咨询与建议

限定检索结果

文献类型

  • 828 篇 会议
  • 294 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 556 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 136 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 74 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 50 篇 机械工程
    • 44 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 180 篇 数学
    • 67 篇 生物学
    • 50 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 183 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 13 篇 national key lab...
  • 12 篇 college of compu...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 36 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,047 篇 英文
  • 59 篇 中文
  • 18 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Processing Laboratory"
1124 条 记 录,以下是711-720 订阅
排序:
A simple model for the energy-efficient optimal real-time multiprocessor scheduling
A simple model for the energy-efficient optimal real-time mu...
收藏 引用
2012 IEEE International Conference on Computer science and Automation Engineering, CSAE 2012
作者: Wu, Fei Jin, Shiyao Wang, Yuming College of Electronic and Electrical Engineering Shanghai University of Engineering Science Shanghai 201620 China National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China
As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, it becomes an urgent problem of real-time energy-efficient scheduling in multiprocessor systems to reduce system energy cons... 详细信息
来源: 评论
Failure-divergence semantics and refinement of long running transactions
Failure-divergence semantics and refinement of long running ...
收藏 引用
作者: Chen, Zhenbang Liu, Zhiming Wang, Ji National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China UNU-IIST P.O. Box 3058 China
Compensating CSP (cCSP) models long-running transactions. It can be used to specify service orchestrations written in programming languages like WS-BPEL. However, the original cCSP does not allow to model internal (no... 详细信息
来源: 评论
An efficient packing algorithm for spatial keyword queries
An efficient packing algorithm for spatial keyword queries
收藏 引用
6th International Conference on Convergence and Hybrid Information technology, ICHIT 2012
作者: Pan, Jinkun Li, Dongsheng Li, Liming National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology 410073 Changsha China Shanghai Garrision 200040 Shanghai China
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel... 详细信息
来源: 评论
Topology-aware deployment of scientific applications in cloud computing
Topology-aware deployment of scientific applications in clou...
收藏 引用
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012
作者: Fan, Pei Chen, Zhenbang Wang, Ji Zheng, Zibin Lyu, Michael R. National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Dept. of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论
Topology awareness algorithm for virtual network mapping
收藏 引用
Journal of Zhejiang University-science C(Computers and Electronics) 2012年 第3期13卷 178-186页
作者: Xiao-ling LI Huai-min WANG Chang-guo GUO Bo DING Xiao-yong LI Wen-qi BI Shuang TAN National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology.Changsha 410073China School of Computer National University of Defense TechnologyChangsha 410073China China Electronic Systems Engineering Corporation Beijing 100039China The Northern Institute of Electronic Equipment of China Beijing 100083China
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne... 详细信息
来源: 评论
Concurrent access control using subcarrier signature in heterogeneous MIMO-based WLAN
Concurrent access control using subcarrier signature in hete...
收藏 引用
5th International Workshop on Multiple Access Communications, MACOM 2012
作者: Shen, Hu Lv, Shaohe Sun, Yanqiang Dong, Xuan Wang, Xiaodong Zhou, Xingming National Key Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha 410073 China Institute of Network Information and Security National University of Defense Technology Changsha 410073 China
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif... 详细信息
来源: 评论
Using NMFAS to identify key biological pathways associated with human diseases
Using NMFAS to identify key biological pathways associated w...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Guo, Hao Zhu, Yunping Li, Dong He, Fuchu Liu, Qijun State Key Laboratory of Proteomics Beijing Proteome Research Centre Beijing Institute of Radiation Medicine Beijing China National Laboratory for Parallel and Distributed Processing National University of Deference and Technology Changsha China
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde... 详细信息
来源: 评论
Investor: A Light-Weight Speculation Scheme for the Open Internet
Investor: A Light-Weight Speculation Scheme for the Open Int...
收藏 引用
2010 3rd International Conference on Computer and Electrical Engineering(ICCEE 2010)
作者: Huiba Li Shengyun Liu Yuxing Peng Xicheng Lu National Laboratory for Parallel and Distributed Processing National University of Defense Technology
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modi... 详细信息
来源: 评论
A malicious code detection method based on statistical analysis
A malicious code detection method based on statistical analy...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Zhou, Jie Xu, Xinhai National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To... 详细信息
来源: 评论
Research on malicious code detection based on least-squares estimation
Research on malicious code detection based on least-squares ...
收藏 引用
2012 International Conference on Computer science and Electronics Engineering, ICCSEE 2012
作者: Wu, Yunlong Chen, Chen Wang, Huiquan Xu, Xinhai Zhou, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha Hunan 410073 China School of Computer National University of Defense Technology Changsha Hunan 410073 China
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio... 详细信息
来源: 评论