咨询与建议

限定检索结果

文献类型

  • 827 篇 会议
  • 294 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 554 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 135 篇 信息与通信工程
    • 81 篇 控制科学与工程
    • 75 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 51 篇 机械工程
    • 45 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 179 篇 数学
    • 67 篇 生物学
    • 51 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 183 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...
  • 11 篇 national univers...

作者

  • 44 篇 yong dou
  • 41 篇 wang huaimin
  • 40 篇 dou yong
  • 36 篇 dongsheng li
  • 35 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 li kuan-ching
  • 19 篇 shaohe lv

语言

  • 1,055 篇 英文
  • 59 篇 中文
  • 9 篇 其他
检索条件"机构=Science and technology on Parallel and distributed processing laboratory"
1123 条 记 录,以下是711-720 订阅
排序:
An efficient packing algorithm for spatial keyword queries
An efficient packing algorithm for spatial keyword queries
收藏 引用
6th International Conference on Convergence and Hybrid Information technology, ICHIT 2012
作者: Pan, Jinkun Li, Dongsheng Li, Liming National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology 410073 Changsha China Shanghai Garrision 200040 Shanghai China
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel... 详细信息
来源: 评论
Structure and method for hardware acceleration of variable data set management
收藏 引用
Hunan Daxue Xuebao/Journal of Hunan University Natural sciences 2013年 第11 SUPPL.期40卷 68-73页
作者: Xu, Jin-Bo Dou, Yong Sun, Cai-Xia Dong, Ya-Zhuo Wang, Shao-Gang Lu, Ping-Jing Zhang, Jun College of Computer National Univ of Defense Technology Changsha Hunan 410073 China National Laboratory for Parallel and Distributed Processing National Univ of Defense Technology Changsha Hunan 410073 China Unit 91655 People's Liberation Army Beijing 100036 China
A general hardware structure was proposed to accelerate variable data set management, which was designed to accept instructions flexibly and accomplish the commonly used functions and some more complicated functions o... 详细信息
来源: 评论
Topology-aware deployment of scientific applications in cloud computing
Topology-aware deployment of scientific applications in clou...
收藏 引用
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012
作者: Fan, Pei Chen, Zhenbang Wang, Ji Zheng, Zibin Lyu, Michael R. National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论
Topology awareness algorithm for virtual network mapping
收藏 引用
Journal of Zhejiang University-science C(Computers and Electronics) 2012年 第3期13卷 178-186页
作者: Xiao-ling LI Huai-min WANG Chang-guo GUO Bo DING Xiao-yong LI Wen-qi BI Shuang TAN National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology.Changsha 410073China School of Computer National University of Defense TechnologyChangsha 410073China China Electronic Systems Engineering Corporation Beijing 100039China The Northern Institute of Electronic Equipment of China Beijing 100083China
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne... 详细信息
来源: 评论
Concurrent access control using subcarrier signature in heterogeneous MIMO-based WLAN
Concurrent access control using subcarrier signature in hete...
收藏 引用
5th International Workshop on Multiple Access Communications, MACOM 2012
作者: Shen, Hu Lv, Shaohe Sun, Yanqiang Dong, Xuan Wang, Xiaodong Zhou, Xingming National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Institute of Network Information and Security National University of Defense Technology Changsha 410073 China
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif... 详细信息
来源: 评论
Using NMFAS to identify key biological pathways associated with human diseases
Using NMFAS to identify key biological pathways associated w...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Guo, Hao Zhu, Yunping Li, Dong He, Fuchu Liu, Qijun State Key Laboratory of Proteomics Beijing Proteome Research Centre Beijing Institute of Radiation Medicine Beijing China National Laboratory for Parallel and Distributed Processing National University of Deference and Technology Changsha China
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde... 详细信息
来源: 评论
Investor: A Light-Weight Speculation Scheme for the Open Internet
Investor: A Light-Weight Speculation Scheme for the Open Int...
收藏 引用
2010 3rd International Conference on Computer and Electrical Engineering(ICCEE 2010)
作者: Huiba Li Shengyun Liu Yuxing Peng Xicheng Lu National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modi... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on Computer science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论
A modified estimation scheme of EBT algorithm for RFID system
A modified estimation scheme of EBT algorithm for RFID syste...
收藏 引用
International Conference on Intelligent Control and Information processing (ICICIP)
作者: Ruisi Zhao Yulu Yang Parallel and distributed processing laboratory Department of Computer Science and Technology Nankai University Tianjin China
The paper proposes a scheme to improve the accuracy of tag estimation in the EBT algorithm in RFID system. In the proposed scheme, the mean value of the estimated tag number should be acquired before calculating the o... 详细信息
来源: 评论