咨询与建议

限定检索结果

文献类型

  • 830 篇 会议
  • 289 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 548 篇 计算机科学与技术...
    • 406 篇 软件工程
    • 134 篇 信息与通信工程
    • 80 篇 控制科学与工程
    • 73 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 42 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 14 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 286 篇 理学
    • 178 篇 数学
    • 67 篇 生物学
    • 51 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 180 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 45 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 29 篇 feature extracti...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 168 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 79 篇 national laborat...
  • 37 篇 national laborat...
  • 36 篇 science and tech...
  • 34 篇 school of comput...
  • 34 篇 national laborat...
  • 28 篇 national key lab...
  • 22 篇 science and tech...
  • 21 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 14 篇 national key lab...
  • 13 篇 national key lab...
  • 13 篇 college of compu...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 39 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 xiaodong wang
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 22 篇 zhigang luo
  • 22 篇 wang ji
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,023 篇 英文
  • 51 篇 中文
  • 47 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Processing Laboratory"
1121 条 记 录,以下是701-710 订阅
Research of context situation awareness technology
Research of context situation awareness technology
收藏 引用
作者: Shi, Dianxi Wu, Zhendong Ding, Bo Yan, Huining National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
Workload-awared HPC system scalability analysis based on electronic technology developing
Workload-awared HPC system scalability analysis based on ele...
收藏 引用
2012 International Conference on Mechanical and Electronic Engineering, ICMEE 2012
作者: Lin, Yufei Tang, Yuhua Zhang, Xin National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China
As the electronic technology develops, the integration levels of CPUs and memories keep growing, and the speeds of communication devices are improved. The high-performance computing (HPC) systems consist of processing... 详细信息
来源: 评论
UCBench: A user-centric benchmark suite for C code static analyzers
UCBench: A user-centric benchmark suite for C code static an...
收藏 引用
2012 IEEE International Conference on Information science and technology, ICIST 2012
作者: Liu, Jiangchao Chen, Liqian Dong, Longming Wang, Ji National Laboratory for Parallel and Distributed Processing School of Computer National University of Defence Technology Changsha China
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in de... 详细信息
来源: 评论
BCE: A privacy-preserving common-friend estimation method for distributed online social networks without cryptography
BCE: A privacy-preserving common-friend estimation method fo...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed online social networks (DOSN) have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose BCE (Bloom Filter based Common-Friend Est... 详细信息
来源: 评论
On the feasibility of common-friend measurements for the distributed online social networks
On the feasibility of common-friend measurements for the dis...
收藏 引用
2012 7th International ICST Conference on Communications and Networking in China, CHINACOM 2012
作者: Fu, Yongquan Wang, Yijie National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Hunan province 410073 China
distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme th... 详细信息
来源: 评论
SMP-SIM: An event-driven performance simulator for SMP
SMP-SIM: An event-driven performance simulator for SMP
收藏 引用
2012 International Conference on Systems and Informatics, ICSAI 2012
作者: Zhang, Xin Tang, Yuhua Lin, Yufei Xu, Xinhai Guo, Xiaowei Ren, Xiaoguang National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan China
Performance prediction for the high performance computer system is of great importance for designing, implementing, and optimizing system. As a widely used technique for predicting performance, simulation method attra... 详细信息
来源: 评论
Checkpoint selection in fault recovery based on byzantine fault model  4th
Checkpoint selection in fault recovery based on byzantine fa...
收藏 引用
4th International Conference on Computational Intelligence and Communication Networks, CICN 2012
作者: Xu, Xinhai Lin, Yufei National Laboratory for Parallel and Distributed Processing Computer School National University of Defense Technology Changsha Hunan China
Nowadays, with the growth of the performance, the reliability problem of supercomputers becomes more and more serious. In order to complete an application with small fault recovery overhead, Checkpoint/Restart(C/R) me... 详细信息
来源: 评论
Invalid pointer dereferences detection for CPS software based on extended pointer structures
Invalid pointer dereferences detection for CPS software base...
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Dong, Longming Dong, Wei Chen, Liqian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Invalid pointer dereferences, such as null pointer dereferences, dangling pointer dereferences and double frees, are a prevalent source of software bugs in CPS software, due to flexible dereferencing pointers along va... 详细信息
来源: 评论
Precise pointer analysis for list-manipulating programs based on quantitative separation logic
Precise pointer analysis for list-manipulating programs base...
收藏 引用
2012 IEEE International Conference on Information science and technology, ICIST 2012
作者: Dong, Longming Chen, Liqian Liu, Jiangchao Li, Renjian National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Full precise pointer analysis has been a challenging problem, especially when dealing with dynamically-allocated memory. Separation logic can describe pointer alias formally, but cannot describe the quantitative reach... 详细信息
来源: 评论
Bodhi: Detecting buffer overflows with a game
Bodhi: Detecting buffer overflows with a game
收藏 引用
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
作者: Chen, Jie Mao, Xiaoguang National Laboratory for Parallel and Distributed Processing Changsha China School of Computer National University of Defense Technology Changsha China
Buffer overflow is one of the most dangerous and common vulnerabilities in CPS software. Despite static and dynamic analysis, manual analysis is still heavily used which is useful but costly. Human computation harness... 详细信息
来源: 评论