咨询与建议

限定检索结果

文献类型

  • 483 篇 会议
  • 182 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 386 篇 工学
    • 339 篇 计算机科学与技术...
    • 235 篇 软件工程
    • 64 篇 信息与通信工程
    • 35 篇 生物工程
    • 33 篇 控制科学与工程
    • 26 篇 电气工程
    • 21 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 10 篇 交通运输工程
    • 9 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 安全科学与工程
  • 122 篇 理学
    • 67 篇 数学
    • 39 篇 生物学
    • 19 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 9 篇 物理学
  • 122 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 18 篇 法学
    • 12 篇 社会学
    • 6 篇 法学
  • 11 篇 经济学
    • 10 篇 应用经济学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 4 篇 文学
  • 4 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 33 篇 virtual machinin...
  • 30 篇 servers
  • 27 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 25 篇 bandwidth
  • 23 篇 cloud computing
  • 22 篇 scalability
  • 22 篇 computer archite...
  • 20 篇 resource managem...
  • 20 篇 computers
  • 19 篇 kernel
  • 19 篇 hardware
  • 18 篇 protocols
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 15 篇 costs
  • 15 篇 semantics
  • 15 篇 feature extracti...

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 63 篇 school of comput...
  • 53 篇 services computi...
  • 48 篇 school of cyber ...
  • 32 篇 national enginee...
  • 30 篇 cluster and grid...
  • 30 篇 cluster and grid...
  • 29 篇 cluster and grid...
  • 28 篇 services computi...
  • 28 篇 hubei engineerin...
  • 26 篇 huazhong univers...
  • 25 篇 hubei key labora...
  • 21 篇 school of softwa...
  • 16 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 service computin...

作者

  • 334 篇 hai jin
  • 234 篇 jin hai
  • 83 篇 xiaofei liao
  • 56 篇 deqing zou
  • 46 篇 liao xiaofei
  • 40 篇 song wu
  • 31 篇 zou deqing
  • 27 篇 wu song
  • 26 篇 shi xuanhua
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 25 篇 xuanhua shi
  • 22 篇 ran zheng
  • 21 篇 hu shengshan
  • 19 篇 qin zhang
  • 17 篇 xia xie
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 wan yao

语言

  • 589 篇 英文
  • 72 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services Computing Technology"
672 条 记 录,以下是361-370 订阅
DNS Protection against Spoofing and Poisoning Attacks
DNS Protection against Spoofing and Poisoning Attacks
收藏 引用
International Conference on Information Science and Control Engineering (ICISCE)
作者: Mohammed Abdulridha Hussain Hai Jin Zaid Alaa Hussien Zaid Ameen Abduljabbar Salah H. Abbdal Ayad Ibrahim Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China University of Basrah Basrah Iraq Southern Technical University Basrah Iraq
Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the Internet. The domain name system consists of mapped website names with Internet protocol, which facilitates brow... 详细信息
来源: 评论
Privacy-Preserving Image Retrieval in IoT-Cloud
Privacy-Preserving Image Retrieval in IoT-Cloud
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Zaid Ameen Abduljabbar Hai Jin Ayad Ibrahim Zaid Alaa Hussien Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China University of Basrah Basrah Iraq Southern Technical University Basrah Iraq
Within the IoT-cloud, security has a very significant role to play. One of the best means by which the security and privacy of an image may be safeguarded confidentially is through encryption. However, this methodolog... 详细信息
来源: 评论
Secure biometric image retrieval in IoT-cloud
Secure biometric image retrieval in IoT-cloud
收藏 引用
IEEE International Conference on Signal Processing, Communications and computing (ICSPCC)
作者: Zaid Ameen Abduljabbar Hai Jin Ayad Ibrahim Zaid Alaa Hussien Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China University of Basrah Basrah Iraq SouthernTechnical University Basrah Iraq
Within the IoT-cloud, security has a very significant role to play. One of the best means to safeguard confidentially, security and privacy of a biometric image is through encryption. However, looking through encrypte... 详细信息
来源: 评论
Improving the memory efficiency of in-memory mapreduce based HPC systems  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Pei, Cheng Shi, Xuanhua Jin, Hai Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In-memory cluster computing systems based MapReduce, such as Spark, have made a great impact in addressing all kinds of big data problems. Given the overuse of memory speed, which stems from avoiding the latency cause... 详细信息
来源: 评论
SymS: A symmetrical scheduler to improve multi-threaded program performance on NUMA systems
SymS: A symmetrical scheduler to improve multi-threaded prog...
收藏 引用
作者: Zhu, Liang Jin, Hai Liao, Xiaofei Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Summary The nonuniform memory access (NUMA) architecture has been used extensively in data centers. Most of the previous works used single-threaded multiprogrammed workloads to study the performance of NUMA systems, w... 详细信息
来源: 评论
Short: CICC: A fine-grained, semantic-aware, and transparent approach to preventing permission leaks for android permission managers  8
Short: CICC: A fine-grained, semantic-aware, and transparent...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: Wang, Daibin Yao, Haixia Li, Yingjiu Jin, Hai Zou, Deqing Deng, Robert H. Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Information Systems Singapore Management University Singapore
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app&#... 详细信息
来源: 评论
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment  11
Robust image document authentication code with autonomous bi...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Abduljabbar, Zaid Ameen Jin, Hai Hussien, Zaid Alaa Yassin, Ali A. Hussain, Mohammed Abdulridha Abbdal, Salah H. Zou, Deqing Cluster and Grid Computing Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China University of Basrah Basrah Iraq Southern Technical University Basrah Iraq
Recently, security issues are obstructing the development and using of cloud computing services. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to rec... 详细信息
来源: 评论
AutoCSD: Automatic cloud system deployment in data centers  2nd
AutoCSD: Automatic cloud system deployment in data centers
收藏 引用
2nd International Conference on Cloud computing and Big Data, CloudCom-Asia 2015
作者: Xie, Tao Chen, Haibao Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer and Information Engineering Chuzhou University Chuzhou239000 China
It is a huge challenge to deploy a cloud computing system in large-scale data centers. In order to help resolve this issue, we propose an automatic cloud system deployment approach with the characteristics of reliabil... 详细信息
来源: 评论
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
Towards Efficient Authentication Scheme with Biometric Key M...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Zaid Ameen Abduljabbar Hai Jin Zaid Alaa Hussien Ali A. Yassin Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Huazhong University of Science and Technology Wuhan Hubei CN Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Southern Technical University Basrah Iraq University of Basrah Basrah Iraq
Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unaut... 详细信息
来源: 评论
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext  11
Public auditing for secure data storage in cloud through a t...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Hussien, Zaid Alaa Jin, Hai Abduljabbar, Zaid Ameen Yassin, Ali A. Hussain, Mohammed Abdulridha Abbdal, Salah H. Zou, Deqing Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China University of Basrah Basrah Iraq
Outsourced data in cloud and computation results are not always trustworthy because data owners lack physical possession and control over the data as a result of virtualization, replication, and migration techniques. ... 详细信息
来源: 评论