咨询与建议

限定检索结果

文献类型

  • 827 篇 会议
  • 297 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,126 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 559 篇 计算机科学与技术...
    • 415 篇 软件工程
    • 136 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 75 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 51 篇 机械工程
    • 46 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 网络空间安全
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 179 篇 数学
    • 67 篇 生物学
    • 51 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 184 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 43 篇 wang huaimin
  • 40 篇 dou yong
  • 36 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 li dongsheng
  • 29 篇 yuxing peng
  • 29 篇 yijie wang
  • 29 篇 peng yuxing
  • 27 篇 xiaodong wang
  • 27 篇 wang yijie
  • 25 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 li kuan-ching
  • 19 篇 ding bo

语言

  • 1,057 篇 英文
  • 59 篇 中文
  • 10 篇 其他
检索条件"机构=Science and technology on Parallel and distributed processing laboratory"
1126 条 记 录,以下是881-890 订阅
排序:
Tendency-based caching in Content-Centric Networking
Tendency-based caching in Content-Centric Networking
收藏 引用
International Conference on Ubiquitous and Future Networks, ICUFN
作者: YuSheng Xia YaPing Liu JinShu Su College of Computer National University of Defense Technology Changsha China National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
In content-centric networking, the schemes of innetwork caching can affect the performance of the whole network. Existing schemes lack of the global view, which results in inefficient caches. In this paper, we aim to ... 详细信息
来源: 评论
A distributed algorithm for SI transactions serializability in cloud computing
收藏 引用
Information technology Journal 2013年 第24期12卷 8435-8445页
作者: Huang, Bin Peng, Yuxing Peng, Xiaoning School of Computer Science Wuhan University Wuhan 430072 China Department of Computer Huaihua University Huaihua 418008 China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
There are well known anomalies permitted by snapshot isolation that can lead to violations of data consistency by interleaving transactions that individually maintain consistency. Until now, there are some ways to pre... 详细信息
来源: 评论
Deep Isolation Forest for Anomaly Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Hongzuo Pang, Guansong Wang, Yijie Wang, Yongjun The College of Computer National University of Defense Technology Changsha410073 China The Science and Technology on Parallel and Distributed Processing Laboratory China The School of Computing and Information Systems Singapore Management University 178902 Singapore
Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability. Nevertheless, its linear ... 详细信息
来源: 评论
Efficient parallel implementation of morphological operation on GPU and FPGA
Efficient parallel implementation of morphological operation...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Teng Li Yong Dou Jingfei Jiang Jing Gao National Laboratory for Parallel & Distributed Processing National University of Defense and Technology Changsha China Information Management Department AIR CHINA LIMITED Beijing China
Morphological operation constitutes one of a powerful and versatile image and video applications applied to a wide range of domains, from object recognition, to feature extraction and to moving objects detection in co... 详细信息
来源: 评论
A Hierarchical Memory Service Mechanism in Server Consolidation Environment
A Hierarchical Memory Service Mechanism in Server Consolidat...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Liufeng Wang Huaimin Wang Lu Cai Rui Chu Pengfei Zhang Lanzheng Liu National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China School of Economics and Management Xi'an University Xi'an China
Increasing Internet business and computing footprint motivate server consolidation in data centers. Through virtualization technology, server consolidation can reduce physical hosts and provide scalable services. Howe... 详细信息
来源: 评论
A Survey on Talking Head Generation: The Methods, Status and Challenges
SSRN
收藏 引用
SSRN 2023年
作者: Cai, Yali Qiao, Peng Li, Dongsheng National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
The talking head generation aims to synthesize a speech video of the source identity from a driving video or audio or text data irrelevant to the source identity. It can not only be applied to games and virtual realit... 详细信息
来源: 评论
An Efficient Approximation for Weapon-Target Assignment
An Efficient Approximation for Weapon-Target Assignment
收藏 引用
ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM
作者: Lina Chen ChuanJun Ren Su Deng C4ISR Technology National Defense Science and Technology Key Laboratory National University of Defense Technology Changsha Hunan China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
The weapon-target assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. The WTA problem can be formulated as a nonlinear integer programming problem and is k... 详细信息
来源: 评论
An improved algorithm for reconstructing singular connection in the multi-block cfd applications
arXiv
收藏 引用
arXiv 2017年
作者: Yong-Xian, Wang Li-Lun, Zhang Yong-Gang, Che Chuan-Fu, Xu Wei, Liu Hua-Yong, Liu Zheng-Hua, Wang College of Computer National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China State Key Laboratory of Aerodynamics Mianyang621000 China
In this paper, an improved algorithm is proposed for the reconstruction of singularity connectivity from the available pairwise connections during preprocessing phase. To evaluate the performance of our algorithm, an ... 详细信息
来源: 评论
High-performance Network Traffic Classification Based on Graph Neural Network
High-performance Network Traffic Classification Based on Gra...
收藏 引用
IEEE Information technology, Networking, Electronic and Automation Control Conference
作者: Bo Pang Yongquan Fu Siyuan Ren Yan Jia College of Computer Science and Technology Harbin Institute of Technology Shenzhen China National Key Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changesha China Peng Cheng Laboratory Shen Zhen China
Network traffic classification is crucial for network security and network management and is one of the most important network tasks. Current state-of-the-art traffic classifiers are based on deep learning models to a... 详细信息
来源: 评论
Learning environmental sounds with multi-scale convolutional neural network
arXiv
收藏 引用
arXiv 2018年
作者: Zhu, Boqing Wang, Changjian Liu, Feng Lei, Jin Lu, Zengquan Peng, Yuxing Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology College of Meteorology and Oceanology National University of Defense Technology Changsha China
Deep learning has dramatically improved the performance of sounds recognition. However, learning acoustic models directly from the raw waveform is still challenging. Current waveform-based models generally use time-do... 详细信息
来源: 评论