咨询与建议

限定检索结果

文献类型

  • 482 篇 会议
  • 184 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 673 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 345 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 生物工程
    • 28 篇 控制科学与工程
    • 27 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 土木工程
  • 126 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 125 篇 理学
    • 67 篇 数学
    • 39 篇 生物学
    • 21 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 19 篇 法学
    • 12 篇 社会学
    • 7 篇 法学
  • 11 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 文学
  • 4 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 33 篇 virtual machinin...
  • 30 篇 servers
  • 27 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 25 篇 bandwidth
  • 23 篇 cloud computing
  • 22 篇 scalability
  • 22 篇 computer archite...
  • 20 篇 resource managem...
  • 20 篇 computers
  • 19 篇 kernel
  • 19 篇 hardware
  • 18 篇 protocols
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 15 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...

作者

  • 332 篇 hai jin
  • 240 篇 jin hai
  • 83 篇 xiaofei liao
  • 55 篇 deqing zou
  • 51 篇 liao xiaofei
  • 40 篇 song wu
  • 32 篇 zou deqing
  • 27 篇 shi xuanhua
  • 27 篇 wu song
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 25 篇 xuanhua shi
  • 22 篇 ran zheng
  • 19 篇 qin zhang
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 638 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services Computing Technology"
673 条 记 录,以下是191-200 订阅
排序:
Dynamic cluster strategy for hierarchical rollback-recovery protocols in MPI HPC applications
Dynamic cluster strategy for hierarchical rollback-recovery ...
收藏 引用
作者: Liao, Xiaofei Zheng, Long Zhang, Binsheng Zhang, Yu Jin, Hai Shi, Xuanhua Lin, Yi Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Computer Science and Technology Civil Aviation University of China Tianjin300300 China
Fault tolerance in parallel computing becomes increasingly important with a significant rise in high-performance computing systems. Coordinated checkpointing and message logging protocols are commonly used fault toler... 详细信息
来源: 评论
ES-Mask: Evolutionary Strip Mask for Explaining Time Series Prediction  37
ES-Mask: Evolutionary Strip Mask for Explaining Time Series ...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Sun, Yifei Song, Cheng Lu, Feng Li, Wei Jin, Hai Zomaya, Albert Y. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Centre for Distributed and High Performance Computing School of Computer Science University of Sydney Australia
Machine learning models are increasingly used in time series prediction with promising results. The model explanation of time series prediction falls behind the model development and makes less sense to users in under... 详细信息
来源: 评论
A High-efficient inter-domain data transferring system for virtual machines  09
A High-efficient inter-domain data transferring system for v...
收藏 引用
3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
作者: Li, Dingding Jin, Hai Shao, Yingzhe Liao, Xiaofei Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Virtual machine (VM) technologies are becoming more and more important among industrial and academic institutions with the decreasing cost of computer hardware. It can offer a lot of benefits including performance iso... 详细信息
来源: 评论
Yarqs: Yet another range queries schema in DHT based P2P network
Yarqs: Yet another range queries schema in DHT based P2P net...
收藏 引用
IEEE 9th International Conference on Computer and Information technology, CIT 2009
作者: Zhang, Hao Jin, Hai Zhang, Qin Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks beco... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
Autonomous Agent Based Intrusion Detection in Virtual computing Environment
Autonomous Agent Based Intrusion Detection in Virtual Comput...
收藏 引用
2010 IEEE International Conference Conferenhce on Wireless Communications,Networking and Information Security(2010 IEEE 无线通信、网络技术与信息安全国际会议 WCNIS)
作者: Feng Zhao Alex K. Ohoussou Deqing Zou Hai Jin Guofu Xiang Ge Cheng Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of S Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of S
One of the motivations for virtualization technology is the desire to develop new services to enhance system security without trusting both the applications and the operating systems. An intrusion detection system is ... 详细信息
来源: 评论
An Efficient Graph Accelerator with Distributed On-Chip Memory Hierarchy  22nd
An Efficient Graph Accelerator with Distributed On-Chip Mem...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Zheng, Ran Jiang, Yingxin Wang, Yibo Su, Yongbo Zheng, Long Yao, Pengcheng Liao, Xiaofei Jin, Hai National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
Graph processing has evolved and expanded swiftly with artificial intelligence and big data technology. High-Bandwidth Memory (HBM), which delivers terabyte-level memory bandwidth, has opened up new development possib... 详细信息
来源: 评论
A novel VO-based access control model for grid*
收藏 引用
3rd International Conference on grid and Cooperative computing, GCC2004
作者: Qiang, Weizhong Jin, Hai Shi, Xuanhua Zou, Deqing Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative trust mechanism. This paper analyses... 详细信息
来源: 评论
The theory of triangle Type-2 Fuzzy Sets
The theory of triangle Type-2 Fuzzy Sets
收藏 引用
IEEE 9th International Conference on Computer and Information technology, CIT 2009
作者: Lv, Zehua Jin, Hai Yuan, Pingpeng Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Interval Type-2 Fuzzy Set is the most popular kind of Type-2 Fuzzy Set, its characteristic is that all the secondary membership functions equal to 1. Though Interval Type-2 Fuzzy Sets can reduce the calculation comple... 详细信息
来源: 评论
Differentially Private Deep Learning with Iterative Gradient Descent Optimization
收藏 引用
ACM/IMS Transactions on Data Science 2021年 第4期2卷 1–27页
作者: Ding, Xiaofeng Chen, Lin Zhou, Pan Jiang, Wenbin Jin, Hai National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Deep learning has achieved great success in various areas and its success is closely linked to the availability of massive data. But in general, a large dataset could include sensitive data and therefore the model sho... 详细信息
来源: 评论