咨询与建议

限定检索结果

文献类型

  • 388 篇 会议
  • 161 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 314 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 64 篇 信息与通信工程
    • 34 篇 生物工程
    • 29 篇 控制科学与工程
    • 28 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 13 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 9 篇 安全科学与工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 建筑学
  • 122 篇 理学
    • 66 篇 数学
    • 37 篇 生物学
    • 19 篇 系统科学
    • 15 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 117 篇 管理学
    • 83 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 24 篇 computational mo...
  • 18 篇 bandwidth
  • 18 篇 servers
  • 17 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 13 篇 computer science
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 virtualization
  • 11 篇 feature extracti...
  • 11 篇 virtual machinin...
  • 10 篇 operating system...
  • 10 篇 deep neural netw...
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 peer to peer com...
  • 9 篇 throughput
  • 9 篇 resource managem...

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 55 篇 school of comput...
  • 43 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 national enginee...
  • 28 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 zhejiang lab
  • 16 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...

作者

  • 241 篇 jin hai
  • 240 篇 hai jin
  • 56 篇 xiaofei liao
  • 52 篇 liao xiaofei
  • 38 篇 deqing zou
  • 32 篇 zou deqing
  • 28 篇 song wu
  • 26 篇 wu song
  • 22 篇 haikun liu
  • 22 篇 shi xuanhua
  • 19 篇 hu shengshan
  • 18 篇 long zheng
  • 17 篇 yu zhang
  • 16 篇 ran zheng
  • 15 篇 xuanhua shi
  • 14 篇 jiang xiao
  • 14 篇 liu haikun
  • 13 篇 zheng long
  • 13 篇 wan yao
  • 13 篇 zhang leo yu

语言

  • 527 篇 英文
  • 24 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab"
556 条 记 录,以下是41-50 订阅
排序:
Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第4期1卷 436-449页
作者: YU Yijiao JIN Hai Services Computing Technology and System Lab Cluster and Grid Computing LabHuazhong University of Science and TechnologyWuhan 430074China
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart o... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
An effective framework for asynchronous incremental graph processing
收藏 引用
Frontiers of Computer Science 2019年 第3期13卷 539-551页
作者: Xinqiao LV Wei XIAO Yu ZHANG Xiaofei LIAO Hai JIN Qiangsheng HUA Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Although many graph processing systems have been proposed, graphs in the real-world are often dynamic. It is important to keep the results of graph computation up-todate. Incremental computation is demonstrated to be ... 详细信息
来源: 评论
PSG: a two-layer graph model for document summarization
收藏 引用
Frontiers of Computer Science 2014年 第1期8卷 119-130页
作者: Heng CHEN Hai JIN Feng ZHAO Service Computing Technology and System Lab & Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Graph model has been widely applied in docu- ment summarization by using sentence as the graph node, and the similarity between sentences as the edge. In this paper, a novel graph model for document summarization is p... 详细信息
来源: 评论
URMG: Enhanced CBMG-Based Method for Automatically Testing Web Applications in the Cloud
收藏 引用
Tsinghua Science and Technology 2014年 第1期19卷 65-75页
作者: Xiaolin Xu Hai Jin Song Wu Lixiang Tang Yihong Wang Services Computing Technology and System Lab and Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalability provided by clouds, a sing... 详细信息
来源: 评论
Sponge:An Oversubscription Strategy Supporting Performance Interference Management in Cloud
收藏 引用
China Communications 2015年 第11期12卷 196-209页
作者: LIU Ying Services Computing Technology and System Lab Cluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Resource oversubscription optimizes the utilization of the computing resources. Many well-known virtual machine monitors(VMMs)such as Xen and KVM,adopt this approach to help maximize the yield of the cloud datacenters... 详细信息
来源: 评论
An adaptive switching scheme for iterative computing in the cloud
收藏 引用
Frontiers of Computer Science 2014年 第6期8卷 872-884页
作者: Yu ZHANG Xiaofei LIAO Hai JIN Li LIN Feng LU Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Delta-based accumulative iterative computation (DAIC) model is currently proposed to support iterative algorithms in a synchronous or an asynchronous way. However, both the synchronous DAIC model and the asynchronou... 详细信息
来源: 评论
Ciphertext-Policy Attribute-Based Encryption with Short Keys
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 655-660页
作者: XU Peng TANG Yong JIANG Wenbin JIN Hai ZOU Deqing Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to red... 详细信息
来源: 评论
FunctionFlow:coordinating parallel tasks
收藏 引用
Frontiers of Computer Science 2019年 第1期13卷 73-85页
作者: Xuepeng FAN Xiaofei LIAO Hai JIN Services Computing Technology and System Lab (SCTS)&Cluster and Grid Computing Lab (CGCL) School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the growing allel programming,nowadays popularity of task-based partask-parallel programming libraries and languages are still with limited support for coordinating parallel *** limitation forces programmers to u... 详细信息
来源: 评论