咨询与建议

限定检索结果

文献类型

  • 308 篇 会议
  • 129 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 198 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 49 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 24 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 18 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 力学(可授工学、理...
    • 8 篇 仪器科学与技术
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 核科学与技术
  • 116 篇 理学
    • 71 篇 数学
    • 25 篇 物理学
    • 24 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 5 篇 化学
  • 65 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 16 篇 computational mo...
  • 15 篇 deep learning
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 computer archite...
  • 12 篇 feature extracti...
  • 11 篇 servers
  • 10 篇 scalability
  • 10 篇 clustering algor...
  • 9 篇 task analysis
  • 9 篇 throughput
  • 9 篇 laboratories
  • 9 篇 distributed proc...
  • 9 篇 hardware
  • 9 篇 distributed data...
  • 8 篇 runtime
  • 8 篇 parallel process...
  • 8 篇 fault tolerance

机构

  • 134 篇 science and tech...
  • 51 篇 college of compu...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 10 篇 laboratory of di...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 laboratory of so...
  • 7 篇 college of scien...
  • 6 篇 national laborat...
  • 6 篇 college of compu...

作者

  • 35 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 15 篇 zhigang luo
  • 15 篇 wang yijie
  • 15 篇 peng yuxing
  • 14 篇 qinglin wang
  • 13 篇 naiyang guan
  • 13 篇 zuocheng xing
  • 12 篇 wang huaimin
  • 11 篇 chen xinhai
  • 11 篇 chunye gong
  • 11 篇 kai lu
  • 10 篇 yuxing peng
  • 10 篇 huaimin wang
  • 10 篇 wang qinglin
  • 9 篇 dongsheng li
  • 9 篇 xiaodong wang
  • 9 篇 li dongsheng
  • 9 篇 xuhui huang

语言

  • 412 篇 英文
  • 25 篇 中文
  • 2 篇 其他
检索条件"机构=The Science and Technology on Paraller and Distributed Processing Laboratory"
439 条 记 录,以下是351-360 订阅
排序:
A study of strategies to restrain the C&C activities of structured P2P botnets
A study of strategies to restrain the C&C activities of stru...
收藏 引用
International Conference on Computer sciences and Convergence Information technology (ICCIT)
作者: Tianzuo Wang Bo Liu Huaimin Wang Hao Ren Xiaolong Ma School of Computer Science National Laboratory for Parallel and Distributed Processing National University of Defense and Technology Changsha China
Botnets are threatening the Internet heavily, and more and more botnets are utilizing the P2P technology to build their C&C (Command and Control) mechanisms. Some research have been made to compare the resilience ... 详细信息
来源: 评论
Some critical problems of botnets
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2012年 第6期35卷 1192-1208页
作者: Wang, Tian-Zuo Wang, Huai-Min Liu, Bo Shi, Pei-Chang Institute of Network and Information Security School of Computer Science National University of Defense Technology Changsha 410073 China National Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha 410073 China
As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as sp... 详细信息
来源: 评论
Research of Context Situation Awareness technology
Research of Context Situation Awareness Technology
收藏 引用
IEEE International Symposium on Object/Component/Service-Oriented Real-Time distributed Computing Workshops (ISORCW)
作者: Dianxi Shi Zhendong Wu Bo Ding Huining Yan National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China
Context situation, which means a snapshot of the status of the real world, is formed by integrating a large amount of contexts collected from various resources. How to get the context situation and use the situation t... 详细信息
来源: 评论
Topology-Aware Deployment of Scientific Applications in Cloud Computing
Topology-Aware Deployment of Scientific Applications in Clou...
收藏 引用
IEEE International Conference on Cloud Computing, CLOUD
作者: Pei Fan Zhenbang Chen Ji Wang Zibin Zheng Michael R. Lyu National Laboratory for Parallel & Distributed Processing National University of Defense Technology Changsha P.R.China Dept. of Computer Science & Engineering The Chinese University of Hong Kong Hong Kong China
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to... 详细信息
来源: 评论
Betweenness-based algorithm for a partition scale-free graph
收藏 引用
Chinese Physics B 2011年 第11期20卷 556-564页
作者: 张百达 吴俊杰 唐玉华 周静 National Laboratory for Parallel and Distributed Processing School of ComputersNational University of Defense Technology Department of Computer Science and Technology School of ComputersNational University of Defense Technology
Many real-world networks are found to be scale-free. However, graph partition technology, as a technology capable of parallel computing, performs poorly when scale-free graphs are provided. The reason for this is that... 详细信息
来源: 评论
Speeding up the MATLAB complex networks package using graphic processors
收藏 引用
Chinese Physics B 2011年 第9期20卷 460-467页
作者: 张百达 唐玉华 吴俊杰 李鑫 National laboratory for Parallel and Distributed Processing School of ComputerNational University of Defense Technology Department of Computer Science and Technology School of ComputerNational University of Defense Technology
The availability of computers and communication networks allows us to gather and analyse data on a far larger scale than previously. At present, it is believed that statistics is a suitable method to analyse networks ... 详细信息
来源: 评论
Intention oriented itinerary recommendation by bridging physical trajectories and online social networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 159-168页
作者: Meng, Xiang-Xu Wang, Xiao-Dong Zhou, Xing-Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Human itineraries are often initiated by some general intentions and will be optimized after considering all kinds of constraints and available information. This paper proposes a category-based itinerary recommendatio... 详细信息
来源: 评论
Jammer Localization for Wireless Sensor Networks
收藏 引用
电子学报(英文版) 2011年 第4期20卷 735-738页
作者: SUN Yanqiang WANG Xiaodong ZHOU Xingming National Key Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
Jamming attack can severely affect the performance of Wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, we in this paper propose a jammer ... 详细信息
来源: 评论
Security Issues and Solutions in Cloud Computing
Security Issues and Solutions in Cloud Computing
收藏 引用
International Conference on distributed Computing Systems Workshop
作者: Pengfei You Yuxing Peng Weidong Liu Shoufu Xue National Key Laboratory for Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha China Jiangsu Automation Research Institute Jiangsu China CPLA Air Defence Forces Command Academy Zhengzhou Henan China
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and ... 详细信息
来源: 评论
Research on online failure prediction model and status pretreatment method for exascale system
Research on online failure prediction model and status pretr...
收藏 引用
3rd International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2011
作者: Zhou, Hao Jiang, Yanhuang National Laboratory for Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executin... 详细信息
来源: 评论