咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 156 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 246 篇 计算机科学与技术...
    • 197 篇 软件工程
    • 67 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 22 篇 电气工程
    • 12 篇 化学工程与技术
    • 10 篇 力学(可授工学、理...
    • 9 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 8 篇 农业工程
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 光学工程
    • 6 篇 核科学与技术
    • 6 篇 生物医学工程(可授...
  • 146 篇 理学
    • 83 篇 数学
    • 37 篇 生物学
    • 35 篇 物理学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 10 篇 化学
  • 83 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 8 篇 农学
    • 8 篇 作物学
  • 6 篇 医学
  • 5 篇 经济学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 24 篇 training
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 17 篇 feature extracti...
  • 15 篇 computer archite...
  • 15 篇 neural networks
  • 14 篇 benchmark testin...
  • 14 篇 semantics
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 task analysis
  • 13 篇 servers
  • 12 篇 distributed data...
  • 11 篇 distributed proc...
  • 11 篇 machine learning
  • 11 篇 clustering algor...
  • 11 篇 kernel
  • 11 篇 accuracy
  • 10 篇 scalability
  • 10 篇 laboratories

机构

  • 134 篇 science and tech...
  • 62 篇 college of compu...
  • 36 篇 science and tech...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 college of compu...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 college of scien...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 xiangjiang lab

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 24 篇 yijie wang
  • 20 篇 dou yong
  • 20 篇 peng yuxing
  • 18 篇 wang yijie
  • 17 篇 zhigang luo
  • 15 篇 yuxing peng
  • 15 篇 dongsheng li
  • 15 篇 qinglin wang
  • 15 篇 huaimin wang
  • 15 篇 qiao peng
  • 14 篇 naiyang guan
  • 14 篇 wang huaimin
  • 13 篇 li dongsheng
  • 13 篇 zuocheng xing
  • 12 篇 wang qinglin
  • 12 篇 yong dou
  • 11 篇 chen xinhai
  • 11 篇 chunye gong

语言

  • 508 篇 英文
  • 26 篇 中文
  • 4 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Laboratory"
538 条 记 录,以下是91-100 订阅
排序:
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for Highly-Effective Drug-Protein Interaction Representation
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Qiu, Yanlong Wang, Siqi Yang, Xi Qiu, Xinyuan Wu, Chengkun Cui, Yingbo Yang, Canqun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science Hunan Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Hunan Changsha410073 China National University of Defense Technology Department of Biology and Chemistry College of Science Hunan Changsha410073 China
With the exponential growth of biomedical knowledge in unstructured text repositories such as PubMed, it is imminent to establish a knowledge graph-style, efficient searchable and targeted database that can support th... 详细信息
来源: 评论
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack
MPS: A Multiple Poisoned Samples Selection Strategy in Backd...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weihong Zou Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu Schoosl of Computer Science and Engineering Central South University Science and Technology on Parallel and Distributed Processing Laboratory (PDL) College of Computer Science and Electronic Engineering Hunan University
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple poisoned samples attacks usually r... 详细信息
来源: 评论
Ladder: A Blockchain Model of Low-Overhead Storage  3rd
Ladder: A Blockchain Model of Low-Overhead Storage
收藏 引用
3rd International Conference on Blockchain and Trustworthy Systems, Blocksys 2021
作者: Chen, Peng Zhang, Xunhui Liu, Hui Xiang, Liangliang Shi, Peichang National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha410073 China
Emerging blockchain accounting mechanism allow mutually distributed parties to transport trusted information and ensure the correctness of data. Every blockchain node stores the complete block locally. Although this m... 详细信息
来源: 评论
Bi-Objective Scheduling Algorithm for Hybrid Workflow in JointCloud
Bi-Objective Scheduling Algorithm for Hybrid Workflow in Joi...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Rui Li Huaimin Wang Peichang Shi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of Complex & Critica Software Environment College of Computer Science National University of Defense Technology Changsha China
Big data workflows are widely used in IoT, recommended systems, and real-time vision applications, and they continue to grow in complexity. These hybrid workflows consist of both resource-intensive batch jobs and late... 详细信息
来源: 评论
Research on accelerating CEE-DGCNN event extraction algorithm based on multi-CPU platform  2
Research on accelerating CEE-DGCNN event extraction algorith...
收藏 引用
2020 2nd International Conference on Electronics and Communication, Network and Computer technology, ECNCT 2020
作者: Li, Yan Jiang, Jinfei Xu, Jinwei Gao, Zikai Dou, Yong Zhou, Haifang Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology Changsha410005 China Department of Computational Science National University of Defense Technology Changsha410005 China
With the development of the Internet, the volume of information is expanding rapidly, and the complex information makes it particularly important to extract information quickly and intelligently. Event extraction algo... 详细信息
来源: 评论
parallel Implementation of SHA256 on Multizone Heterogeneous Systems
Parallel Implementation of SHA256 on Multizone Heterogeneous...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yongtao Luo Jie Liu Tiaojie Xiao Chunye Gong Science and Technology on Parallel and Distributed Processing Laboratory Laboratory of Digitizing program for Frontier Equipment National University of Defense Technology Changsha China National Supercomputer Center in Tianjin Tianjin China
SHA-256 plays an important role in widely used applications, such as data security, data integrity, digital signatures, and cryptocurrencies. However, most of the current optimized implementations of SHA-256 are based...
来源: 评论
RuleRAG: Rule-Guided Retrieval-Augmented Generation with Language Models for Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhongwu Xu, Chengjin Wang, Dingmin Huang, Zhen Dou, Yong Jiang, Xuhui Guo, Jian National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology China IDEA Research International Digital Economy Academy Department of Computer Science University of Oxford United Kingdom
Retrieval-augmented generation (RAG) has shown promising potential in knowledge intensive question answering (QA). However, existing approaches only consider the query itself, neither specifying the retrieval preferen... 详细信息
来源: 评论
AUXILIARY-TASKS LEARNING FOR PHYSICS-INFORMED NEURAL NETWORK-BASED PARTIAL DIFFERENTIAL EQUATIONS SOLVING
arXiv
收藏 引用
arXiv 2023年
作者: Yan, Junjun Chen, Xinhai Wang, Zhichao Zhou, Enqiang Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China
Physics-informed neural networks (PINNs) have emerged as promising surrogate modes for solving partial differential equations (PDEs). Their effectiveness lies in the ability to capture solution-related features throug... 详细信息
来源: 评论
A Fast Adversarial Sample Detection Approach for Industrial Internet-of-Things Applications
A Fast Adversarial Sample Detection Approach for Industrial ...
收藏 引用
International Workshop on Quality of Service
作者: Shigeng Zhang Yudong Li Shuxin Chen Xuan Li Jian Zhang School of Computer Science and Engineering Central South University College of Computer Science and Electronic Engineering Hunan University The Science and Technology on Parallel and Distributed Processing Laboratory (PDL) China
Adversarial attacks reveal the inherent vulnerability of deep neural networks, which face serious security issues for their security. Among them, the attack against the Deep Neural Network (DNN) application used in th...
来源: 评论
ST-PINN: A Self-Training Physics-Informed Neural Network for Partial Differential Equations
arXiv
收藏 引用
arXiv 2023年
作者: Yan, Junjun Chen, Xinhai Wang, Zhichao Zhoui, Enqiang Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China
Partial differential equations (PDEs) are an essential computational kernel in physics and engineering. With the advance of deep learning, physics-informed neural networks (PINNs), as a mesh-free method, have shown gr... 详细信息
来源: 评论