咨询与建议

限定检索结果

文献类型

  • 828 篇 会议
  • 294 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 556 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 136 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 74 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 50 篇 机械工程
    • 44 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 180 篇 数学
    • 67 篇 生物学
    • 50 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 183 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 13 篇 national key lab...
  • 12 篇 college of compu...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 36 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,047 篇 英文
  • 59 篇 中文
  • 18 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Processing Laboratory"
1124 条 记 录,以下是1021-1030 订阅
排序:
Analyzing the Efficiency and Bottleneck of Scientific Programs on Imagine Stream Processor by Simulation
Analyzing the Efficiency and Bottleneck of Scientific Progra...
收藏 引用
International Symposium on parallel and distributed processing with Applications, ISPA
作者: Yonggang Che Chuanfu Xu Zhenghua Wang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
Imagine stream processor has shown high performance and efficiency for media applications. Its potential for scientific applications is of great interest to the high performance computing community. This paper investi... 详细信息
来源: 评论
Automating Software FMEA via Formal Analysis of Dependence Relations
Automating Software FMEA via Formal Analysis of Dependence R...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Wei Dong Ji Wang Changzhi Zhao Xian Zhang Jie Tian School of Computer National University of Defense Technology China National Laboratory for Parallel and Distributed Processing China
The paper presents the ongoing work of studying FMEA method for embedded safely critical software via formal analysis of various dependence relations among software elements, which can fairly improve the automation an... 详细信息
来源: 评论
Research on self-similar network traffic prediction
收藏 引用
Hunan Daxue Xuebao/Journal of Hunan University Natural sciences 2008年 第6期35卷 82-86页
作者: Zhang, Guang-Sheng Li, Jing-Bo Dou, Wen-Hua Shao, Li-Song National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Journal of Hunan University Changsha 410082 China
Recent studies on network traffic have shown that self-similar is very popular, and the character will not be changed during buffering, switching and transmitting. The character self-similar must be considered in netw... 详细信息
来源: 评论
Compiler-Assisted Application-Level Checkpointing for MPI Programs
Compiler-Assisted Application-Level Checkpointing for MPI Pr...
收藏 引用
IEEE International Conference on distributed Computing Systems
作者: Xuejun Yang Panfeng Wang Hongyi Fu Yunfei Du Zhiyuan Wang Jia Jia National Laboratory for Parallel & Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
Application-level checkpointing can decrease the overhead of fault tolerance by minimizing the amount of checkpoint data. However this technique requires the programmer to manually choose the critical data that should... 详细信息
来源: 评论
Optimal Placement of Application-Level Checkpoints
Optimal Placement of Application-Level Checkpoints
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Panfeng Wang Zhiyuan Wang Yunfei Du Xuejun Yang Haifang Zhou National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
One of the basic problems related to the efficient application-level checkpointing is the placement of checkpoints in the source codes. In this paper we discuss two common questions with a source-to-source precompiler... 详细信息
来源: 评论
Static Analysis for Application-Level Checkpointing of MPI Programs
Static Analysis for Application-Level Checkpointing of MPI P...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Panfeng Wang Yunfei Du Hongyi Fu Xuejun Yang Haifang Zhou National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha Hunan China
Application-level checkpointing is a promising technology in the domain of large-scale scientific computing. The consistency of global checkpoint must be carefully guaranteed in order to correctly restore the computat... 详细信息
来源: 评论
Flexible Routing in Grouped DHTs
Flexible Routing in Grouped DHTs
收藏 引用
International Conference on Peer-to-Peer Computing
作者: Yiming Zhang Dongsheng Li Lei Chen Xicheng Lu National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
In most DHTs proposed so far, all nodes are assumed to be homogeneous, and all messages are routed using a common algorithm. In practice, however, nodes in large-scale systems might be heterogeneous with respect to th... 详细信息
来源: 评论
distributed Line Graphs: A Universal Framework for Building DHTs Based on Arbitrary Constant-Degree Graphs
Distributed Line Graphs: A Universal Framework for Building ...
收藏 引用
International Conference on distributed Computing Systems
作者: Yiming Zhang Ling Liu Dongsheng Li Xicheng Lu National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China Georgia Institute of Technology College of Computing Georgia Institute of Technology Atlanta USA
Most proposed DHTs have their unique maintenance mechanisms specific to the static graphs on which they are based. In this paper we propose distributed line graphs (DLG), a universal framework for building DHTs based ... 详细信息
来源: 评论
An Efficient Approximation for Weapon-Target Assignment
An Efficient Approximation for Weapon-Target Assignment
收藏 引用
ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM
作者: Lina Chen ChuanJun Ren Su Deng C4ISR Technology National Defense Science and Technology Key Laboratory National University of Defense Technology Changsha Hunan China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
The weapon-target assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. The WTA problem can be formulated as a nonlinear integer programming problem and is k... 详细信息
来源: 评论
An Efficient Approach for Point Coverage Problem of Sensor Network
An Efficient Approach for Point Coverage Problem of Sensor N...
收藏 引用
International Symposium on Electronic Commerce and Security
作者: GaoJun Fan Feng Liang ShiYao Jin National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China Military Representative Office of Navy Chinese Shipbuilding Company Limited Shanghai China
One fundamental issue in application of wireless sensor networks is to provide proper coverage of their deployment regions, which answers the questions about the quality of service (surveillance or monitoring) that ca... 详细信息
来源: 评论