咨询与建议

限定检索结果

文献类型

  • 308 篇 会议
  • 129 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 198 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 49 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 24 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 18 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 力学(可授工学、理...
    • 8 篇 仪器科学与技术
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 核科学与技术
  • 116 篇 理学
    • 71 篇 数学
    • 25 篇 物理学
    • 24 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 5 篇 化学
  • 65 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 16 篇 computational mo...
  • 15 篇 deep learning
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 computer archite...
  • 12 篇 feature extracti...
  • 11 篇 servers
  • 10 篇 scalability
  • 10 篇 clustering algor...
  • 9 篇 task analysis
  • 9 篇 throughput
  • 9 篇 laboratories
  • 9 篇 distributed proc...
  • 9 篇 hardware
  • 9 篇 distributed data...
  • 8 篇 runtime
  • 8 篇 parallel process...
  • 8 篇 fault tolerance

机构

  • 134 篇 science and tech...
  • 51 篇 college of compu...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 10 篇 laboratory of di...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 laboratory of so...
  • 7 篇 college of scien...
  • 6 篇 national laborat...
  • 6 篇 college of compu...

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 15 篇 zhigang luo
  • 15 篇 wang yijie
  • 15 篇 peng yuxing
  • 14 篇 qinglin wang
  • 13 篇 naiyang guan
  • 13 篇 zuocheng xing
  • 12 篇 wang huaimin
  • 11 篇 chen xinhai
  • 11 篇 chunye gong
  • 11 篇 kai lu
  • 10 篇 yuxing peng
  • 10 篇 huaimin wang
  • 10 篇 wang qinglin
  • 9 篇 dongsheng li
  • 9 篇 xiaodong wang
  • 9 篇 li dongsheng
  • 9 篇 xuhui huang

语言

  • 412 篇 英文
  • 25 篇 中文
  • 2 篇 其他
检索条件"机构=The Science and Technology on Paraller and Distributed Processing Laboratory"
439 条 记 录,以下是231-240 订阅
排序:
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples
WBA: A Warping-based Approach to Generating Imperceptible Ad...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chengyao Hua Shigeng Zhang Weiping Wang Zhankai Li Jian Zhang School of Computer Science and Engineering Central South University Changsha China Science and Technology on Parallel and Distributed Processing Laboratory (PDL)
The human can easily recognize the incongruous parts of an image, for example, perturbations unrelated to the image itself, but are poor at spotting the small geometric transformations. However, in terms of the robust... 详细信息
来源: 评论
Versatile Stack Management for Multitasking Sensor Networks
Versatile Stack Management for Multitasking Sensor Networks
收藏 引用
IEEE International Conference on distributed Computing Systems
作者: Rui Chu Lin Gu Yunhao Liu Mo Li Xicheng Lu National Laboratory for Parallel and Distributed Processing National University of Defense Technology Department of Computer Science and Engineering Hong Kong University of Science and Technology
The networked application environment has motivated the development of multitasking operating systems for sensor networks and other low-power electronic devices, but their multitasking capability is severely limited b... 详细信息
来源: 评论
Fast query over encrypted data based on B+ tree
Fast query over encrypted data based on B+ tree
收藏 引用
2009 International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2009
作者: Wang, Zheng-Fei Tang, Ai-Guo Wang, Wei Department of Computer Hunan Business College Changsha 410205 China National Key Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha 410073 China School of Computer Science Fudan University Shanghai 200433 China
There are a lot of important and sensitive data in databases, which need to be protected from attacks. To secure the data, Cryptography support is an effective mechanism. However, a tradeoff must be made between the p... 详细信息
来源: 评论
Two-dimensional euler PCA for face recognition  21
Two-dimensional euler PCA for face recognition
收藏 引用
21st International Conference on MultiMedia Modeling, MMM 2015
作者: Tan, Huibin Zhang, Xiang Guan, Naiyang Tao, Dacheng Huang, Xuhui Luo, Zhigang Science and Technology on Parallel Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan410073 China Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan410073 China Centre for Quantum Computation and Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology Sydney 235 Jones Street UltimoNSW2007 Australia
Principal component analysis (PCA) projects data on the directions with maximal variances. Since PCA is quite effective in dimension reduction, it has been widely used in computer vision. However, conventional PCA suf... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms  14
Feature and Performance Comparison of FaaS Platforms
收藏 引用
14th IEEE International Conference on Software Engineering and Service science, ICSESS 2023
作者: Ma, Penghui Shi, Peichang Yi, Guodong College of Computer Science National University of Defense Technology National Key Laboratory of Parallel and Distributed Processing Changsha410073 China College of Computer Science National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems Changsha410073 China Xiangjiang Lab Changsha410073 China School of Advanced Interdisciplinary Studies Hunan University of Technology and Business Changsha410073 China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove... 详细信息
来源: 评论
Non-negative low-rank and group-sparse matrix factorization  21
Non-negative low-rank and group-sparse matrix factorization
收藏 引用
21st International Conference on MultiMedia Modeling, MMM 2015
作者: Wu, Shuyi Zhang, Xiang Guan, Naiyang Tao, Dacheng Huang, Xuhui Luo, Zhigang Science and Technology on Parallel Distributed Processing Laboratory College of Computer National University of Defense Technology Changsha Hunan410073 China Department of Computer Science and Technology College of Computer National University of Defense Technology Changsha Hunan410073 China Centre for Quantum Computation & Intelligent Systems and the Faculty of Engineering and Information Technology University of Technology Sydney 235 Jones Street UltimoNSW2007 Australia
Non-negative matrix factorization (NMF) has been a popular data analysis tool and has been widely applied in computer vision. However, conventional NMF methods cannot adaptively learn grouping structure froma *** pape... 详细信息
来源: 评论
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffi...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Xin Wang Shuhui Chen Jinshu Su College of Computer Science and Technology National University of Defense Technology National Key Laboratory for Parallel and Distributed Processing National University of Defense Technology
With the exponential growth of mobile traffic data, mobile traffic classification is in a great need. It is an essential step to improve the performance of network services such as QoS and security monitoring. However... 详细信息
来源: 评论
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server
DaBA: Data-free Backdoor Attack against Federated Learning v...
收藏 引用
Image processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Kuiqi Chen Liming Fang Mengxin Wang Changchun Yin College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China
Current research shows that the privacy of FL is threatened by an honest-but-curious server. However, existing research focus on privacy attacks against the malicious server while overlooking that it could also compro...
来源: 评论
MIX: A Joint Learning Framework for Detecting Both Clustered and Scattered Outliers in Mixed-Type Data
MIX: A Joint Learning Framework for Detecting Both Clustered...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Hongzuo Xu Yijie Wang Yongjun Wang Zhiyue Wu National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China
Mixed-type data are pervasive in real life, but very limited outlier detection methods are available for these data. Some existing methods handle mixed-type data by feature converting, whereas their performance is dow...
来源: 评论
A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications
A Discrete Data Dividing Approach for Erasure-Code-Based Sto...
收藏 引用
2014 IEEE 8th International Symposium on Service Oriented System Engineering
作者: Weidong Sun Yijie Wang Yongquan Fu Xiaoqiang Pei Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha Hunan P. R. China
Erasure codes are promising for improving the reliability of the storage system due to its space efficiency compared to the replication methods. Traditional erasure codes split data into equalsized data blocks and enc... 详细信息
来源: 评论