咨询与建议

限定检索结果

文献类型

  • 451 篇 会议
  • 207 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 322 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 85 篇 信息与通信工程
    • 57 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 32 篇 机械工程
    • 26 篇 电气工程
    • 18 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
    • 9 篇 光学工程
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 环境科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 7 篇 农业工程
  • 170 篇 理学
    • 94 篇 数学
    • 43 篇 生物学
    • 29 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 18 篇 化学
  • 114 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 农学
  • 7 篇 医学
  • 6 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 26 篇 training
  • 25 篇 computational mo...
  • 24 篇 feature extracti...
  • 19 篇 deep learning
  • 18 篇 cloud computing
  • 15 篇 machine learning
  • 14 篇 benchmark testin...
  • 14 篇 hardware
  • 14 篇 accuracy
  • 12 篇 task analysis
  • 12 篇 computer archite...
  • 12 篇 neural networks
  • 12 篇 educational inst...
  • 12 篇 convolution
  • 12 篇 algorithm design...
  • 12 篇 kernel
  • 12 篇 distributed data...
  • 11 篇 servers
  • 11 篇 data models
  • 10 篇 quality of servi...

机构

  • 111 篇 college of compu...
  • 77 篇 science and tech...
  • 41 篇 national laborat...
  • 26 篇 college of compu...
  • 22 篇 science and tech...
  • 21 篇 key laboratory o...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 college of compu...
  • 9 篇 national key lab...

作者

  • 28 篇 dongsheng li
  • 24 篇 yijie wang
  • 23 篇 li dongsheng
  • 23 篇 wang huaimin
  • 20 篇 zhigang luo
  • 20 篇 wang yijie
  • 20 篇 huaimin wang
  • 18 篇 naiyang guan
  • 18 篇 lu jun
  • 17 篇 jun lu
  • 16 篇 liu jie
  • 16 篇 peng yuxing
  • 14 篇 dou yong
  • 13 篇 yuxing peng
  • 13 篇 qiao peng
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 yin gang
  • 11 篇 ding bo

语言

  • 625 篇 英文
  • 26 篇 中文
  • 12 篇 其他
检索条件"机构=Science and Technology on Parallel and Distributed Laboratory College of Computer"
663 条 记 录,以下是391-400 订阅
排序:
Maximizing Uniform Multicast Throughput in Multi-Channel Dense Wireless Sensor Networks  12
Maximizing Uniform Multicast Throughput in Multi-Channel Den...
收藏 引用
12th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2016
作者: Jiao, Xianlong Chen, Guirong Wang, Xiaodong Chen, Yuli Yang, Li Information and Navigation College Air Force Engineering University Xi'an710077 China College of Information System and Management National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Chongqing Guanyinqiao Elementary School Chongqing400020 China Chongqing Liangjiangxinqu Renhe Experimental School Chongqing400021 China
This paper investigates the problem of maximizing uniform multicast throughput (MUMT) for multi-channel dense wireless sensor networks, where all nodes locate within one-hop transmission range and can communicate with... 详细信息
来源: 评论
High Performance Interconnect Network for Tianhe System
收藏 引用
Journal of computer science & technology 2015年 第2期30卷 259-272页
作者: 廖湘科 庞征 王克非 卢宇彤 谢旻 夏军 董德尊 所光 College of Computer National University of Defense Technology Changsha 410073 Science and Technology on Parallel and Distributed Processing Laboratory National Changsha 410073 China China University of Defense Technology State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 China
In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software features e... 详细信息
来源: 评论
Labelwalking nonnegative matrix factorization  40
Labelwalking nonnegative matrix factorization
收藏 引用
40th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2015
作者: Lan, Long Guan, Naiyang Zhang, Xiang Huang, Xuhui Luo, Zhigang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha China
Semi-supervised learning (SSL) utilizes plenty of unlabeled examples to boost the performance of learning from limited labeled examples. Due to its great discriminant power, SSL has been widely applied to various real... 详细信息
来源: 评论
Identifying repeated interleavings to improve the efficiency of concurrency bug detection  15th
Identifying repeated interleavings to improve the efficiency...
收藏 引用
15th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2015
作者: Wu, Zhendong Lu, Kai Wang, Xiaoping Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha410073 China
Detecting concurrency bugs is becoming increasingly important. Many pattern-based concurrency bug detectors focus on the specific types of interleavings that are correlated to concurrency bugs. To detect multiple type... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
Cooperative repair based on tree structure for multiple failures in distributed storage systems with regenerating codes  15
Cooperative repair based on tree structure for multiple fail...
收藏 引用
12th ACM International Conference on Computing Frontiers, CF 2015
作者: Pei, Xiaoqiang Wang, Yijie Ma, Xingkong Fu, Yongquan Xu, Fangliang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan410073 China
Regenerating codes have been proposed to achieve an optimal trade-off curve between the amount of storage space and the network traffic for repair. However, existing repair schemes based on regenerating codes are inad... 详细信息
来源: 评论
Hyperspectral image classification via kernel extreme learning machine using local receptive fields
Hyperspectral image classification via kernel extreme learni...
收藏 引用
IEEE International Conference on Image Processing
作者: Qi Lv Xin Niu Yong Dou Yueqing Wang Jiaqing Xu Jie Zhou College of Computer National University of Defense Technology Changsha China National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China National University of Defense Technology Changsha Hunan CN
This paper proposes a classification approach for hyperspectral image (HSI) using the local receptive fields based kernel extreme learning machine. Extreme learning machine (ELM) has drawn increasing attention in the ... 详细信息
来源: 评论
A data-driven mechanism for large-scale data distribution
A data-driven mechanism for large-scale data distribution
收藏 引用
Proceedings of the Biannual World Automation Congress
作者: Peichang Shi Yiying Li Bo Ding Longquan Jiang Hui Liu Jie Zhang National Key Laboratory of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha Hunan CN National Key Laboratory of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China National University of Defense Technology Changsha Hunan CN China Electr. Equip. & Syst. Eng. Co. Ltd. China
As The integration of Physical space and cyberspace, the large-scale data distributing to diversification terminal which is geographical distribution of mass has become a huge challenge. When the data size can't b... 详细信息
来源: 评论
Research on Linkage Disequilibrium Method Based on OpenMP
Research on Linkage Disequilibrium Method Based on OpenMP
收藏 引用
International Conference on Information science and Control Engineering (ICISCE)
作者: Jun Lu Jun Li Ruiqing Jing Qiong Wang Cheng Chang Jiaxing Guo College of Computer Science and Technology Heilongjiang University Harbin China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Harbin China
Linkage disequilibrium method is applied for the research on inferring population genetics, LD mapping, haploid type diversity analysis and so on. Soybean genotypes are adopted as the data source and linkage disequili... 详细信息
来源: 评论
Hierarchical routing algorithm for ad hoc networks using mobile VMN
收藏 引用
International Journal of Autonomous and Adaptive Communications Systems 2016年 第1-2期9卷 40-56页
作者: Yan, Guofeng Peng, Yuxing Liu, Junyi Chen, Shuhong School of Computer and Communication Hunan Institute of Engineering Xiangtan411101 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China School of Computer National University of Defense Technology Changsha410073 China School of Information Science and Engineering Central South University Changsha410083 China
One of the most significant challenges introduced by routing protocol in mobile networks is coping with the unpredictable motion and the unreliable behaviour of mobile nodes. In this paper, we present a hierarchical r... 详细信息
来源: 评论