiology and Epidemiology Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology David R.Cheriton School of Computer Science University of WaterlooWaterlooOntario N2L 3G1Canada ACM IEEE
Obtaining training material for rarely used English words and common given names from countries where English is not spoken is difficult due to excessive time, storage and cost factors. By considering personal privacy... 详细信息
来源: 评论
Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data  27
Effective Anomaly Detection Based on Reinforcement Learning ...
收藏 引用
27th IEEE International Conference on parallel and distributed Systems, ICPADS 2021
作者: Wang, Zhongyang Wang, Yijie Xu, Hongzuo Wang, Yongjun National University of Defense Technology Science and Technology on Parallel Distributed Processing Laboratory College of Computer China
Mixed-type data with both categorical and numerical features are ubiquitous in network security, but the existing methods are minimal to deal with them. Existing methods usually process mixed-type data through feature... 详细信息
来源: 评论
NVLAN: A Novel VLAN technology for Scalable Multi-tenant Datacenter Networks  2
NVLAN: A Novel VLAN Technology for Scalable Multi-tenant Dat...
收藏 引用
2nd International Conference on Advanced Cloud and Big Data, CBD 2014
作者: Hu, Yang Li, Huiba Peng, Yuxing Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Computer Science Department China
Nowadays, cloud providers of 'Infrastructure as a service' require datacenter networks to support virtualization and multi-tenancy at large scale, while it brings a grand challenge to datacenters. Traditional ... 详细信息
来源: 评论
An Efficient and Flexible Deterministic Framework for Multithreaded Programs
收藏 引用
Journal of computer science & technology 2015年 第1期30卷 42-56页
作者: 卢凯 周旭 王小平 Tom Bergan 陈沉 Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China College of Computer National University of Defense Technology Changsha 410073 China Department of Computer Science and Engineering University of Washington Seattle WA 98195-2350 U.S.A.
Determinism is very useful to multithreaded programs in debugging, testing, etc. Many deterministic ap- proaches have been proposed, such as deterministic multithreading (DMT) and deterministic replay. However, thes... 详细信息
来源: 评论
Versionized process based on non-volatile random-access memory for fine-grained fault tolerance
收藏 引用
Frontiers of Information technology & Electronic Engineering 2018年 第2期19卷 192-205页
作者: Wen-zhe ZHANG Kai LU Xiao-ping WANG Science and Technology on Parallel and Distributed Processing Laboratory College of ComputerNational University of Defense Technology
Non-volatile random-access memory(NVRAM) technology is maturing rapidly and its byte-persistence feature allows the design of new and efficient fault tolerance mechanisms. In this paper we propose the versionized pr... 详细信息
来源: 评论
Exploring the patterns of social behavior in Github  1
Exploring the patterns of social behavior in Github
收藏 引用
1st International Workshop on Crowd-Based Software Development Methods and Technologies, CrowdSoft 2014
作者: Yu, Yue Yin, Gang Wang, Huaimin Wang, Tao National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha410073 China
Social coding paradigm is reshaping the distributed soft- ware development with a surprising speed in recent years. Github, a remarkable social coding community, attracts a huge number of developers in a short time. V... 详细信息
来源: 评论