咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 158 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 534 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 257 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 50 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 36 篇 生物工程
    • 23 篇 电子科学与技术(可...
    • 22 篇 机械工程
    • 14 篇 电气工程
    • 11 篇 网络空间安全
    • 10 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 交通运输工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 农业工程
    • 5 篇 光学工程
    • 5 篇 建筑学
  • 126 篇 理学
    • 74 篇 数学
    • 37 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 15 篇 化学
    • 9 篇 系统科学
  • 98 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 10 篇 法学
    • 8 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 农学
    • 6 篇 作物学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 医学
  • 1 篇 文学

主题

  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 laboratories
  • 14 篇 training
  • 13 篇 semantics
  • 13 篇 cloud computing
  • 12 篇 deep neural netw...
  • 12 篇 distributed proc...
  • 11 篇 servers
  • 11 篇 machine learning
  • 11 篇 distributed comp...
  • 10 篇 programming
  • 10 篇 data models
  • 9 篇 scalability
  • 9 篇 deep learning
  • 9 篇 costs
  • 9 篇 accuracy
  • 8 篇 optimization
  • 8 篇 topology
  • 8 篇 hardware

机构

  • 39 篇 school of cyber ...
  • 36 篇 college of compu...
  • 32 篇 school of comput...
  • 29 篇 national key lab...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 national key lab...
  • 21 篇 national key lab...
  • 18 篇 school of softwa...
  • 16 篇 national laborat...
  • 16 篇 school of inform...
  • 14 篇 national laborat...
  • 13 篇 national key lab...
  • 12 篇 national key lab...
  • 11 篇 shanghai key lab...
  • 11 篇 science and tech...
  • 11 篇 national key lab...

作者

  • 25 篇 jin hai
  • 23 篇 wang huaimin
  • 22 篇 li dongsheng
  • 21 篇 hai jin
  • 18 篇 hu shengshan
  • 18 篇 wang yijie
  • 18 篇 huaimin wang
  • 16 篇 dongsheng li
  • 14 篇 zhang leo yu
  • 13 篇 ding bo
  • 13 篇 li minghui
  • 11 篇 lai zhiquan
  • 11 篇 zhou ziqi
  • 10 篇 yijie wang
  • 10 篇 zhiquan lai
  • 10 篇 chen haibo
  • 10 篇 ji wang
  • 10 篇 tao wang
  • 9 篇 gang yin
  • 9 篇 dou yong

语言

  • 500 篇 英文
  • 26 篇 中文
  • 8 篇 其他
检索条件"机构=The National Key Laboratory of Parallel and Distributed Computing"
534 条 记 录,以下是201-210 订阅
排序:
Towards practical and massively parallel quantum computing emulation for quantum chemistry
arXiv
收藏 引用
arXiv 2023年
作者: Shang, Honghui Fan, Yi Shen, Li Guo, Chu Liu, Jie Duan, Xiaohui Li, Fang Li, Zhenyu Institute of Computing Technology Chinese Academy of Sciences Beijing China Hefei National Laboratory University of Science and Technology of China Hefei230088 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Software Shandong University Jinan China National Research Center of Parallel Computer Engineering and Technology Beijing China
Quantum computing is moving beyond its early stage and seeking for commercial applications in chemical and biomedical sciences. In the current noisy intermediate-scale quantum computing era, quantum resource is too sc... 详细信息
来源: 评论
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Yuting Huang, Pei Cao, Juan Li, Jintao Lin, Yun Dong, Jin Song Ma, Feifei Zhang, Jian Key Lab of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Beijing China National University of Singapore Singapore Laboratory of Parallel Software and Computational Science ISCAS Beijing China
Recent years have seen the wide application of NLP models in crucial areas such as finance, medical treatment, and news media, raising concerns of the model robustness and vulnerabilities. In this paper, we propose a ... 详细信息
来源: 评论
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc Networks  7
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Guo, Kun Wang, Dongbin Zhi, Hui Gao, Yibo Zhang, Tao Lv, Tiejun Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory For Mobile Network Beijing China TravelSky Technology Limited Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
An in-depth exploration of LAMOST Unknown spectra based on density clustering
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Hai-Feng Yin, Xiao-Na Cai, Jiang-Hui Yang, Yu-Qing Luo, A-Li Bai, Zhong-Rui Zhou, Li-Chan Zhao, Xu-Jun Xun, Ya-Ling Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan030024 China School of Computer Science and Technology North University of China Taiyuan030051 China National Astronomical Observatories Chinese Academy of Sciences Beijing100101 China School of Computer Science and Technology Taiyuan University of Science and Technology Taiyuan030024 China
LAMOST (Large Sky Area Multi-Object Fiber Spectroscopic Telescope) has completed the observation of nearly 20 million celestial objects, including a class of spectra labeled ‘Unknown’. Besides low signal-to-noise ra... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded Logits for Few-Shot Text Classification
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yi Xu Jie Hu Zhiqiao Gao Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China China Telecom Corporation Limited Research Institute Beijing China
Although the recent advances in pre-training language models have achieved great success and migrated annotation bottleneck for many tasks, the task-specific fine-tuning for text classification still requires thousand... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Multi-representation knowledge distillation for audio classification
arXiv
收藏 引用
arXiv 2020年
作者: Gao, Liang Xu, Kele Wang, Huaimin Peng, Yuxing National Key Laboratory of Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha410073 China
As an important component of multimedia analysis tasks, audio classification aims to discriminate between different audio signal types and has received intensive attention due to its wide applications. Generally speak... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论