咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 166 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 265 篇 计算机科学与技术...
    • 205 篇 软件工程
    • 51 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 36 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 16 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 128 篇 理学
    • 76 篇 数学
    • 38 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 101 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 15 篇 training
  • 14 篇 deep neural netw...
  • 14 篇 laboratories
  • 14 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 data models
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware
  • 8 篇 accuracy

机构

  • 38 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 16 篇 school of softwa...
  • 16 篇 national laborat...
  • 15 篇 school of inform...
  • 14 篇 national laborat...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...

作者

  • 26 篇 jin hai
  • 25 篇 wang huaimin
  • 23 篇 li dongsheng
  • 21 篇 hai jin
  • 19 篇 wang yijie
  • 18 篇 hu shengshan
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 15 篇 ding bo
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 wang tao
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin

语言

  • 505 篇 英文
  • 26 篇 中文
  • 9 篇 其他
检索条件"机构=The National Key Laboratory of Parallel and Distributed Computing"
540 条 记 录,以下是11-20 订阅
排序:
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework  24th
MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2024
作者: Lei, Tong Chen, Zongjing Che, Yonggang Xu, Chuanfu Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Currently, the landscape of computer hardware architecture presents the characteristics of heterogeneity and diversity, prompting widespread attention to cross-platform portable parallel programming techniques. Most e... 详细信息
来源: 评论
PEbfs: Implement High-Performance Breadth-First Search on PEZY-SC3s  24th
PEbfs: Implement High-Performance Breadth-First Search on P...
收藏 引用
24th International Conference on Algorithms and Architectures for parallel Processing, ICA3PP 2024
作者: Guo, Weihao Wang, Qinglin Liu, Xiaodong Peng, Muchun Yang, Shun Liang, Yaling Shi, Yongzhen Cao, Ligang Liu, Jie Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha410073 China Engineering Research Center for National Fundamental Software National University of Defense Technology Changsha410073 China
The breadth-first search (BFS) algorithm is a fundamental algorithm in graph theory, and it’s parallelization can significantly improve performance. Therefore, there have been numerous efforts to leverage the powerfu... 详细信息
来源: 评论
Memory replay with unlabeled data for semi-supervised class-incremental learning via temporal consistency
收藏 引用
Frontiers of Computer Science 2025年 第12期19卷 1-4页
作者: Wang, Qiang Xu, Kele Feng, Dawei Ding, Bo Wang, Huaimin National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of Vehicles  18th
Recommendation-Aware Collaborative Edge Caching Strategy in...
收藏 引用
18th International Conference on Wireless Artificial Intelligent computing Systems and Applications, WASA 2024
作者: Ou, Pingjie Chen, Ningjiang Huang, Zizhan School of Computer and Electronic Information Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing Education Department of Guangxi Zhuang Autonomous Region Guangxi University Guangxi Nanning530004 China
Due to the limited resources of edge networks, the heterogeneity of user content requests, high-cost caching from direct resource hits, and redundancy in resource retention time hinder system performance. Traditional ... 详细信息
来源: 评论
Highly parallelized Reinforcement Learning Training with Relaxed Assignment Dependencies
arXiv
收藏 引用
arXiv 2025年
作者: He, Zhouyu Qiao, Peng Li, Rongchun Dou, Yong Tan, Yusong College of Computer Science and Technology National University of Defense Technology China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China
As the demands for superior agents grow, the training complexity of Deep Reinforcement Learning (DRL) becomes higher. Thus, accelerating training of DRL has become a major research focus. Dividing the DRL training pro... 详细信息
来源: 评论
Open source oriented cross-platform survey
收藏 引用
Information and Software Technology 2025年 182卷
作者: Yao, Simeng Zhang, Xunhui Zhang, Yang Wang, Tao College of Computer Science and Technology National University of Defense Technology Changsha410073 China State Key Laboratory of Complex & Critical Software Environment Changsha410073 China National Key Laboratory of Parallel and Distributed Computing Changsha410073 China
Context: Open-source software development has become a widely adopted approach to software creation. However, developers’ activities extend beyond social coding platforms (e.g., GitHub), encompassing social Q&A p... 详细信息
来源: 评论
Deep Time Series Anomaly Detection with Local Temporal Pattern Learning
Deep Time Series Anomaly Detection with Local Temporal Patte...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yizhou Li Yijie Wang Hongzuo Xu Xiaohui Zhou National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised time series anomaly detection (TSAD) demonstrates remarkable performance improvement by extracting high-level data semantics through proxy tasks. Nonetheless, most existing self-supervised TSAD techniq... 详细信息
来源: 评论
A Counterfactual Ultrasound Anti-Interference Self-Supervised Network for B-mode Ultrasound Tongue Extraction
A Counterfactual Ultrasound Anti-Interference Self-Supervise...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yan Jia Yuqing Cheng Kele Xu Yong Dou Peng Qiao Zhouyu He National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Systems Engineering National University of Defense Technology Changsha China
B-mode ultrasound tongue imaging is a non-invasive and real-time method for visualizing vocal tract deformation. However, accurately extracting the tongue’s surface contour remains a significant challenge due to the ... 详细信息
来源: 评论
Graph Structure Learning via Transfer Entropy for Multivariate Time Series Anomaly Detection
Graph Structure Learning via Transfer Entropy for Multivaria...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingyu Liu Yijie Wang Xiaohui Zhou Yongjun Wang National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology National University of Defense Technology Changsha China
Multivariate time series anomaly detection (MTAD) poses a challenge due to temporal and feature dependencies. The critical aspects of enhancing the detection performance lie in accurately capturing the dependencies be... 详细信息
来源: 评论