咨询与建议

限定检索结果

文献类型

  • 400 篇 会议
  • 169 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 576 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 267 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 47 篇 信息与通信工程
    • 31 篇 生物工程
    • 24 篇 控制科学与工程
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 103 篇 理学
    • 60 篇 数学
    • 33 篇 生物学
    • 14 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 物理学
  • 88 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 4 篇 文学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 virtual machine ...
  • 14 篇 memory managemen...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 61 篇 school of comput...
  • 52 篇 services computi...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 21 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 service computin...
  • 11 篇 cluster and grid...

作者

  • 296 篇 hai jin
  • 189 篇 jin hai
  • 77 篇 xiaofei liao
  • 47 篇 deqing zou
  • 37 篇 song wu
  • 37 篇 liao xiaofei
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 24 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 hu shengshan
  • 21 篇 xuanhua shi
  • 20 篇 ran zheng
  • 19 篇 wu song
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 zhang leo yu

语言

  • 538 篇 英文
  • 28 篇 其他
  • 11 篇 中文
检索条件"机构=China Services Computing Technology and System Lab and Cluster and Grid"
576 条 记 录,以下是231-240 订阅
排序:
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Wei Hu, Shengshan Lu, Jianrong Yu Zhang, Leo Jin, Hai He, Yuanyuan School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab School of Information Technology Deakin University Australia
Federated learning (FL) enables multiple clients to collaboratively train an accurate global model while protecting clients’ data privacy. However, FL is susceptible to Byzantine attacks from malicious participants. ... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
Grace: An Efficient Parallel SPARQL Query system over Large-Scale RDF Data
Grace: An Efficient Parallel SPARQL Query System over Large-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiang Kang Yuying Zhao Pingpeng Yuan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
As a markup language for describing web resources, RDF is often used to represent graph data. SPARQL is a standard query language for RDF data, which is convenient in querying RDF. As RDF data grows rapidly, how to de... 详细信息
来源: 评论
Text-augmented long-term relation dependency learning for knowledge graph representation
收藏 引用
High-Confidence computing 2025年
作者: Quntao Zhu Mengfan Li Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) ... 详细信息
来源: 评论
Dynamic cluster strategy for hierarchical rollback-recovery protocols in MPI HPC applications
Dynamic cluster strategy for hierarchical rollback-recovery ...
收藏 引用
作者: Liao, Xiaofei Zheng, Long Zhang, Binsheng Zhang, Yu Jin, Hai Shi, Xuanhua Lin, Yi Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Computer Science and Technology Civil Aviation University of China Tianjin300300 China
Fault tolerance in parallel computing becomes increasingly important with a significant rise in high-performance computing systems. Coordinated checkpointing and message logging protocols are commonly used fault toler... 详细信息
来源: 评论
Space-Oblivious Compression and Wear Leveling for Non-Volatile Main Memories  36
Space-Oblivious Compression and Wear Leveling for Non-Volati...
收藏 引用
36th International Conference on Massive Storage systems and technology, MSST 2020
作者: Liu, Haikun Ye, Yuanyuan Liao, Xiaofei Jin, Hai Zhang, Yu Jiang, Wenbin He, Bingsheng National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computing National University of Singapore Singapore
Emerging Non-Volatile Main Memory (NVMM) technologies generally feature high density, low energy consumption and cost per bit compared to DRAM. However, the limited write endurance of NVMM poses a significant challeng... 详细信息
来源: 评论
An effective framework for asynchronous incremental graph processing
收藏 引用
Frontiers of Computer Science 2019年 第3期13卷 539-551页
作者: Xinqiao LV Wei XIAO Yu ZHANG Xiaofei LIAO Hai JIN Qiangsheng HUA Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Although many graph processing systems have been proposed, graphs in the real-world are often dynamic. It is important to keep the results of graph computation up-todate. Incremental computation is demonstrated to be ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论