咨询与建议

限定检索结果

文献类型

  • 400 篇 会议
  • 169 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 576 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 267 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 47 篇 信息与通信工程
    • 31 篇 生物工程
    • 24 篇 控制科学与工程
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 103 篇 理学
    • 60 篇 数学
    • 33 篇 生物学
    • 14 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 物理学
  • 88 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 4 篇 文学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 virtual machine ...
  • 14 篇 memory managemen...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 61 篇 school of comput...
  • 52 篇 services computi...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 21 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 service computin...
  • 11 篇 cluster and grid...

作者

  • 296 篇 hai jin
  • 189 篇 jin hai
  • 77 篇 xiaofei liao
  • 47 篇 deqing zou
  • 37 篇 song wu
  • 37 篇 liao xiaofei
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 24 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 hu shengshan
  • 21 篇 xuanhua shi
  • 20 篇 ran zheng
  • 19 篇 wu song
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 zhang leo yu

语言

  • 538 篇 英文
  • 28 篇 其他
  • 11 篇 中文
检索条件"机构=China Services Computing Technology and System Lab and Cluster and Grid"
576 条 记 录,以下是171-180 订阅
排序:
GIDN: A Lightweight Graph Inception Diffusion Network for High-efficient Link Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Zixiao Guo, Yuluo Zhao, Jin Zhang, Yu Yu, Hui Liao, Xiaofei Wang, Biao Yu, Ting National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) model. This model generalizes graph diffusion in different feature spaces, and uses the inception module to avoid the large amount of computations c... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Hyperbit: A Financial Temporal Knowledge Graph Data Storage system
SSRN
收藏 引用
SSRN 2022年
作者: Yuan, Pingpeng Han, Sheng Zang, Shaoqi Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In the field of finance, data has the characteristics of temporal multi-frequency and heterogeneous high dimension, and the traditional knowledge graph is not suitable to express the temporal relation of financial dat... 详细信息
来源: 评论
Expediting Distributed GNN Training with Feature-only Partition and Optimized Communication Planning
Expediting Distributed GNN Training with Feature-only Partit...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Bingqian Du Jun Liu Ziyue Luo Chuan Wu Qiankun Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering The Ohio State University USA Department of Computer Science The University of Hong Kong Hong Kong School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Feature-only partition of large graph data in distributed Graph Neural Network (GNN) training offers advantages over commonly adopted graph structure partition, such as minimal graph preprocessing cost and elimination... 详细信息
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing Data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed computing systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
SocialEdge: Socialized Learning-Based Request Scheduling for Edge-Cloud systems
SocialEdge: Socialized Learning-Based Request Scheduling for...
收藏 引用
International Conference on Distributed computing systems
作者: Ziwei Wang Yunfeng Zhao Chao Qiu Qiang He Xin Wang Xiaofei Wang Qinghua Hu College of Intelligence and Computing Tianjin University Tianjin China Guangdong Laboratory of Artificial Intelligence and DigitalEconomy (SZ) Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
The ability for cloud data centres and edge data centres to collaborate unleashes the potential of the edge-cloud system. However, its sophistication causes unexpected issues in request scheduling, such as Insufficien...
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Network for Segmenting Pathology Lesion of the Focal Lymphocytic Sialadenitis
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Ne...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Hao Han Feng Lu Yanhan Deng Xiaofang Luo Hai Jin Wei Tu Xia Xie National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
In the medical realm, the pivotal role of pathological Whole Slide Images (WSIs) in detecting cancer, tracking disease progression, and evaluating treatment efficacy is indisputable. Nevertheless, the identification a...
来源: 评论
Reconciling Selective Logging and Hardware Persistent Memory Transaction
Reconciling Selective Logging and Hardware Persistent Memory...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Yan Sha Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA University of Central Florida Florida USA
Log creation, maintenance, and its persist ordering are known to be performance bottlenecks for durable transactions on persistent memory. Existing hardware persistent memory transactions overlook an important opportu... 详细信息
来源: 评论