咨询与建议

限定检索结果

文献类型

  • 400 篇 会议
  • 169 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 576 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 267 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 47 篇 信息与通信工程
    • 31 篇 生物工程
    • 24 篇 控制科学与工程
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 103 篇 理学
    • 60 篇 数学
    • 33 篇 生物学
    • 14 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 7 篇 物理学
  • 88 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 4 篇 文学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 virtual machine ...
  • 14 篇 memory managemen...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 61 篇 school of comput...
  • 52 篇 services computi...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 21 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 service computin...
  • 11 篇 cluster and grid...

作者

  • 296 篇 hai jin
  • 189 篇 jin hai
  • 77 篇 xiaofei liao
  • 47 篇 deqing zou
  • 37 篇 song wu
  • 37 篇 liao xiaofei
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 24 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 hu shengshan
  • 21 篇 xuanhua shi
  • 20 篇 ran zheng
  • 19 篇 wu song
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 zhang leo yu

语言

  • 538 篇 英文
  • 28 篇 其他
  • 11 篇 中文
检索条件"机构=China Services Computing Technology and System Lab and Cluster and Grid"
576 条 记 录,以下是271-280 订阅
排序:
High Performance DDoS Attack Detection system Based on Distribution Statistics  16th
High Performance DDoS Attack Detection System Based on Distr...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Xie, Xia Li, Jinpeng Hu, Xiaoyang Jin, Hai Chen, Hanhua Ma, Xiaojing Huang, Hong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Nowadays, web servers often face the threat of distributed denial of service attacks and their intrusion prevention systems cannot detect those attacks effectively. Many existing intrusion prevention systems detect at... 详细信息
来源: 评论
Failure order: A missing piece in disk failure processing of data centers  21
Failure order: A missing piece in disk failure processing of...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and systems, HPCC/SmartCity/DSS 2019
作者: Yi, Yusheng Xiao, Jiang Wu, Song Li, Huichuwu Jin, Hai National Engineering Research Center for Big Data Technology System Services Computing Technology System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
To avoid data loss, data centers adopt disk failure prediction (DFP) technology to raise warnings ahead of actual disk failures, and process the warnings in the order they are raised, i.e., a first-in-first-out (FIFO)... 详细信息
来源: 评论
Data Anonymization for Big Crowdsourcing Data
Data Anonymization for Big Crowdsourcing Data
收藏 引用
2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
作者: Deng, Xiaofeng Zhang, Fan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In traditional database systems, data anonymization has been extensively studied, it provides an effective solution for data privacy preservation, and multidimensional anonymization scheme among them is widely used. H... 详细信息
来源: 评论
HomDroid: Detecting android covert malware by social-network homophily analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Zou, Deqing Yang, Wei Li, Xiang Jin, Hai Huazhong University of Science and Technology China University of Texas at Dallas United States Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Hust Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hust Wuhan430074 China Shenzhen Hust Research Institute Shenzhen518057 China Cluster and Grid Computing Lab School of Computer Science and Technology Hust Wuhan430074 China
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of mal... 详细信息
来源: 评论
Why Do Developers Remove Lambda Expressions in Java?  21
Why Do Developers Remove Lambda Expressions in Java?
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Mingwei Zheng Jun Yang Ming Wen Hengcheng Zhu Yepang Liu Hai Jin Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Huazhong University of Science and Technology Wuhan China School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China The Hong Kong University of Science and Technology Hong Kong China Southern University of Science and Technology Shenzhen China Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Java 8 has introduced lambda expressions, a core feature of functional programming. Since its introduction, there is an increasing trend of lambda adoptions in Java projects. Developers often adopt lambda expressions ... 详细信息
来源: 评论
Towards Lightweight Serverless computing via Unikernel as a Function
Towards Lightweight Serverless Computing via Unikernel as a ...
收藏 引用
International Workshop on Quality of Service
作者: Bo Tan Haikun Liu Jia Rao Xiaofei Liao Hai Jin Yu Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Texas at Arlington
Serverless computing, also known as “Function as a Service (FaaS)”, is emerging as an event-driven paradigm of cloud computing. In the FaaS model, applications are programmed in the form of functions that are execut... 详细信息
来源: 评论
Spara: An Energy-Efficient ReRAM-Based Accelerator for Sparse Graph Analytics Applications
Spara: An Energy-Efficient ReRAM-Based Accelerator for Spars...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Long Zheng Jieshan Zhao Yu Huang Qinggang Wang Zhen Zeng Jingling Xue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab Huazhong University of Science and Technology China UNSW Sydney Australia
Resistive random access memory (ReRAM) addresses the high memory bandwidth requirement challenge of graph analytics by integrating the computing logic in the memory. Due to the matrix-structured crossbar architecture,... 详细信息
来源: 评论
A Heterogeneous PIM Hardware-Software Co-Design for Energy-Efficient Graph Processing
A Heterogeneous PIM Hardware-Software Co-Design for Energy-E...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Yu Huang Long Zheng Pengcheng Yao Jieshan Zhao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab Huazhong University of Science and Technology China UNSW Sydney Australia
Processing-In-Memory (PIM) is an emerging technology that addresses the memory bottleneck of graph processing. In general, analog memristor-based PIM promises high parallelism provided that the underlying matrix-struc... 详细信息
来源: 评论
Efficient Hardware-Assisted Crash Consistency in Encrypted Persistent Memory
Efficient Hardware-Assisted Crash Consistency in Encrypted P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Zhan Zhang Jianhui Yue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China Computer Science Department Michigan Technological University Houghton Michigan
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on pr... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论