咨询与建议

限定检索结果

文献类型

  • 308 篇 会议
  • 129 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 工学
    • 198 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 49 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 24 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 18 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 力学(可授工学、理...
    • 8 篇 仪器科学与技术
    • 7 篇 农业工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 核科学与技术
  • 116 篇 理学
    • 71 篇 数学
    • 25 篇 物理学
    • 24 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 5 篇 化学
  • 65 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 农学
    • 7 篇 作物学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 16 篇 computational mo...
  • 15 篇 deep learning
  • 15 篇 training
  • 14 篇 benchmark testin...
  • 14 篇 algorithm design...
  • 14 篇 cloud computing
  • 13 篇 computer archite...
  • 12 篇 feature extracti...
  • 11 篇 servers
  • 10 篇 scalability
  • 10 篇 clustering algor...
  • 9 篇 task analysis
  • 9 篇 throughput
  • 9 篇 laboratories
  • 9 篇 distributed proc...
  • 9 篇 hardware
  • 9 篇 distributed data...
  • 8 篇 runtime
  • 8 篇 parallel process...
  • 8 篇 fault tolerance

机构

  • 134 篇 science and tech...
  • 51 篇 college of compu...
  • 23 篇 national laborat...
  • 22 篇 science and tech...
  • 16 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 10 篇 laboratory of di...
  • 9 篇 national laborat...
  • 8 篇 school of comput...
  • 8 篇 national key lab...
  • 7 篇 national univers...
  • 7 篇 department of co...
  • 7 篇 national laborat...
  • 7 篇 college of compu...
  • 7 篇 laboratory of so...
  • 7 篇 college of scien...
  • 6 篇 national laborat...
  • 6 篇 college of compu...

作者

  • 36 篇 liu jie
  • 32 篇 jie liu
  • 19 篇 yijie wang
  • 15 篇 zhigang luo
  • 15 篇 wang yijie
  • 15 篇 peng yuxing
  • 14 篇 qinglin wang
  • 13 篇 naiyang guan
  • 13 篇 zuocheng xing
  • 13 篇 wang huaimin
  • 12 篇 kai lu
  • 11 篇 chen xinhai
  • 11 篇 chunye gong
  • 10 篇 yuxing peng
  • 10 篇 huaimin wang
  • 10 篇 wang qinglin
  • 9 篇 dongsheng li
  • 9 篇 xiaodong wang
  • 9 篇 li dongsheng
  • 9 篇 xuhui huang

语言

  • 412 篇 英文
  • 25 篇 中文
  • 2 篇 其他
检索条件"机构=The Science and Technology on Paraller and Distributed Processing Laboratory"
439 条 记 录,以下是401-410 订阅
排序:
Intention oriented itinerary recommendation by bridging physical trajectories and online social networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 159-168页
作者: Meng, Xiang-Xu Wang, Xiao-Dong Zhou, Xing-Ming National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha 410073 China
Human itineraries are often initiated by some general intentions and will be optimized after considering all kinds of constraints and available information. This paper proposes a category-based itinerary recommendatio... 详细信息
来源: 评论
Research and application of Transformer based anomaly detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Transformer, as one of the most advanced neural network models in Natural Language processing (NLP), exhibits diverse applications in the field of anomaly detection. To inspire research on Transformer-based anomaly de... 详细信息
来源: 评论
Research and application of artificial intelligence based webshell detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Webshell, as the"culprit" behind numerous network attacks, is one of the research hotspots in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of webshells pose signifi... 详细信息
来源: 评论
An Energy-Efficient Scheduling Algorithm for Sporadic Real-Time Tasks in Multiprocessor Systems
An Energy-Efficient Scheduling Algorithm for Sporadic Real-T...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Dong-Song Zhang Fang-Yuan Chen Hong-Hua Li Shi-Yao Jin De-Ke Guo National Laboratory for Parallel and Distributed Processing School of Computer National University of Defense Technology Changsha China School of Computing Science Simon Fraser University Burnaby BC Canada National Laboratory for Information System Engineering School of Information Systems and Management National University of Defense Technology Changsha China
As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, the real-time energy-efficient scheduling in multiprocessor systems becomes an urgent problem to reduce the system energy co... 详细信息
来源: 评论
Feature and Performance Comparison of FaaS Platforms
Feature and Performance Comparison of FaaS Platforms
收藏 引用
IEEE International Conference on Software Engineering and Service sciences (ICSESS)
作者: Penghui Ma Peichang Shi Guodong Yi National Key Laboratory of Parallel and Distributed Processing College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China Xiangjiang Lab Changsha China School of Advanced Interdisciplinary Studies Hunan University Of Technology and Business Changsha China
With serverless computing offering more efficient and cost-effective application deployment, the diversity of serverless platforms presents challenges to users, including platform lock-in and costly migration. Moreove...
来源: 评论
RTC: Link schedule based MAC design in multi-hop wireless network
RTC: Link schedule based MAC design in multi-hop wireless ne...
收藏 引用
International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE)
作者: Xuan Dong Yinjia Huo Chunsheng Zhu Shaohe Lv Wenxiang Li Xiaodong Wang Department of Electrical and Computer Engineering The University of British Columbia Vancouver BC Canada National Laboratory of Parallel and Distributed Processing National University of Defense Technology Changsha China Engineering Research Center for Metallurgical Automation and Detecting Technology of Ministry of Education Wuhan University of Science and Technology Wuhan China
The performance of an ad-hoc network is greatly limited by collisions due to hidden terminals. In this paper, we propose a receiver tracking contention (RTC) scheme, which achieves high throughput by allowing the rece... 详细信息
来源: 评论
The robot software communications architecture (RSCA): embedded middleware for networked service robots  06
The robot software communications architecture (RSCA): embed...
收藏 引用
International Symposium on Parallel and distributed processing (IPDPS)
作者: Seongsoo Hong Jaesoo Lee Hyeonsang Eom Gwangil Jeon Real-Time Operation Systems Laboratory School of Electrical Engineering and Computer Science Seoul National University of Technology Seoul South Korea Distributed Information Processing Laboratory School of Computer Science and Computer Engineering Seoul National University of Technology Seoul South Korea Department of Computer Engineering Korea Polytechnic University Siheung Gyeonggi South Korea
In this paper, we present a robot middleware technology named robot software communications architecture (RSCA) for its use in networked home service robots. The RSCA provides a standard operating environment for the ... 详细信息
来源: 评论
Trace Bench: An Open Data Set for Trace-Oriented Monitoring
Trace Bench: An Open Data Set for Trace-Oriented Monitoring
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Jingwen Zhou Zhenbang Chen Ji Wang Zibin Zheng Michael R. Lyu College of Computer National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha China Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-orie... 详细信息
来源: 评论
Symmetric Non-negative Matrix Factorization Based Link Partition Method for Overlapping Community Detection
Symmetric Non-negative Matrix Factorization Based Link Parti...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiang Zhang Naiyang Guan Wenju Zhang Xuhui Huang Shuyi Wu Zhigang Luo Science and Technology on Parallel and Distributed Processing Laboratory College of Computer National University of Defense Technology Hunan P.R. China Institute of Software College of Computer National University of Defense Technology Hunan P.R. China Department of Computer Science and Technology College of Computer National University of Defense Technology Hunan P.R. China
Partitioning links rather than nodes is effective in overlapping community detection (OCD) on complex networks. However, it consumes high CPU and memory overheads because the volume of links is huge especially when th... 详细信息
来源: 评论
Realization and optimization DGEMM on ARMv8 64-bit multi-core processor
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 37-43页
作者: Jiang, Hao Wang, Feng Zuo, Ke Li, Kuan Yang, Can-Qun College of Computer Science National University of Defense Technology Changsha410073 China Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Changsha410073 China
The double-precision matrix-matrix multiplication (DGEMM) on ARMv8 64-bit multi-core processor architecture was realized and optimized, and the optimal model for the purpose of maximizing the compute-to-memory access ... 详细信息
来源: 评论