咨询与建议

限定检索结果

文献类型

  • 381 篇 会议
  • 156 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 246 篇 计算机科学与技术...
    • 197 篇 软件工程
    • 67 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 22 篇 电气工程
    • 12 篇 化学工程与技术
    • 10 篇 力学(可授工学、理...
    • 9 篇 仪器科学与技术
    • 9 篇 动力工程及工程热...
    • 8 篇 农业工程
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 光学工程
    • 6 篇 核科学与技术
    • 6 篇 生物医学工程(可授...
  • 146 篇 理学
    • 83 篇 数学
    • 37 篇 生物学
    • 35 篇 物理学
    • 19 篇 系统科学
    • 18 篇 统计学(可授理学、...
    • 10 篇 化学
  • 83 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 8 篇 农学
    • 8 篇 作物学
  • 6 篇 医学
  • 5 篇 经济学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 24 篇 training
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 17 篇 feature extracti...
  • 15 篇 computer archite...
  • 15 篇 neural networks
  • 14 篇 benchmark testin...
  • 14 篇 semantics
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 task analysis
  • 13 篇 servers
  • 12 篇 accuracy
  • 12 篇 distributed data...
  • 11 篇 distributed proc...
  • 11 篇 machine learning
  • 11 篇 clustering algor...
  • 11 篇 kernel
  • 10 篇 scalability
  • 10 篇 laboratories

机构

  • 134 篇 science and tech...
  • 62 篇 college of compu...
  • 36 篇 science and tech...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 13 篇 laboratory of di...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 college of compu...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 college of compu...
  • 8 篇 college of scien...
  • 8 篇 national key lab...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 xiangjiang lab

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 24 篇 yijie wang
  • 20 篇 dou yong
  • 20 篇 peng yuxing
  • 18 篇 wang yijie
  • 17 篇 zhigang luo
  • 15 篇 yuxing peng
  • 15 篇 dongsheng li
  • 15 篇 qinglin wang
  • 15 篇 huaimin wang
  • 15 篇 qiao peng
  • 14 篇 naiyang guan
  • 14 篇 wang huaimin
  • 13 篇 li dongsheng
  • 13 篇 yong dou
  • 13 篇 zuocheng xing
  • 12 篇 wang qinglin
  • 11 篇 chen xinhai
  • 11 篇 chunye gong

语言

  • 509 篇 英文
  • 26 篇 中文
  • 4 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Laboratory"
539 条 记 录,以下是121-130 订阅
排序:
Optimizing Batched Small Matrix Multiplication on Multi-core DSP Architecture
Optimizing Batched Small Matrix Multiplication on Multi-core...
收藏 引用
International Symposium on parallel and distributed Processing with Applications, ISPA
作者: Xiaohan Zuo Chunhua Xiao Qinglin Wang Chen Shi College of Computer Science Chongqing University China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha China
General Matrix Multiplication (GEMM) is a critical computational operation in scientific computing and machine learning domains. While traditional GEMM performs well on large matrices, it is inefficient in terms of da... 详细信息
来源: 评论
Big Data-aided Study of the Physical Process of Volume Ignition  6
Big Data-aided Study of the Physical Process of Volume Ignit...
收藏 引用
2022 6th International Conference on Mechanics, Mathematics and Applied Physics, ICMMAP 2022
作者: Liu, Pan Zhou, Yinzhao Xiong, Wenbin Liu, Chencheng Liu, Jie Liu, Gongjie Tang, Zhangchun Gao, Qiang Tianfu Innovation Energy Establishment Chengdu610000 China Nuclear and Radiation Safety Center MEE Beijing100000 China Central South University of Forestry and Technology Changsha410000 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China Beijng PARATERA Technology Corp. Ltd Beijing100000 China University of Electronic Science and Technology of China Chengdu610000 China
Volume ignition is a method of igniting a fuel as a whole by simultaneously achieving ignition conditions throughout the fuel zone. The basic criterion for ignition is that the thermonuclear energy is greater than the... 详细信息
来源: 评论
Optimizing Irregular-Shaped Matrix-Matrix Multiplication on Multi-Core DSPs
arXiv
收藏 引用
arXiv 2022年
作者: Yin, Shangfei Wang, Qinglin Hao, Ruochen Zhou, Tianyang Mei, Songzhu Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China College of Computer National University of Defense Technology Changsha410073 China
General Matrix Multiplication (GEMM) has a wide range of applications in scientific simulation and artificial intelligence. Although traditional libraries can achieve high performance on large regular-shaped GEMMs, th... 详细信息
来源: 评论
Modeling full information with graph network for joint entity-relation extraction  4
Modeling full information with graph network for joint entit...
收藏 引用
4th International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2021
作者: Wan, Qian Wei, Luona Chen, Xinhai Liu, Jie Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Hunan Changsha China College of Systems Engineering National University of Defense Technology Hunan Changsha China Laboratory of Software Engineering for Complex Systems National University of Defense Technology Hunan Changsha China
Fully capturing contextual information and analyzing the association between entity semantics and type is helpful for joint extraction task: 1) The context can reflect the part of speech and semantics of entity. 2) Th... 详细信息
来源: 评论
Optimizing All-to-All Collective Communication on Tianhe Supercomputer
Optimizing All-to-All Collective Communication on Tianhe Sup...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Jintao Peng Jie Liu Yi Dai Min Xie Chunye Gong National University of Defense Technology ChangSha China Science and Technology on Parallel and Distributed Processing Laboratory NUDT Changsha China Changsha and Laboratory of Software Engineering for Complex System NUDT Changsha China
All-to-all communication has a wide range of ap-plications in parallel applications like FFT. On most supercom-puters, there are multiple cores in a node. Message aggregation is an efficient method for smaller message... 详细信息
来源: 评论
Big data collaborative artificial intelligence and high-performance computing to drive physical design of fusion
Big data collaborative artificial intelligence and high-perf...
收藏 引用
2022 International Conference on Cloud Computing, Big Data Applications and Software Engineering, CBASE 2022
作者: Liu, Pan Liu, Gongjie Liu, Jie Liu, Chencheng Xiong, Wenbin Tang, Zhangcun Zhou, Yinzhao Wang, Yonggang Yuan, Zhouming Beijng Paratera Technology Corp. Ltd Beijing100000 China National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory Changsha410073 China National University of Defense Technology Laboratory of Software Engineering for Complex Systems Changsha410073 China Central South University of Forestry and Technology Changsha410000 China Nuclear and Radiation Safety Center Mee Beijing100000 China University of Electronic Science and Technology of China Chengdu610000 China Tianfu Innovation Energy Establishment Chengdu610000 China
Controlled thermonuclear fusion has always been a dream pursued by mankind. However, the physical processes of controlled thermonuclear fusion are complex, requiring numerical simulations with high performance computi... 详细信息
来源: 评论
OHTMA:an optimized heuristic topology-aware mapping algorithm on the Tianhe-3 exascale supercomputer prototype
收藏 引用
Frontiers of Information technology & Electronic Engineering 2020年 第6期21卷 939-949页
作者: Yi-shui LI Xin-hai CHEN Jie LIU Bo YANG Chun-ye GONG Xin-biao GAN Sheng-guo LI Han XU Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense TechnologyChangsha 410073China
With the rapid increase of the size of applications and the complexity of the supercomputer architecture,topology-aware process mapping becomes increasingly *** communication cost has become a dominant constraint of t... 详细信息
来源: 评论
Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data
Effective Anomaly Detection Based on Reinforcement Learning ...
收藏 引用
International Conference on parallel and distributed Systems (ICPADS)
作者: Zhongyang Wang Yijie Wang Hongzuo Xu Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Mixed-type data with both categorical and numerical features are ubiquitous in network security, but the existing methods are minimal to deal with them. Existing methods usually process mixed-type data through feature... 详细信息
来源: 评论
Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data
Entropy and Autoencoder-Based Outlier Detection in Mixed-Typ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhongyang Wang Yijie Wang Zhenyu Huang Yongjun Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Mixed-type data containing categorical and numerical features are pervasive in real life, but very limited outlier detection methods are available for these data. Some existing methods handle mixed-type data by featur... 详细信息
来源: 评论
Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly Detection
Attention-based Encoder-Decoder Recurrent Neural Networks fo...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Shang Wu Yijie Wang Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology
Attack payloads are often short segments hidden in HTTP requests; thus they can be found by HTTP payload anomaly detection. Deep learning models learn data features during training without manual feature extraction, a... 详细信息
来源: 评论