咨询与建议

限定检索结果

文献类型

  • 451 篇 会议
  • 207 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 322 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 85 篇 信息与通信工程
    • 57 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 32 篇 机械工程
    • 26 篇 电气工程
    • 18 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
    • 9 篇 光学工程
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 环境科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 7 篇 农业工程
  • 170 篇 理学
    • 94 篇 数学
    • 43 篇 生物学
    • 29 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 18 篇 化学
  • 114 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 农学
  • 7 篇 医学
  • 6 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 26 篇 training
  • 25 篇 computational mo...
  • 24 篇 feature extracti...
  • 19 篇 deep learning
  • 18 篇 cloud computing
  • 15 篇 machine learning
  • 14 篇 benchmark testin...
  • 14 篇 hardware
  • 14 篇 accuracy
  • 12 篇 task analysis
  • 12 篇 computer archite...
  • 12 篇 neural networks
  • 12 篇 educational inst...
  • 12 篇 convolution
  • 12 篇 algorithm design...
  • 12 篇 kernel
  • 12 篇 distributed data...
  • 11 篇 servers
  • 11 篇 data models
  • 10 篇 quality of servi...

机构

  • 111 篇 college of compu...
  • 77 篇 science and tech...
  • 41 篇 national laborat...
  • 26 篇 college of compu...
  • 22 篇 science and tech...
  • 21 篇 key laboratory o...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national laborat...
  • 9 篇 college of compu...
  • 9 篇 national key lab...

作者

  • 28 篇 dongsheng li
  • 24 篇 yijie wang
  • 23 篇 li dongsheng
  • 23 篇 wang huaimin
  • 20 篇 zhigang luo
  • 20 篇 wang yijie
  • 20 篇 huaimin wang
  • 18 篇 naiyang guan
  • 18 篇 lu jun
  • 17 篇 jun lu
  • 16 篇 liu jie
  • 16 篇 peng yuxing
  • 14 篇 dou yong
  • 13 篇 yuxing peng
  • 13 篇 qiao peng
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 yin gang
  • 11 篇 ding bo

语言

  • 625 篇 英文
  • 26 篇 中文
  • 12 篇 其他
检索条件"机构=Science and Technology on Parallel and Distributed Laboratory College of Computer"
663 条 记 录,以下是581-590 订阅
排序:
An algorithm application in intrusion forensics based on improved information gain
An algorithm application in intrusion forensics based on imp...
收藏 引用
2011 3rd Symposium on Web Society, SWS2011
作者: Jia, Xian Liu, Peiyu Gong, Wei Chi, Xuezhi School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China Basic Education Department Shandong Police College Ji'nan 250014 China
As a kind of feature selection algorithm applied widely in intrusion forensics, information gain could solve the problem of high-dimension and magnanimous, but it neglects correlation between features, which could lea... 详细信息
来源: 评论
An effective control scheme to ensure real-time causal order in large-scale distributed interactive simulations
An effective control scheme to ensure real-time causal order...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Hangjun Zhou Sha Fu Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha Hunan China Department of Information Management Hunan University of Finance and Economics Changsha Hunan China
When a large-scale distributed interactive simulation system is running on WAN, the sites usually disperse over a wide area in geography, which results in the simulation clock of each site is hardly to be accurately s... 详细信息
来源: 评论
A causality based dynamic message ordering for DVEs on Wide Area Network
A causality based dynamic message ordering for DVEs on Wide ...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Hangjun Zhou Sha Fu Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha Hunan China Department of Information Management Hunan University of Finance and Economics Changsha Hunan China
Due to the large message transmission latency in distributed Virtual Environments(DVEs) on Wide Area Net-work(WAN), the effectiveness of causality consistency control of message ordering is determined by not only caus... 详细信息
来源: 评论
A multi-layered emulation platform to verify the effectiveness of consistency control approaches about message ordering
A multi-layered emulation platform to verify the effectivene...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Hangjun Zhou Sha Fu Key Laboratory of Science and Technology for National Defence of Parallel and Distributed P rocessing School of Computer Science National University of Defense Technology Changsha Hunan China Department of Information Management Hunan University of Finance and Economics Changsha Hunan China
It is an important issue to preserve the consistent delivering order of messages at each site in distributed Virtual Environments(DVEs). Currently, the violations of message delivery order are inclined to happen in th... 详细信息
来源: 评论
Research on Policy-Based Service-Oriented Computing Security
Research on Policy-Based Service-Oriented Computing Security
收藏 引用
The International Conference on Recent Trends in Materials and Mechanical Engineering(ICRTMME 2011)
作者: Zhang Yongsheng Luo Qin Nie Xuewu Bi Xiaodong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Police College
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorab... 详细信息
来源: 评论
An Energy-Efficient Scheduling Algorithm for Sporadic Real-Time Tasks in Multiprocessor Systems
An Energy-Efficient Scheduling Algorithm for Sporadic Real-T...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Dong-Song Zhang Fang-Yuan Chen Hong-Hua Li Shi-Yao Jin De-Ke Guo National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China School of Computing Science Simon Fraser University Burnaby BC Canada National Laboratory for Information System Engineering School of Information Systems and Management National University of Defense Technology Changsha China
As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, the real-time energy-efficient scheduling in multiprocessor systems becomes an urgent problem to reduce the system energy co... 详细信息
来源: 评论
A review on the churn character of P2P networks
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2011年 第9期34卷 1563-1577页
作者: Fu, Zhi-Peng Wang, Huai-Min Shi, Dian-Xi Zou, Peng School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
P2P application is one of the most popular applications in the Internet, but its performance is badly influenced by the churn character-the nodes continuous arrival and departure. On the basis of introducing the origi... 详细信息
来源: 评论
Stigmergic collaboration: A sign-based perspective of stigmergy
Stigmergic collaboration: A sign-based perspective of stigme...
收藏 引用
2010 International Conference on Intelligent Computation technology and Automation, ICICTA 2010
作者: Ren, Chuanjun Huang, Hongbing Jin, Shiyao National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Insects build architecturally complex nests and search for remote food by collaboration work despite their limited sensors, minimal individual intelligence and the lack of a central control system. Insets' collabo... 详细信息
来源: 评论
Simulation research of communication networks based on prim algorithm
Simulation research of communication networks based on prim ...
收藏 引用
International Forum on Information technology and Applications
作者: Yang, Chenghui Ren, ChuanJun College of Electrical Engineering Northwest University for Nationalities Lanzhou 730030 China National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
In order to improve the efficiency of the communication networks, we used the Kruskal algorithm and the Prim algorithm through algorithm comparison and analysis methods of data structure. A dynamic framework for the c... 详细信息
来源: 评论
Implementation of encrypted data for outsourced database
Implementation of encrypted data for outsourced database
收藏 引用
2010 2nd International Conference on Computational Intelligence and Natural Computing, CINC 2010
作者: Wang, Zheng-Fei Tang, Ai-Guo Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Encryption technology has become an important mechanism of securing data stored in the outsourced database. However, it is a difficulty to query efficiently the encrypted data and many researchers take it into conside... 详细信息
来源: 评论