咨询与建议

限定检索结果

文献类型

  • 828 篇 会议
  • 294 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 556 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 136 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 74 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 50 篇 机械工程
    • 44 篇 电气工程
    • 26 篇 动力工程及工程热...
    • 24 篇 仪器科学与技术
    • 24 篇 化学工程与技术
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 14 篇 土木工程
    • 12 篇 力学(可授工学、理...
    • 12 篇 交通运输工程
    • 12 篇 农业工程
    • 12 篇 环境科学与工程(可...
  • 288 篇 理学
    • 180 篇 数学
    • 67 篇 生物学
    • 50 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 25 篇 化学
  • 183 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 19 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 13 篇 农学
  • 11 篇 教育学
    • 11 篇 教育学
  • 8 篇 医学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 44 篇 computational mo...
  • 31 篇 concurrent compu...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 algorithm design...
  • 28 篇 computer archite...
  • 28 篇 benchmark testin...
  • 28 篇 feature extracti...
  • 28 篇 kernel
  • 27 篇 semantics
  • 27 篇 distributed proc...
  • 25 篇 graphics process...
  • 25 篇 servers
  • 25 篇 hardware
  • 23 篇 parallel process...
  • 23 篇 fault tolerance
  • 23 篇 cloud computing
  • 21 篇 task analysis
  • 21 篇 throughput
  • 21 篇 distributed comp...

机构

  • 169 篇 national laborat...
  • 134 篇 science and tech...
  • 104 篇 college of compu...
  • 81 篇 national laborat...
  • 38 篇 national laborat...
  • 36 篇 science and tech...
  • 35 篇 school of comput...
  • 34 篇 national laborat...
  • 29 篇 national key lab...
  • 22 篇 science and tech...
  • 22 篇 national key lab...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 16 篇 national laborat...
  • 15 篇 school of comput...
  • 14 篇 national laborat...
  • 14 篇 laboratory of di...
  • 13 篇 national key lab...
  • 12 篇 college of compu...
  • 12 篇 national key lab...

作者

  • 44 篇 yong dou
  • 41 篇 dou yong
  • 41 篇 wang huaimin
  • 36 篇 dongsheng li
  • 36 篇 liu jie
  • 35 篇 huaimin wang
  • 31 篇 jie liu
  • 30 篇 peng yuxing
  • 29 篇 yuxing peng
  • 29 篇 li dongsheng
  • 29 篇 yijie wang
  • 27 篇 xiaodong wang
  • 26 篇 wang yijie
  • 24 篇 yin gang
  • 23 篇 wang ji
  • 22 篇 zhigang luo
  • 21 篇 xingming zhou
  • 20 篇 gang yin
  • 20 篇 qiao peng
  • 20 篇 li kuan-ching

语言

  • 1,047 篇 英文
  • 59 篇 中文
  • 18 篇 其他
检索条件"机构=The Science and Technology on Parallel and Distributed Processing Laboratory"
1124 条 记 录,以下是721-730 订阅
排序:
A modified estimation scheme of EBT algorithm for RFID system
A modified estimation scheme of EBT algorithm for RFID syste...
收藏 引用
International Conference on Intelligent Control and Information processing (ICICIP)
作者: Ruisi Zhao Yulu Yang Parallel and distributed processing laboratory Department of Computer Science and Technology Nankai University Tianjin China
The paper proposes a scheme to improve the accuracy of tag estimation in the EBT algorithm in RFID system. In the proposed scheme, the mean value of the estimated tag number should be acquired before calculating the o... 详细信息
来源: 评论
Prediction-based federated management of multi-scale resources in cloud
收藏 引用
Advances in Information sciences and Service sciences 2012年 第6期4卷 324-334页
作者: Shi, Peichang Wang, Huaimin Yin, Gang Lu, Fengshun Wang, Tianzuo National Laboratory for Parallel and Distributed Processing College of Computer National University of Defense Technology Changsha China
The connotation of the cloud resources have been extended to be multi-scale resources, which includes central resources as presented by data center, edge resources as presented by Content Delivery Network (CDN) and en... 详细信息
来源: 评论
Security issues and solutions in cloud computing
Security issues and solutions in cloud computing
收藏 引用
32nd IEEE International Conference on distributed Computing Systems Workshops, ICDCSW 2012
作者: You, Pengfei Peng, Yuxing Liu, Weidong Xue, Shoufu National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China Jiangsu Automation Research Institute Jiangsu China Air Defense Forces Academy CPLA Zhengzhou Henan China
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and ... 详细信息
来源: 评论
Cooperative spectrum sharing in relay-trading mode: A fairness view
Cooperative spectrum sharing in relay-trading mode: A fairne...
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2012
作者: Liu, Lixia Hu, Gang Xu, Ming Peng, Yuxing National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China Department of Networks Engineering School of Computer National University of Defense Technology Changsha 410073 China
In the relay-trading mode of wireless cognitive radio networks the secondary user (SU) can achieve a promised spectrum access opportunity by relaying for the primary user (PU). How to utilize the exchanged resource ef... 详细信息
来源: 评论
Skyline Query processing on Interval Uncertain Data
Skyline Query Processing on Interval Uncertain Data
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Xiaoyong Li Yijie Wang Xiaoling Li Guangdong Wang National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Many recent applications involve processing and analyzing uncertain data. Recently, several research efforts have addressed answering skyline queries efficiently on massive uncertain datasets. However, the research la... 详细信息
来源: 评论
A study of strategies to restrain the C&C activities of structured P2P botnets
A study of strategies to restrain the C&C activities of stru...
收藏 引用
International Conference on Computer sciences and Convergence Information technology (ICCIT)
作者: Tianzuo Wang Bo Liu Huaimin Wang Hao Ren Xiaolong Ma School of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense and Technology Changsha China
Botnets are threatening the Internet heavily, and more and more botnets are utilizing the P2P technology to build their C&C (Command and Control) mechanisms. Some research have been made to compare the resilience ... 详细信息
来源: 评论
A Multi-Hash Based Signature Allocation Method in Wireless Network
A Multi-Hash Based Signature Allocation Method in Wireless N...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Xuan Dong Xiaodong Wang Shaohe Lv Quan Liu Hu Shen Wenping Liu Xingming Zhou National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China
Wireless interference does not necessarily result in the lost of all the information of the desired signal. In this paper, we study the signature allocation in wireless networks by exploiting the retained signal featu... 详细信息
来源: 评论
Exploiting Attribute Redundancy in Extracting Open Source Forge Websites
Exploiting Attribute Redundancy in Extracting Open Source Fo...
收藏 引用
International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC
作者: Xiang Li Yanxu Zhu Gang Yin Tao Wang Huaimin Wang National Laboratory for Parallel and Distributed Processing National University of Defense Technology Changsha China
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among ... 详细信息
来源: 评论
Game-based software errors detection
收藏 引用
Advances in Information sciences and Service sciences 2012年 第15期4卷 426-433页
作者: Chen, Jie National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China
Software security is one of the most important aspects of software quality, but errors in programs are still inevitable. Despite the development of static and dynamic analysis, the useful but costly manual analysis is... 详细信息
来源: 评论
Research of Context Situation Awareness technology
Research of Context Situation Awareness Technology
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Dianxi Shi Zhendong Wu Bo Ding Huining Yan National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论