咨询与建议

限定检索结果

文献类型

  • 828 篇 会议
  • 288 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,118 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 547 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 134 篇 信息与通信工程
    • 80 篇 控制科学与工程
    • 73 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 42 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 286 篇 理学
    • 178 篇 数学
    • 67 篇 生物学
    • 50 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 26 篇 化学
  • 179 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 45 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 29 篇 feature extracti...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 170 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 79 篇 national laborat...
  • 37 篇 national laborat...
  • 36 篇 school of comput...
  • 36 篇 national laborat...
  • 36 篇 science and tech...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 13 篇 national key lab...
  • 12 篇 college of compu...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 37 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 22 篇 zhigang luo
  • 22 篇 wang ji
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,032 篇 英文
  • 51 篇 中文
  • 34 篇 其他
检索条件"机构=Science and Technology on Parallel & Distributed Processing Laboratory"
1118 条 记 录,以下是231-240 订阅
排序:
Clustering-preserving Network Flow Sketching
Clustering-preserving Network Flow Sketching
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Yongquan Fu Dongsheng Li Siqi Shen Yiming Zhang Kai Chen Science and Technology Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology SING Lab Hong Kong University of Science and Technology
Network monitoring is vital in modern clouds and data center networks that need diverse traffic statistics ranging from flow size distributions to heavy hitters. To cope with increasing network rates and massive traff... 详细信息
来源: 评论
Using Configuration Semantic Features and Machine Learning Algorithms to Predict Build Result in Cloud-Based Container Environment
Using Configuration Semantic Features and Machine Learning A...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Yiwen Wu Yang Zhang Junsheng Chang Bo Ding Tao Wang Huaimin Wang Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology China
Container technologies are being widely used in large scale production cloud environments, of which Docker has become the de-facto industry standard. In practice, Docker builds often break, and a large amount of effor... 详细信息
来源: 评论
Research on Fine-Grained Sentiment Classification  8th
Research on Fine-Grained Sentiment Classification
收藏 引用
8th CCF International Conference on Natural Language processing and Chinese Computing, NLPCC 2019
作者: Wang, Zhihui Wang, Xiaodong Chang, Tao Lv, Shaohe Guo, Xiaoting National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology Changsha410073 China
Aiming at the fine-grained sentiment classification that distinguishes the emotional intensity, the commonly used dataset SST-1 is analyzed in depth. Through the analysis, it is found that the dataset has serious prob... 详细信息
来源: 评论
A Low-Latency Successive Cancellation Hybrid Decoder for Convolutional Polar Codes
A Low-Latency Successive Cancellation Hybrid Decoder for Con...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Yu Wang Shikai Qiu Lirui Chen Qinglin Wang Yang Zhang Cang Liu Zuocheng Xing Department of National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
By adopting successive cancellation list decoding (SCL), polar codes demonstrate competitive error correction performance over LDPC and Turbo codes. However, SCL decoding suffers from high computational complexity and...
来源: 评论
Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4,110 Projects on GitHub
Dockerfile Changes in Practice: A Large-Scale Empirical Stud...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Yiwen Wu Yang Zhang Tao Wang Huaimin Wang Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology China
Docker is one of the most popular containerization tools in current DevOps practice. Particularly, Dockerfile plays an important role in the Docker-based software development process by specifying the commands and bui... 详细信息
来源: 评论
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffi...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Xin Wang Shuhui Chen Jinshu Su College of Computer Science and Technology National University of Defense Technology National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology
With the exponential growth of mobile traffic data, mobile traffic classification is in a great need. It is an essential step to improve the performance of network services such as QoS and security monitoring. However... 详细信息
来源: 评论
End-to-end Spatial Attention Network with Feature Mimicking for Head Detection
End-to-end Spatial Attention Network with Feature Mimicking ...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Junjie Zhang Yuntao Liu RongChun Li Yong Dou National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
Human head detection is a widely used task and suitable for identifying persons in practical applications. Although existing methods have achieved significant progress, the problems of false alarm and miss detection a... 详细信息
来源: 评论
Optimizing One by One Direct Convolution on ARMv8 Multi-core CPUs
Optimizing One by One Direct Convolution on ARMv8 Multi-core...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Qinglin Wang Dongsheng Li Songzhu Mei Siqi Shen Xiandong Huang Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China School of Computer Science National University of Defense Technology Changsha China
Convolutional layers are ubiquitous in a variety of deep neural networks. Due to the lower computation complexity and the smaller number of parameters, convolutions with small filter sizes are often used, such as one ... 详细信息
来源: 评论
Sia-RAE: A Siamese Network based on Recursive AutoEncoder for Effective Clone Detection
Sia-RAE: A Siamese Network based on Recursive AutoEncoder fo...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Chenhui Feng Tao Wang Yue Yu Yang Zhang Yanzhi Zhang Huaimin Wang National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China
Code clone helps improving programming productivity, while at the same time leads to many negative effects on software maintenance. Many approaches have been proposed to detect clones, but most of them fail on detecti... 详细信息
来源: 评论
Research on Integrated Detection of SQL Injection Behavior Based on Text Features and Traffic Features
Research on Integrated Detection of SQL Injection Behavior B...
收藏 引用
作者: Ming Li Bo Liu Guangsheng Xing Xiaodong Wang Zhihui Wang College of Intelligence Science and Technology National University of Defence Technology National Key Laboratory of Parallel and Distributed Processing College of Computer Science and Technology National University of Defence Technology
With the rapid development of Internet technology, various network attack methods come out one after the other. SQL injection has become one of the most severe threats to Web applications and seriously threatens vario... 详细信息
来源: 评论