咨询与建议

限定检索结果

文献类型

  • 389 篇 会议
  • 159 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 555 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 348 篇 工学
    • 311 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 60 篇 信息与通信工程
    • 34 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
  • 118 篇 理学
    • 62 篇 数学
    • 37 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
  • 114 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 24 篇 computational mo...
  • 18 篇 bandwidth
  • 18 篇 servers
  • 17 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 13 篇 computer science
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 virtualization
  • 11 篇 feature extracti...
  • 11 篇 virtual machinin...
  • 10 篇 operating system...
  • 10 篇 deep neural netw...
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 peer to peer com...
  • 9 篇 throughput
  • 9 篇 resource managem...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 55 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 national enginee...
  • 28 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 238 篇 hai jin
  • 237 篇 jin hai
  • 56 篇 xiaofei liao
  • 50 篇 liao xiaofei
  • 38 篇 deqing zou
  • 32 篇 zou deqing
  • 28 篇 song wu
  • 25 篇 wu song
  • 22 篇 haikun liu
  • 22 篇 shi xuanhua
  • 19 篇 hu shengshan
  • 17 篇 long zheng
  • 16 篇 yu zhang
  • 15 篇 ran zheng
  • 15 篇 xuanhua shi
  • 14 篇 jiang xiao
  • 14 篇 liu haikun
  • 13 篇 wan yao
  • 13 篇 zhang leo yu
  • 13 篇 jiang wenbin

语言

  • 528 篇 英文
  • 22 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab"
555 条 记 录,以下是261-270 订阅
排序:
Data Anonymization for Big Crowdsourcing Data
Data Anonymization for Big Crowdsourcing Data
收藏 引用
2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
作者: Deng, Xiaofeng Zhang, Fan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In traditional database systems, data anonymization has been extensively studied, it provides an effective solution for data privacy preservation, and multidimensional anonymization scheme among them is widely used. H... 详细信息
来源: 评论
Failure order: A missing piece in disk failure processing of data centers  21
Failure order: A missing piece in disk failure processing of...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Yi, Yusheng Xiao, Jiang Wu, Song Li, Huichuwu Jin, Hai National Engineering Research Center for Big Data Technology System Services Computing Technology System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
To avoid data loss, data centers adopt disk failure prediction (DFP) technology to raise warnings ahead of actual disk failures, and process the warnings in the order they are raised, i.e., a first-in-first-out (FIFO)... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Automatically derived stateful network functions including non-field attributes
Automatically derived stateful network functions including n...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Bin Yuan Shengyao Sun Xianjun Deng Deqing Zou Haoyu Chen Shenghui Li Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Research Institute Huazhong University of Science and Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab
The modern network consists of thousands of network devices from different suppliers that perform distinct code-pendent functions, such as routing, switching, modifying header fields, and access control across physica... 详细信息
来源: 评论
Towards Lightweight Serverless computing via Unikernel as a Function
Towards Lightweight Serverless Computing via Unikernel as a ...
收藏 引用
International Workshop on Quality of Service
作者: Bo Tan Haikun Liu Jia Rao Xiaofei Liao Hai Jin Yu Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Texas at Arlington
Serverless computing, also known as “Function as a Service (FaaS)”, is emerging as an event-driven paradigm of cloud computing. In the FaaS model, applications are programmed in the form of functions that are execut... 详细信息
来源: 评论
Efficient subgraph search on large anonymized graphs
Efficient subgraph search on large anonymized graphs
收藏 引用
作者: Ding, Xiaofeng Ou, Yangling Jia, Jianhong Jin, Hai Liu, Jixue Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information Technology & Mathematical Sciences University of South Australia Adelaide Australia
Graph is one of the most important data structures to model social networks and becomes popular to find interesting relationships between individuals. Since graphs may contain sensitive information, data curators usua... 详细信息
来源: 评论
iGniter: Interference-Aware GPU Resource Provisioning for Predictable DNN Inference in the Cloud
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fei Xu, Jianian Chen, Jiabin Chen, Li Shang, Ruitao Zhou, Zhi Liu, Fangming The Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University 3663 N. Zhongshan Road Shanghai200062 China The School of Computing and Informatics University of Louisiana at Lafayette 301 East Lewis Street LafayetteLA70504 United States The Guangdong Key Laboratory of Big Data Analysis and Processing School of Computer Science and Engineering Sun Yat-sen University 132 E. Waihuan Road Guangzhou510006 China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl... 详细信息
来源: 评论
Efficient Hardware-Assisted Crash Consistency in Encrypted Persistent Memory
Efficient Hardware-Assisted Crash Consistency in Encrypted P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Zhan Zhang Jianhui Yue Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China Computer Science Department Michigan Technological University Houghton Michigan
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on pr... 详细信息
来源: 评论
A Locality-Aware Energy-Efficient Accelerator for Graph Mining Applications
A Locality-Aware Energy-Efficient Accelerator for Graph Mini...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Pengcheng Yao Long Zheng Zhen Zeng Yu Huang Chuangyi Gui Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering UNSW Sydney Australia
Graph mining is becoming increasingly important due to the ever-increasing demands on analyzing complex structures in graphs. Existing graph accelerators typically hold most of the randomly-accessed data in an on-chip... 详细信息
来源: 评论
HomDroid: Detecting android covert malware by social-network homophily analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Zou, Deqing Yang, Wei Li, Xiang Jin, Hai Huazhong University of Science and Technology China University of Texas at Dallas United States Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Hust Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hust Wuhan430074 China Shenzhen Hust Research Institute Shenzhen518057 China Cluster and Grid Computing Lab School of Computer Science and Technology Hust Wuhan430074 China
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of mal... 详细信息
来源: 评论