咨询与建议

限定检索结果

文献类型

  • 389 篇 会议
  • 159 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 555 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 348 篇 工学
    • 311 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 60 篇 信息与通信工程
    • 34 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 14 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
  • 118 篇 理学
    • 62 篇 数学
    • 37 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
  • 114 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 43 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 grid computing
  • 24 篇 computational mo...
  • 18 篇 bandwidth
  • 18 篇 servers
  • 17 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 13 篇 computer science
  • 13 篇 memory managemen...
  • 13 篇 semantics
  • 12 篇 virtualization
  • 11 篇 feature extracti...
  • 11 篇 virtual machinin...
  • 10 篇 operating system...
  • 10 篇 deep neural netw...
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 peer to peer com...
  • 9 篇 throughput
  • 9 篇 resource managem...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 55 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 national enginee...
  • 28 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 238 篇 hai jin
  • 237 篇 jin hai
  • 56 篇 xiaofei liao
  • 50 篇 liao xiaofei
  • 38 篇 deqing zou
  • 32 篇 zou deqing
  • 28 篇 song wu
  • 25 篇 wu song
  • 22 篇 haikun liu
  • 22 篇 shi xuanhua
  • 19 篇 hu shengshan
  • 17 篇 long zheng
  • 16 篇 yu zhang
  • 15 篇 ran zheng
  • 15 篇 xuanhua shi
  • 14 篇 jiang xiao
  • 14 篇 liu haikun
  • 13 篇 wan yao
  • 13 篇 zhang leo yu
  • 13 篇 jiang wenbin

语言

  • 528 篇 英文
  • 22 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab"
555 条 记 录,以下是81-90 订阅
排序:
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
KubeSPT: Stateful Pod Teleportation for Service Resilience with Live Migration
收藏 引用
IEEE Transactions on Services computing 2025年
作者: Zhang, Hansheng Wu, Song Fan, Hao Huang, Zhuo Xue, Weibin Yu, Chen Ibrahim, Shadi Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong China
Container orchestration systems, such as Kubernetes, streamline containerized application deployment. As more and more applications are being deployed in Kubernetes, there is an increasing need for rescheduling - relo... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
FedEAT: A Robustness Optimization Framework for Federated LLMs
arXiv
收藏 引用
arXiv 2025年
作者: Pang, Yahao Wu, Xingyuan Zhang, Xiaojin Chen, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Wuhan China
Significant advancements have been made by Large Language Models (LLMs) in the domains of natural language understanding and automated content creation. However, they still face persistent problems, including substant... 详细信息
来源: 评论
FlexiFed: Personalized Federated Learning for Edge Clients with Heterogeneous Model Architectures  23
FlexiFed: Personalized Federated Learning for Edge Clients w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Chen, Chunyang Huang, Faliang Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Information Technology Monash University Australia Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Mobile and Web-of-Things (WoT) devices at the network edge account for more than half of the world's web traffic, making a great data source for various machine learning (ML) applications, particularly federated l... 详细信息
来源: 评论
Efficient distributed algorithms for holistic aggregation functions on random regular graphs
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 32-50页
作者: Lin JIA Qiang-Sheng HUA Haoqiang FAN Qiuping WANG Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology Institute for Interdisciplinary Information Science Tsinghua University
In this paper, we propose efficient distributed algorithms for three holistic aggregation functions on random regular graphs that are good candidates for network topology in next-generation data *** three holistic agg... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
FusionANNS: An Efficient CPU/GPU Cooperative Processing Architecture for Billion-scale Approximate Nearest Neighbor Search
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy f... 详细信息
来源: 评论
ACGraph: Accelerating Streaming Graph Processing via Dependence Hierarchy  23
ACGraph: Accelerating Streaming Graph Processing via Depende...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Zihan Jiang Fubing Mao Yapu Guo Xu Liu Haikun Liu Xiaofei Liao Hai Jin Wei Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electronic and Computer Engineering HKUST Hong Kong
Streaming graph processing needs to timely evaluate continuous queries. Prior systems suffer from massive redundant computations due to the irregular order of processing vertices influenced by updates. To address this... 详细信息
来源: 评论