咨询与建议

限定检索结果

文献类型

  • 830 篇 会议
  • 289 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 548 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 134 篇 信息与通信工程
    • 80 篇 控制科学与工程
    • 73 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 42 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 14 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 286 篇 理学
    • 178 篇 数学
    • 67 篇 生物学
    • 51 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 180 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 45 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 29 篇 feature extracti...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 168 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 79 篇 national laborat...
  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 34 篇 school of comput...
  • 34 篇 national laborat...
  • 28 篇 national key lab...
  • 22 篇 science and tech...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 college of compu...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 39 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 xiaodong wang
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 22 篇 zhigang luo
  • 22 篇 wang ji
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,023 篇 英文
  • 51 篇 中文
  • 47 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Processing Laboratory"
1121 条 记 录,以下是621-630 订阅
排序:
Signature-based fast access coordination in multicarrier wireless networks
Signature-based fast access coordination in multicarrier wir...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Shaohe Lv Xuan Dong Hu Shen Xiaodong Wang Xingming Zhou National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha Hunan China
Coordination among users is an indispensable part in wireless networks for efficient access control. Alone with the rapid increase of the data transmission rate, however, coordination time becomes insufferable, even s... 详细信息
来源: 评论
IWFR: Exploiting full-duplex in wireless relay networks
IWFR: Exploiting full-duplex in wireless relay networks
收藏 引用
International Conference on Information science and technology (ICIST)
作者: Yong Lu Shaohe Lv Xiaodong Wang Xingming Zhou National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha Hunan China
Traditional wireless relay networks have large end-to-end time delay and low throughput because of the limit that it can't receive and forward at the same time. In this paper, we proposed IWFR: Immediate Wireless ... 详细信息
来源: 评论
Accuracy evaluation of deep belief networks with fixed-point arithmetic
收藏 引用
Computer Modelling and New Technologies 2014年 第6期18卷 7-14页
作者: Jiang, Jingfei Hu, Rongdong Mikel, Lujan Dou, Yong Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology ChangSha Hunan China University of Manchester Manchester United Kingdom
Deep Belief Networks (DBNs) are state-of-art Machine Learning techniques and one of the most important unsupervised learning algorithms. Training DBNs is computationally intensive which naturally leads to investigate ... 详细信息
来源: 评论
Delayed Switch:Cloud Service Upgrade with Low Availability and Capacity Loss
Delayed Switch:Cloud Service Upgrade with Low Availability a...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service science
作者: Xue Ouyang Bo Ding Huaimin Wang Parallel and Distributed Laboratory School of Computer Science National University of Defense Technology
Cloud services must upgrade continuously in order to maintain ***,a large body of empirical evidence suggests that,upgrade procedures used in practice are failure-prone and often cause planned or unplanned *** this pa... 详细信息
来源: 评论
Synchronization Error Detection of MPI Programs by Symbolic Execution
Synchronization Error Detection of MPI Programs by Symbolic ...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Xianjin Fu Zhenbang Chen Chun Huang Wei Dong Ji Wang College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China
Asynchrony based overlapping of computation and communication is commonly used in MPI applications. However, this overlapping introduces synchronization errors frequently in asynchronous MPI programming. In this paper... 详细信息
来源: 评论
Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model
Automatic Detecting Performance Bugs in Cloud Computing Syst...
收藏 引用
2014 IEEE 8th International Symposium on Service Oriented System Engineering
作者: Haibo Mi Huaimin Wang Zhenbang Chen Yangfan Zhou Science and Technology on Parallel & Distributed Processing Laboratory National Univ. of Defense Technology Shenzhen Research Institute The Chinese Univ. of Hong Kong
Performance bugs that don't cause fail-stop errors but degradation of system performance have been one of the most fundamental issues in the production platform. How to effectively online detect bugs becomes more ... 详细信息
来源: 评论
DKNNS:Scalable and accurate distributed K nearest neighbor search for latency-sensitive applications
收藏 引用
science China(Information sciences) 2013年 第3期56卷 123-139页
作者: FU YongQuan WANG YiJie National Key Laboratory for Parallel and Distributed Processing School of Computer ScienceNational University of Defense Technology
To reduce the access latencies of end hosts,latency-sensitive applications need to choose suitably close service machines to answer the access requests from end *** K nearest neighbor search locates K service machines... 详细信息
来源: 评论
Soft-Constrained Nonnegative Matrix Factorization via Normalization
Soft-Constrained Nonnegative Matrix Factorization via Normal...
收藏 引用
International Joint Conference on Neural Networks
作者: Long Lan Naiyang Guan Xiang Zhang Dacheng Tao Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Centre for Quantum Computation & Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology
Semi-supervised clustering aims at boosting the clustering performance on unlabeled samples by using labels from a few labeled samples. Constrained NMF (CNMF) is one of the most significant semi-supervised clustering ... 详细信息
来源: 评论
Box-constrained Projective Nonnegative Matrix Factorization via Augmented Lagrangian Method
Box-constrained Projective Nonnegative Matrix Factorization ...
收藏 引用
International Joint Conference on Neural Networks
作者: Xiang Zhang Naiyang Guan Long Lan Dacheng Tao Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Centre for Quantum Computation & Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology
Projective non-negative matrix factorization (PNMF) projects a set of examples onto a subspace spanned by a non-negative basis whose transpose is regarded as the projection matrix. Since PNMF learns a natural parts-ba... 详细信息
来源: 评论
Enhancing the Security of parallel Programs via Reducing Scheduling Space
Enhancing the Security of Parallel Programs via Reducing Sch...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Xu Zhou Gen Li Kai Lu Shuangxi Wang School of Computer National University of Defense Technology Changsha PR China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha PR China
parallel programs face a new security problem - concurrency vulnerability, which is caused by a special thread scheduling instead of inputs. In this paper, we propose to automatically fix concurrency vulnerabilities b... 详细信息
来源: 评论