咨询与建议

限定检索结果

文献类型

  • 827 篇 会议
  • 294 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 554 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 135 篇 信息与通信工程
    • 81 篇 控制科学与工程
    • 75 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 51 篇 机械工程
    • 45 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 179 篇 数学
    • 67 篇 生物学
    • 51 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 183 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...
  • 11 篇 national univers...

作者

  • 44 篇 yong dou
  • 41 篇 wang huaimin
  • 40 篇 dou yong
  • 36 篇 dongsheng li
  • 35 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 li kuan-ching
  • 19 篇 shaohe lv

语言

  • 1,055 篇 英文
  • 59 篇 中文
  • 9 篇 其他
检索条件"机构=Science and technology on Parallel and distributed processing laboratory"
1123 条 记 录,以下是681-690 订阅
排序:
A fast successive over-relaxation algorithm for force-directed network graph drawing
收藏 引用
science China(Information sciences) 2012年 第3期55卷 677-688页
作者: WANG YongXian & WANG ZhengHua National Key laboratory for parallel and distributed processing, National University of Defense technology, Changsha 410073, China 1. National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Force-directed approach is one of the most widely used methods in graph drawing research. There are two main problems with the traditional force-directed algorithms. First, there is no mature theory to ensure the conv... 详细信息
来源: 评论
Static Power Optimization for Homogeneous Multiple GPUs Based on Task Partition
Static Power Optimization for Homogeneous Multiple GPUs Base...
收藏 引用
2nd International Congress on Computer Applications and Computational science (CACS 2011)
作者: Lin, Yisong Tang, Tao Wang, Guibin National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Recently, GPU has been widely used in High Performance Computing (HPC). In order to improve computational performance, several GPUs are integrated into one computer node in practical system. However, power consumption... 详细信息
来源: 评论
Speculative symbolic execution
Speculative symbolic execution
收藏 引用
2012 IEEE 23rd International Symposium on Software Reliability Engineering, ISSRE 2012
作者: Zhang, Yufeng Chen, Zhenbang Wang, Ji National Laboratory for Parallel and Distributed Processing Department of Computing Science National University of Defense Technology Changsha China
Symbolic execution is an effective path oriented and constraint based program analysis technique. Recently, there is a significant development in the research and application of symbolic execution. However, symbolic e... 详细信息
来源: 评论
Recent advances on trusted computing in China
收藏 引用
Chinese science Bulletin 2012年 第35期57卷 4529-4532页
作者: DONG Wei CHEN LiQian School of Computer National University of Defense TechnologyChangsha 410073China National Laboratory for Parallel and Distributed Processing Changsha 410073China
This article highlights some recent research advances on trusted computing in China,focusing mainly on the methodologies and technologies related to trusted computing module,trusted computing platform,trusted network ... 详细信息
来源: 评论
MemHole: An efficient black-box approach to consolidate memory in virtualization platform
MemHole: An efficient black-box approach to consolidate memo...
收藏 引用
41st International Conference on parallel processing Workshops, ICPPW 2012
作者: Zhang, Pengfei Chu, Rui Wang, Huaimin National Laboratory for Parallel and Distributed Processing National University of Defense Technology United States
As an important aspect of the hardware resource consolidation in virtualization environment, memory consolidation and over-commitment has been motivated by the increasing elastic computing cloud platform. The most pop... 详细信息
来源: 评论
Exploiting attribute redundancy in extracting open source forge websites
Exploiting attribute redundancy in extracting open source fo...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Li, Xiang Zhu, Yanxu Yin, Gang Wang, Tao Wang, Huaimin National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among ... 详细信息
来源: 评论
Providing information services for wireless sensor networks through cloud computing
Providing information services for wireless sensor networks ...
收藏 引用
2012 7th IEEE Asia-Pacific Services Computing Conference, APSCC 2012
作者: You, Pengfei Peng, Yuxing Gao, Hang National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Wireless sensor networks (WSN) is a critical technology for information gathering covering many areas, including health-care, transportation, air traffic control and environment monitoring. Despite wide use, the fast ... 详细信息
来源: 评论
Labeled topic detection of open source software from mining mass textual project profiles
Labeled topic detection of open source software from mining ...
收藏 引用
1st International Workshop on Software Mining, SoftwareMining-2012 - Held in Conjunction with the 18th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD-2012
作者: Wang, Tao Yin, Gang Li, Xiang Wang, Huaimin National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Nowadays open source software has become an indispensable basis for both individual and industrial software engineering. Various kinds of labeling mechanisms like categories and tags are used in open source communitie... 详细信息
来源: 评论
Queueing analysis of the decoding process for intra-session network coding with random linear codes
Queueing analysis of the decoding process for intra-session ...
收藏 引用
作者: Yuan, Yuan Huang, Zhen Liu, Shengyun Peng, Yuxing National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
Efficient designs for intra-session network coding based practical applications largely rely on a better understanding on its queueing behaviors. However, few work devote on this topics. In this paper, we build a mult... 详细信息
来源: 评论
Accurate and simplified prediction of L2 cache vulnerability for cost-efficient soft error protection
Accurate and simplified prediction of L2 cache vulnerability...
收藏 引用
作者: Cheng, Yu Ma, Anguo Zhang, Minxuan National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology China
Soft errors caused by energetic particle strikes in on-chip cache memories have become a critical challenge for microprocessor design. Architectural vulnerability factor (AVF), which is defined as the probability that... 详细信息
来源: 评论