咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 156 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 246 篇 计算机科学与技术...
    • 197 篇 软件工程
    • 67 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 22 篇 电气工程
    • 12 篇 化学工程与技术
    • 10 篇 力学(可授工学、理...
    • 9 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 8 篇 农业工程
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 光学工程
    • 6 篇 核科学与技术
    • 6 篇 生物医学工程(可授...
  • 146 篇 理学
    • 83 篇 数学
    • 37 篇 生物学
    • 35 篇 物理学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 10 篇 化学
  • 83 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 8 篇 农学
    • 8 篇 作物学
  • 6 篇 医学
  • 5 篇 经济学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 24 篇 training
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 17 篇 feature extracti...
  • 15 篇 computer archite...
  • 15 篇 neural networks
  • 14 篇 benchmark testin...
  • 14 篇 semantics
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 task analysis
  • 13 篇 servers
  • 12 篇 distributed data...
  • 11 篇 distributed proc...
  • 11 篇 machine learning
  • 11 篇 clustering algor...
  • 11 篇 kernel
  • 11 篇 accuracy
  • 10 篇 scalability
  • 10 篇 laboratories

机构

  • 134 篇 science and tech...
  • 62 篇 college of compu...
  • 36 篇 science and tech...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 college of compu...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 college of scien...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 xiangjiang lab

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 24 篇 yijie wang
  • 20 篇 dou yong
  • 20 篇 peng yuxing
  • 18 篇 wang yijie
  • 17 篇 zhigang luo
  • 15 篇 yuxing peng
  • 15 篇 dongsheng li
  • 15 篇 qinglin wang
  • 15 篇 huaimin wang
  • 15 篇 qiao peng
  • 14 篇 naiyang guan
  • 14 篇 wang huaimin
  • 13 篇 li dongsheng
  • 13 篇 zuocheng xing
  • 12 篇 wang qinglin
  • 12 篇 yong dou
  • 11 篇 chen xinhai
  • 11 篇 chunye gong

语言

  • 508 篇 英文
  • 26 篇 中文
  • 4 篇 其他
检索条件"机构=Science and Technology on Parallel and Distributed Laboratory"
538 条 记 录,以下是291-300 订阅
排序:
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsourced Taxis  40
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsou...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Gao, Junhui Wang, Qianru Zhang, Xin Shi, Juan Zhao, Xiang Han, Qingye Pan, Yan School of Computer Science Northwestern Polytechnical University China School of Computer Science and Technology Xidian University China Air Force Engineering University China National University of Defense Technology Laboratory for Big Data and Decision China School of Management Science and Real Estate Chongqing University China National University of Defense Technology National Key Laboratory of Information Systems Engineering China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing China
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t... 详细信息
来源: 评论
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论
A Multi-agent Simulation of Escape Panic
A Multi-agent Simulation of Escape Panic
收藏 引用
International Joint Conference on Computational sciences and Optimization, CSO
作者: Chuanjun Ren Chenghui Yang Shiyao Jin National Laboratory for Parallel & Distributed Processing College of Computer Science National University of Defense Technology Changsha China National Laboratory for Parallel & Distributed Processinz National University of Defense Technology Changsha China National University of Defense Technology Changsha Hunan CN
The modeling and simulation on evacuation has recently become a topic of great interest. We present an agent-based model to construct crowd evacuations for emergency response from an area under an explosion. Various t... 详细信息
来源: 评论
A Survey on Talking Head Generation: The Methods, Status and Challenges
SSRN
收藏 引用
SSRN 2023年
作者: Cai, Yali Qiao, Peng Li, Dongsheng National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
The talking head generation aims to synthesize a speech video of the source identity from a driving video or audio or text data irrelevant to the source identity. It can not only be applied to games and virtual realit... 详细信息
来源: 评论
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server
DaBA: Data-free Backdoor Attack against Federated Learning v...
收藏 引用
Image Processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Kuiqi Chen Liming Fang Mengxin Wang Changchun Yin College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China
Current research shows that the privacy of FL is threatened by an honest-but-curious server. However, existing research focus on privacy attacks against the malicious server while overlooking that it could also compro...
来源: 评论
A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications
A Discrete Data Dividing Approach for Erasure-Code-Based Sto...
收藏 引用
2014 IEEE 8th International Symposium on Service Oriented System Engineering
作者: Weidong Sun Yijie Wang Yongquan Fu Xiaoqiang Pei Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha Hunan P. R. China
Erasure codes are promising for improving the reliability of the storage system due to its space efficiency compared to the replication methods. Traditional erasure codes split data into equalsized data blocks and enc... 详细信息
来源: 评论
Learning environmental sounds with multi-scale convolutional neural network
arXiv
收藏 引用
arXiv 2018年
作者: Zhu, Boqing Wang, Changjian Liu, Feng Lei, Jin Lu, Zengquan Peng, Yuxing Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology College of Meteorology and Oceanology National University of Defense Technology Changsha China
Deep learning has dramatically improved the performance of sounds recognition. However, learning acoustic models directly from the raw waveform is still challenging. Current waveform-based models generally use time-do... 详细信息
来源: 评论
JointCloud Cross-chain Verification Model of Decentralized Identifiers
JointCloud Cross-chain Verification Model of Decentralized I...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Tao Zhong Peichang Shi Junsheng Chang Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Institute of Computer Technology College of Computer National University of Defense Technology Changsha China
When multiple entities communicate or collaborate in JointCloud, identities are the very prior basis to build trust with each other. Decentralized identifier (DID) can provide a trusted identity with blockchain techno... 详细信息
来源: 评论
Stigmergic Collaboration: A Sign-Based Perspective of Stigmergy
Stigmergic Collaboration: A Sign-Based Perspective of Stigme...
收藏 引用
2010 International Conference on Intelligent Computation technology and Automation(2010 智能计算技术与自动化国际会议 ICICTA 2010)
作者: Chuanjun Ren Hongbing Huang Shiyao Jin National Laboratory for Parallel & Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Insects build architecturally complex nests and search for remote food by collaboration work despite their limited sensors, minimal individual intelligence and the lack of a central control system. Insets' co... 详细信息
来源: 评论
Two-dimensional euler PCA for face recognition  21
Two-dimensional euler PCA for face recognition
收藏 引用
21st International Conference on MultiMedia Modeling, MMM 2015
作者: Tan, Huibin Zhang, Xiang Guan, Naiyang Tao, Dacheng Huang, Xuhui Luo, Zhigang Science and Technology on Parallel Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan410073 China Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan410073 China Centre for Quantum Computation and Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology Sydney 235 Jones Street UltimoNSW2007 Australia
Principal component analysis (PCA) projects data on the directions with maximal variances. Since PCA is quite effective in dimension reduction, it has been widely used in computer vision. However, conventional PCA suf... 详细信息
来源: 评论