咨询与建议

限定检索结果

文献类型

  • 2,671 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 2,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,271 篇 工学
    • 1,386 篇 计算机科学与技术...
    • 656 篇 软件工程
    • 321 篇 控制科学与工程
    • 247 篇 机械工程
    • 221 篇 电子科学与技术(可...
    • 197 篇 仪器科学与技术
    • 168 篇 网络空间安全
    • 139 篇 信息与通信工程
    • 64 篇 材料科学与工程(可...
    • 53 篇 力学(可授工学、理...
    • 43 篇 动力工程及工程热...
    • 34 篇 光学工程
    • 34 篇 交通运输工程
    • 31 篇 航空宇航科学与技...
    • 26 篇 电气工程
    • 24 篇 化学工程与技术
    • 23 篇 地质资源与地质工...
    • 21 篇 建筑学
  • 553 篇 管理学
    • 536 篇 管理科学与工程(可...
  • 513 篇 理学
    • 269 篇 数学
    • 98 篇 物理学
    • 46 篇 系统科学
    • 29 篇 生物学
  • 87 篇 医学
    • 78 篇 临床医学
  • 37 篇 军事学
    • 36 篇 军队指挥学
  • 33 篇 农学
  • 27 篇 经济学
    • 26 篇 应用经济学
  • 27 篇 教育学
    • 25 篇 教育学
  • 27 篇 艺术学
    • 22 篇 设计学(可授艺术学...
  • 24 篇 文学
    • 19 篇 外国语言文学
  • 22 篇 法学
    • 22 篇 社会学
  • 10 篇 哲学
  • 2 篇 历史学

主题

  • 99 篇 cloud computing
  • 92 篇 parallel computi...
  • 73 篇 deep learning
  • 72 篇 computing
  • 65 篇 machine learning
  • 63 篇 parallel
  • 39 篇 cloud
  • 36 篇 gpu
  • 32 篇 data
  • 30 篇 edge computing
  • 29 篇 internet of thin...
  • 29 篇 security
  • 29 篇 algorithm
  • 26 篇 simulation
  • 26 篇 big data
  • 26 篇 blockchain
  • 26 篇 software
  • 25 篇 optimization
  • 24 篇 performance
  • 24 篇 network

机构

  • 33 篇 university of ch...
  • 25 篇 university of ch...
  • 19 篇 shanghai key lab...
  • 19 篇 institute of com...
  • 18 篇 trusted computin...
  • 18 篇 shanghai key lab...
  • 17 篇 ieee
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 16 篇 college of compu...
  • 16 篇 department of co...
  • 16 篇 state key labora...
  • 15 篇 state key labora...
  • 14 篇 school of comput...
  • 14 篇 riphah school of...
  • 13 篇 state key labora...
  • 13 篇 state key labora...
  • 12 篇 jiangsu collabor...
  • 11 篇 department of co...

作者

  • 21 篇 muhammad adnan k...
  • 18 篇 wei li
  • 16 篇 sagheer abbas
  • 16 篇 fei-yue wang
  • 14 篇 muhammad waseem ...
  • 13 篇 hai jin
  • 12 篇 qi liu
  • 12 篇 tao wang
  • 12 篇 陈勇
  • 12 篇 xiaolong xu
  • 12 篇 wei wang
  • 11 篇 huaimin wang
  • 10 篇 gang yin
  • 10 篇 xin liu
  • 10 篇 yong chen
  • 10 篇 xiaodong liu
  • 10 篇 dengguo feng
  • 9 篇 yuefei sui
  • 9 篇 jun li
  • 9 篇 taher m.ghazal

语言

  • 2,570 篇 英文
  • 214 篇 中文
检索条件"机构=Laboratory of Parallel Software and Computing Science"
2784 条 记 录,以下是11-20 订阅
排序:
RepoLike: a multi-feature-based personalized recommendation approach for open-source repositories
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第2期20卷 222-237页
作者: Cheng YANG Qiang FAN Tao WANG Gang YIN Xun-hui ZHANG Yue YU Hua-min WANG Key laboratory of parallel and Distributed computing National University of Defense Technology
With the deep integration of software collaborative development and social networking, social coding represents a new style of software production and creation paradigm. Because of their good flexibility and openness,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Jacobi-Sobolev Orthogonal Polynomialsand Spectral Methods for Elliptic Boundary Value Problems
收藏 引用
Communications on Applied Mathematics and Computation 2019年 第2期1卷 283-308页
作者: Xuhong Yu Zhongqing Wang Huiyuan Li University of Shanghai for science and Technology Shanghai 200093China State Key laboratory of Computer science/laboratory of parallel computing Institute of SoftwareChinese Academy of SciencesBeijing 100190China
Generalized Jacobi polynomials with indexes α,β∈ R are introduced and some basic properties are established. As examples of applications,the second- and fourth-order elliptic boundary value problems with Dirichlet ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Diffusion and Security Evaluation of Feistel-PG
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 734-739页
作者: WANG Yanfeng WU Wenling ZHANG Lei Trusted computing and Information Assurance laboratory Institute of Software Graduate University of Chinese Academy of sciences State Key laboratory of Computer science Institute of Software
Feistel-PG structure is a new specific Generalized Feistel structure(GFS) adopted in DBlock and LHash. Its main feature is adding a sbox-size permutation before the round function. Different choices of the permutation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Social media in Git Hub: the role of @-mention in assisting software development
收藏 引用
science China(Information sciences) 2017年 第3期60卷 50-67页
作者: Yang ZHANG Huaimin WANG Gang YIN Tao WANG Yue YU Key laboratory of parallel and Distributed computing College of ComputerNational University of Defense Technology
Recently, many researches propose that social media tools can promote the collaboration among developers, which are beneficial to the software development. Nevertheless, there is little empirical evidence to confirm t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel anti-detection criterion for covert storage channel threat estimation
收藏 引用
science China(Information sciences) 2018年 第4期61卷 212-214页
作者: Chong WANG Changyou ZHANG Bin WU Yu'an TAN Yongji WANG University of Chinese Academy of sciences Cooperative Innovation Center Institute of Software Chinese Academy of Sciences State Key laboratory of Computer science Institute of Software Chinese Academy of Sciences laboratory of parallel software and Computational science Institute of Software Chinese Academy of Sciences
Covert(storage)channels[1]are widely considered a main threat[2]to multilevel secure systems,e.g.,desktop operating *** estimation,as an important part of covert channel analysis,must be included in the security analy... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
ON MAXIMA OF DUAL FUNCTION OF THE CDT SUBPROBLEM
收藏 引用
Journal of Computational Mathematics 2001年 第2期19卷 113-124页
作者: Xiong-da Chen Ya-xiang Yuan Reserach Development Center of parallel software Institute of SoftwareBeijing 100080China State Key laboratory of Scientific and Engineering computing Institute of Computational Mathematics and Ssientific/Engineering ComputingAcademy of Mathematics and Systems SciencesChinese Academy of SciencesBeijing 100080China
Focuses on a study which determined the geometry meaning of the maxima of the CDT mathematical subproblem's dual function. Properties of trust region subproblem; Approximation of the CDT feasible region; Relations bet... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第7期140卷 363-383页
作者: Liang Chen Jingbo Zhang Linjie Wu Xingjuan Cai Yubin Xu Shanxi Key laboratory of Big Data Analysis and parallel computing Taiyuan University of Science and TechnologyTaiyuan030024China School of State Key laboratory of Novel software Technology Nanjing UniversityNanjing210008China
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The DBlock family of block ciphers
收藏 引用
science China(Information sciences) 2015年 第3期58卷 91-104页
作者: WU WenLing ZHANG Lei YU XiaoLi Trusted computing and Information Assurance laboratory Institute of SoftwareChinese Academy of Sciences State Key laboratory of Computer science Institute of Software Chinese Academy of Sciences
In this paper,we propose a new family of block ciphers named *** consists of three variants which are specified as DBlock-128,DBlock-192,and DBlock-256,***-n has the equal n-bit block length and key *** structure of D... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
vSpec: workload-adaptive operating system specialization for virtual machines in cloud computing
收藏 引用
science China(Information sciences) 2016年 第9期59卷 47-62页
作者: Xinkui ZHAO Jianwei YIN Zuoning CHEN Sheng HE College of Computer science Zhejiang University National parallel computing Engineering Research Center Jiangnan Institute of computing Technology
In general, operating systems(OSs) are designed to mediate access to device hardware by applications. They process different kinds of system calls using an indiscriminate kernel with the same *** in cloud computing pl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Universally composable anonymous password authenticated key exchange
收藏 引用
science China(Information sciences) 2017年 第5期60卷 153-168页
作者: Xuexian HU Jiang ZHANG Zhenfeng ZHANG Jing XU Trusted computing and Information Assurance laboratory Institute of SoftwareChinese Academy of Sciences State Key laboratory of Mathematical Engineering and Advanced computing science and Technology on Information Assurance laboratory State Key laboratory of Cryptology
Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through which a client holding a password can establish a session key with a server both authentically and anonymously. Alt... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论