咨询与建议

限定检索结果

文献类型

  • 451 篇 会议
  • 207 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 322 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 85 篇 信息与通信工程
    • 57 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 32 篇 机械工程
    • 26 篇 电气工程
    • 18 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
    • 9 篇 光学工程
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 环境科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 7 篇 农业工程
  • 170 篇 理学
    • 94 篇 数学
    • 43 篇 生物学
    • 29 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 18 篇 化学
  • 114 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 农学
  • 7 篇 医学
  • 6 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 26 篇 training
  • 25 篇 computational mo...
  • 24 篇 feature extracti...
  • 19 篇 deep learning
  • 18 篇 cloud computing
  • 15 篇 machine learning
  • 14 篇 benchmark testin...
  • 14 篇 hardware
  • 14 篇 accuracy
  • 12 篇 task analysis
  • 12 篇 computer archite...
  • 12 篇 neural networks
  • 12 篇 educational inst...
  • 12 篇 convolution
  • 12 篇 algorithm design...
  • 12 篇 kernel
  • 12 篇 distributed data...
  • 11 篇 servers
  • 11 篇 data models
  • 10 篇 quality of servi...

机构

  • 111 篇 college of compu...
  • 77 篇 science and tech...
  • 41 篇 national laborat...
  • 26 篇 college of compu...
  • 22 篇 science and tech...
  • 21 篇 key laboratory o...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 college of compu...
  • 9 篇 national key lab...

作者

  • 28 篇 dongsheng li
  • 24 篇 yijie wang
  • 23 篇 li dongsheng
  • 23 篇 wang huaimin
  • 20 篇 zhigang luo
  • 20 篇 wang yijie
  • 20 篇 huaimin wang
  • 18 篇 naiyang guan
  • 18 篇 lu jun
  • 17 篇 jun lu
  • 16 篇 liu jie
  • 16 篇 peng yuxing
  • 14 篇 dou yong
  • 13 篇 yuxing peng
  • 13 篇 qiao peng
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 yin gang
  • 11 篇 ding bo

语言

  • 625 篇 英文
  • 26 篇 中文
  • 12 篇 其他
检索条件"机构=Science and Technology on Parallel and Distributed Laboratory College of Computer"
663 条 记 录,以下是481-490 订阅
排序:
parallel optimization computing in universal combinatorial coding
Parallel optimization computing in universal combinatorial c...
收藏 引用
2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering, MEIC 2014
作者: Gao, Tingting Lu, Jun Key Laboratory of Database and Parallel Computing Heilongjiang Province Harbin150080 China College of Computer Science and Technology East University of Heilongjiang Harbin China
Universal combinatorial coding derives from the combination principle and its core is ordinal calculation. The solution of ordinal is a process of computing permutation and combination values. But permutation and comb... 详细信息
来源: 评论
Analysis and evaluation method for linpack benchmark
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 102-107页
作者: Du, Yun-Fei Yang, Can-Qun Wang, Feng Yi, Hui-Zhan School of Computer National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China
The basic algorithm of HPL was introduced. Two optimization methods of communication, i.e., advanced-lookahead and dynamic broadcasting algorithm, were proposed. The performances of the two optimization methods were e... 详细信息
来源: 评论
Research on combinatorial encryption method
Research on combinatorial encryption method
收藏 引用
2014 International Conference on Information science, Electronics and Electrical Engineering, ISEEE 2014
作者: Lu, Jun Mo, Juan Lv, Xingfeng Zhang, Zhuo College of Computer Science and Technology Heilongjiang University College of CS HLJU Harbin China Key Laboratory of Database and Parallel Computing Heilongjiang Province KLDPC HLJU Harbin China
Combinatorial encryption algorithm is advanced. Combinatorial encryption method makes use of the variety of ordinal in universal combination code. Firstly, the theory of universal combinatorial coding is expatiated. S... 详细信息
来源: 评论
Hierarchical categorization of open source software by online profiles
Hierarchical categorization of open source software by onlin...
收藏 引用
作者: Wang, Tao Wang, Huaimin Yin, Gang Yang, Cheng Li, Xiang Zou, Peng Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha 410073 China Department of Computer Science University of Western Ontario London ON N6A 5B7 Canada Academy of Equipment Beijing 100000 China
The large amounts of freely available open source software over the Internet are fundamentally changing the traditional paradigms of software development. Efficient categorization of the massive projects for retrievin... 详细信息
来源: 评论
A New Multi-Service Token Bucket-Shaping Scheme Based on 802.11e
A New Multi-Service Token Bucket-Shaping Scheme Based on 802...
收藏 引用
International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
作者: Yunyi Zhang Shuru Liu Ran Zhang Wei Wei Houbing Song Wei Li Xiumei Fan College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Xi'an University of technology State Key Laboratory for Strength and Vibration of Mechanical Structures of Xi’ an Jiaotong University Xi'an China Department of Electrical and Computer Engineering West Virginia University Institute of Technology West Virginia USA The Centre for Distributed and High Performance Computing School of Information Technologies The University of Sydney Sydney Australia School of Automation and Information Engineering Xi'an University of Technology Xi'an China
With the development of information technology, the demand for video transmission in wireless networks rapidly increases. The traditional traffic shaping algorithms cannot fully (or adequately) meet the demand for hig... 详细信息
来源: 评论
IWFR:Exploiting Full-duplex in Wireless Relay Networks
IWFR:Exploiting Full-duplex in Wireless Relay Networks
收藏 引用
2014 4th IEEE International Conference on Information science and technology
作者: Yong Lu Shaohe Lv Xiaodong Wang Xingming Zhou National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology
Traditional wireless relay networks have large endto-end time delay and low throughput because of the limit that it can't receive and forward at the same *** this paper,we proposed IWFR:Immediate Wireless Full-Dup... 详细信息
来源: 评论
Synchronization Error Detection of MPI Programs by Symbolic Execution
Synchronization Error Detection of MPI Programs by Symbolic ...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Xianjin Fu Zhenbang Chen Chun Huang Wei Dong Ji Wang College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China
Asynchrony based overlapping of computation and communication is commonly used in MPI applications. However, this overlapping introduces synchronization errors frequently in asynchronous MPI programming. In this paper... 详细信息
来源: 评论
Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet
收藏 引用
New Generation Computing 2014年 第3期32卷 237-255页
作者: Liu, Yujing Peng, Wei Su, Jinshu Wang, Zhilin College of Computer National University of Defense Technology Hunan Changsha China College of Computer Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Hunan Changsha China Education Department National University of Defense Technology Hunan Changsha China
The Internet is a typical complex network, whose traffic load is controlled by the inter-domain routing system. Due to the co-location of data plane and control plane of Border Gateway Protocol, the survivability of i...
来源: 评论
Translation Non-negative Matrix Factorization with Fast Optimization
Translation Non-negative Matrix Factorization with Fast Opti...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Yuanyuan Wang Naiyang Guan Bin Mao Xuhui Huang Zhigang Luo Department of Basic Courses Army Officer Academy Science and Technology on Parallel and Distributed Processing Laboratory College of Computer Science National University of Defense Technology College of Science National University of Defense Technology College of Computer Science National University of Defense Technology
Non-negative matrix factorization (NMF) reconstructs the original samples in a lower dimensional space and has been widely used in pattern recognition and data mining because it usually yields sparse representation. S... 详细信息
来源: 评论
Density estimation with adaptive sparse grids for large data sets  14
Density estimation with adaptive sparse grids for large data...
收藏 引用
14th SIAM International Conference on Data Mining, SDM 2014
作者: Peherstorfer, Benjamin Pflüger, Dirk Bungartz, Hans-Joachim Aerospace Computational Design Laboratory AeroAstro Massachusetts Institute of Technology United States Simulation of Large Systems Group Institute for Parallel and Distributed Systems University of Stuttgart Germany Scientific Computing Group Department of Computer Science Technische Universität München Germany
Nonparametric density estimation is a fundamental problem of statistics and data mining. Even though kernel density estimation is the most widely used method, its performance highly depends on the choice of the kernel... 详细信息
来源: 评论