咨询与建议

限定检索结果

文献类型

  • 400 篇 会议
  • 169 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 576 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 267 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 47 篇 信息与通信工程
    • 31 篇 生物工程
    • 24 篇 控制科学与工程
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 103 篇 理学
    • 60 篇 数学
    • 33 篇 生物学
    • 14 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 物理学
  • 88 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 4 篇 文学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 virtual machine ...
  • 14 篇 memory managemen...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 61 篇 school of comput...
  • 52 篇 services computi...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 21 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 service computin...
  • 11 篇 cluster and grid...

作者

  • 296 篇 hai jin
  • 189 篇 jin hai
  • 77 篇 xiaofei liao
  • 47 篇 deqing zou
  • 37 篇 song wu
  • 37 篇 liao xiaofei
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 24 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 hu shengshan
  • 21 篇 xuanhua shi
  • 20 篇 ran zheng
  • 19 篇 wu song
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 zhang leo yu

语言

  • 538 篇 英文
  • 28 篇 其他
  • 11 篇 中文
检索条件"机构=China Services Computing Technology and System Lab and Cluster and Grid"
576 条 记 录,以下是221-230 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
china in the eyes of news media:a case study under COVID-19 epidemic
收藏 引用
Frontiers of Information technology & Electronic Engineering 2021年 第11期22卷 1443-1457页
作者: Hong HUANG Zhexue CHEN Xuanhua SHI Chenxu WANG Zepeng HE Hai JIN Mingxin ZHANG Zongya LI National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Journalism and Information Communication Huazhong University of Science and TechnologyWuhan430074China
As one of the early COVID-19 epidemic outbreak areas,china attracted the global news media’s attention at the beginning of *** the epidemic period,Chinese people united and actively fought against the ***,in the eyes... 详细信息
来源: 评论
BED: A Block-Level Deduplication-Based Container Deployment Framework  15th
BED: A Block-Level Deduplication-Based Container Deployment ...
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Zhang, Shiqiang Wu, Song Fan, Hao Zou, Deqing Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Scinece and Technology Wuhan430074 China
Container technology has gained great popularity in cloud environment since containers provide near-native performance and are lighter and less expensive than traditional virtual machines. However, starting up a non-l... 详细信息
来源: 评论
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Yao He, Yang Bi, Zhangqian Zhang, Jianguo Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai Yu, Philip S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Simon Fraser University Vancouver Canada School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Salesforce Research United States Chongqing University China University of New South Wales Australia University of Technology Sydney Australia University of Illinois at Chicago Chicago United States
Code intelligence leverages machine learning techniques to extract knowledge from extensive code corpora, with the aim of developing intelligent tools to improve the quality and productivity of computer programming. C... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
Hardware-Supported Remote Persistence for Distributed Persistent Memory
Hardware-Supported Remote Persistence for Distributed Persis...
收藏 引用
Supercomputing Conference
作者: Zhuohui Duan Haodi Lu Haikun Liu Xiaofei Liao Hai Jin Yu Zhang Song Wu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
The advent of Persistent Memory (PM) necessitates an evolution of Remote Direct Memory Access (RDMA) technologies for supporting remote data persistence. Previous software-based solutions require remote CPU interventi... 详细信息
来源: 评论
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assisted Distributed Stream Processing systems
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assis...
收藏 引用
Supercomputing Conference
作者: Jie Tan Hanhua Chen Yonghui Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
To process large-scale real-time data streams, existing distributed stream processing systems (DSPSs) leverage different stream partitioning strategies. The one-to-many data partitioning strategy plays an important ro... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论