咨询与建议

限定检索结果

文献类型

  • 277 篇 会议
  • 134 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 418 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 244 篇 工学
    • 218 篇 计算机科学与技术...
    • 153 篇 软件工程
    • 40 篇 信息与通信工程
    • 29 篇 生物工程
    • 20 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 15 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 8 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
  • 89 篇 理学
    • 47 篇 数学
    • 31 篇 生物学
    • 13 篇 系统科学
    • 10 篇 化学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
  • 69 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 5 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 4 篇 医学
  • 2 篇 农学
  • 1 篇 军事学

主题

  • 21 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 14 篇 bandwidth
  • 13 篇 cloud computing
  • 12 篇 semantics
  • 11 篇 servers
  • 10 篇 deep neural netw...
  • 10 篇 computer archite...
  • 10 篇 feature extracti...
  • 10 篇 data models
  • 9 篇 computer science
  • 9 篇 operating system...
  • 9 篇 memory managemen...
  • 9 篇 virtual machinin...
  • 9 篇 training
  • 8 篇 throughput
  • 8 篇 software enginee...
  • 8 篇 machine learning
  • 8 篇 virtualization

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 9 篇 school of comput...
  • 8 篇 cluster and grid...
  • 8 篇 jinyinhu laborat...

作者

  • 184 篇 hai jin
  • 165 篇 jin hai
  • 42 篇 xiaofei liao
  • 31 篇 deqing zou
  • 31 篇 liao xiaofei
  • 23 篇 zou deqing
  • 20 篇 song wu
  • 19 篇 hu shengshan
  • 18 篇 haikun liu
  • 18 篇 shi xuanhua
  • 17 篇 wu song
  • 14 篇 jiang xiao
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 13 篇 ran zheng
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 xia xie
  • 11 篇 zhang hongyu

语言

  • 396 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services"
418 条 记 录,以下是171-180 订阅
排序:
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
Fine-grained Scheduling in FPGA-Based Convolutional Neural Networks  5
Fine-grained Scheduling in FPGA-Based Convolutional Neural N...
收藏 引用
5th IEEE International Conference on Cloud computing and Big Data Analytics, ICCCBDA 2020
作者: Zhang, Wei Liao, Xiaofei Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China
FPGA has been considered as a promising solution to accelerate Convolutional Neural Networks (CNNs) for its excellent performance in energy efficiency and programmability. However, prior designs are usually designed f... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Hardware-Supported Remote Persistence for Distributed Persistent Memory
Hardware-Supported Remote Persistence for Distributed Persis...
收藏 引用
Supercomputing Conference
作者: Zhuohui Duan Haodi Lu Haikun Liu Xiaofei Liao Hai Jin Yu Zhang Song Wu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
The advent of Persistent Memory (PM) necessitates an evolution of Remote Direct Memory Access (RDMA) technologies for supporting remote data persistence. Previous software-based solutions require remote CPU interventi... 详细信息
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assisted Distributed Stream Processing Systems
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assis...
收藏 引用
Supercomputing Conference
作者: Jie Tan Hanhua Chen Yonghui Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
To process large-scale real-time data streams, existing distributed stream processing systems (DSPSs) leverage different stream partitioning strategies. The one-to-many data partitioning strategy plays an important ro... 详细信息
来源: 评论
An Efficient Data Prefetch Strategy for Deep Learning Based on Non-volatile Memory  15th
An Efficient Data Prefetch Strategy for Deep Learning Based ...
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Jiang, Wenbin Liu, Pai Jin, Hai Peng, Jing National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning (DL) systems usually utilize asynchronous prefetch to improve data reading performance. However, the efficiency of the data transfer path from hard disk to DRAM is still limited by disk performance. The ... 详细信息
来源: 评论
BED: A Block-Level Deduplication-Based Container Deployment Framework  15th
BED: A Block-Level Deduplication-Based Container Deployment ...
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Zhang, Shiqiang Wu, Song Fan, Hao Zou, Deqing Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Scinece and Technology Wuhan430074 China
Container technology has gained great popularity in cloud environment since containers provide near-native performance and are lighter and less expensive than traditional virtual machines. However, starting up a non-l... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论