咨询与建议

限定检索结果

文献类型

  • 316 篇 会议
  • 129 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 447 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 263 篇 工学
    • 199 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 48 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 24 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 17 篇 电气工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 核科学与技术
    • 5 篇 生物医学工程(可授...
  • 117 篇 理学
    • 71 篇 数学
    • 26 篇 物理学
    • 25 篇 生物学
    • 19 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 5 篇 化学
  • 62 篇 管理学
    • 41 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 18 篇 computational mo...
  • 15 篇 deep learning
  • 15 篇 algorithm design...
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 cloud computing
  • 13 篇 computer archite...
  • 12 篇 feature extracti...
  • 11 篇 scalability
  • 11 篇 laboratories
  • 11 篇 servers
  • 10 篇 throughput
  • 10 篇 clustering algor...
  • 9 篇 parallel process...
  • 9 篇 concurrent compu...
  • 9 篇 costs
  • 9 篇 distributed proc...
  • 9 篇 kernel
  • 9 篇 hardware
  • 9 篇 distributed data...

机构

  • 134 篇 science and tech...
  • 52 篇 college of compu...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 school of comput...
  • 14 篇 national laborat...
  • 12 篇 national key lab...
  • 10 篇 laboratory of di...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 laboratory of so...
  • 7 篇 college of scien...
  • 6 篇 national laborat...
  • 6 篇 college of compu...

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 15 篇 zhigang luo
  • 15 篇 wang yijie
  • 15 篇 peng yuxing
  • 14 篇 qinglin wang
  • 13 篇 naiyang guan
  • 13 篇 zuocheng xing
  • 12 篇 wang huaimin
  • 11 篇 chen xinhai
  • 11 篇 chunye gong
  • 11 篇 kai lu
  • 10 篇 yuxing peng
  • 10 篇 dou yong
  • 10 篇 huaimin wang
  • 10 篇 wang qinglin
  • 9 篇 xiaodong wang
  • 9 篇 li dongsheng
  • 9 篇 xuhui huang

语言

  • 419 篇 英文
  • 25 篇 中文
  • 3 篇 其他
检索条件"机构=Science and Technology on Parallel and Distribution Processing Laboratory"
447 条 记 录,以下是51-60 订阅
Sparse Matrix Reordering Method Selection with parallel Computing and Deep Learning
Sparse Matrix Reordering Method Selection with Parallel Comp...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Rui Xia Jihu Guo Huajian Zhang Shun Yang Qinglin Wang Jie Liu College of Computer Science and Techonology National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology
Sparse matrix reordering is an important step in Cholesky decomposition. By reordering the rows and columns of the matrix, the time of computation and storage cost can be greatly reduced. With the proposal of various ... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms  14
Feature and Performance Comparison of FaaS Platforms
收藏 引用
14th IEEE International Conference on Software Engineering and Service science, ICSESS 2023
作者: Ma, Penghui Shi, Peichang Yi, Guodong College of Computer Science National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China College of Computer Science National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems Changsha410073 China Xiangjiang Lab Changsha410073 China School of Advanced Interdisciplinary Studies Hunan University of Technology and Business Changsha410073 China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove... 详细信息
来源: 评论
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server
DaBA: Data-free Backdoor Attack against Federated Learning v...
收藏 引用
Image processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Kuiqi Chen Liming Fang Mengxin Wang Changchun Yin College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China
Current research shows that the privacy of FL is threatened by an honest-but-curious server. However, existing research focus on privacy attacks against the malicious server while overlooking that it could also compro...
来源: 评论
The parallelized Cuckoo Filter for Cold Data Representation  23
The Parallelized Cuckoo Filter for Cold Data Representation
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Sun, Bowen Luo, Lailong Li, Shangsen Chen, Yingwen Guo, Deke College of Computer National University of Defense Technology China National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory China College of Computer National University of Defense Technology National Lab for Parallel and Distributed Processing China
Cold data contributes a large portion of the big data today and is usually stored in secondary storage. Various sketch data structures are implemented to represent the stored elements and provide constant-time members... 详细信息
来源: 评论
ST-PINN: A Self-Training Physics-Informed Neural Network for Partial Differential Equations
ST-PINN: A Self-Training Physics-Informed Neural Network for...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Junjun Yan Xinhai Chen Zhichao Wang Enqiang Zhoui Jie Liu Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha China
Partial differential equations (PDEs) are an essential computational kernel in physics and engineering. With the advance of deep learning, physics-informed neural networks (PINNs), as a mesh-free method, have shown gr...
来源: 评论
Asycome: A JointCloud Data Asynchronous Collaboration Mechanism Based on Blockchain  3rd
Asycome: A JointCloud Data Asynchronous Collaboration Mechan...
收藏 引用
3rd International Conference on Blockchain and Trustworthy Systems, Blocksys 2021
作者: Li, Linhui Shi, Peichang Fu, Xiang Zhang, Shengtian Zhong, Tao Chen, Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha410073 China
In the Internet of Everything (IoE), due to its issues of complexity and heterogeneity, message delay cannot be guaranteed, and it is not enough to leverage a centralized model for data collaboration. By leveraging th... 详细信息
来源: 评论
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack
MPS: A Multiple Poisoned Samples Selection Strategy in Backd...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weihong Zou Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu Schoosl of Computer Science and Engineering Central South University Science and Technology on Parallel and Distributed Processing Laboratory (PDL) College of Computer Science and Electronic Engineering Hunan University
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple poisoned samples attacks usually r... 详细信息
来源: 评论
Bi-Objective Scheduling Algorithm for Hybrid Workflow in JointCloud
Bi-Objective Scheduling Algorithm for Hybrid Workflow in Joi...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Rui Li Huaimin Wang Peichang Shi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of Complex & Critica Software Environment College of Computer Science National University of Defense Technology Changsha China
Big data workflows are widely used in IoT, recommended systems, and real-time vision applications, and they continue to grow in complexity. These hybrid workflows consist of both resource-intensive batch jobs and late... 详细信息
来源: 评论
Ladder: A Blockchain Model of Low-Overhead Storage  3rd
Ladder: A Blockchain Model of Low-Overhead Storage
收藏 引用
3rd International Conference on Blockchain and Trustworthy Systems, Blocksys 2021
作者: Chen, Peng Zhang, Xunhui Liu, Hui Xiang, Liangliang Shi, Peichang National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha410073 China
Emerging blockchain accounting mechanism allow mutually distributed parties to transport trusted information and ensure the correctness of data. Every blockchain node stores the complete block locally. Although this m... 详细信息
来源: 评论
parallel Implementation of SHA256 on Multizone Heterogeneous Systems
Parallel Implementation of SHA256 on Multizone Heterogeneous...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yongtao Luo Jie Liu Tiaojie Xiao Chunye Gong Science and Technology on Parallel and Distributed Processing Laboratory Laboratory of Digitizing program for Frontier Equipment National University of Defense Technology Changsha China National Supercomputer Center in Tianjin Tianjin China
SHA-256 plays an important role in widely used applications, such as data security, data integrity, digital signatures, and cryptocurrencies. However, most of the current optimized implementations of SHA-256 are based...
来源: 评论