咨询与建议

限定检索结果

文献类型

  • 485 篇 会议
  • 184 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 345 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 生物工程
    • 28 篇 控制科学与工程
    • 27 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 土木工程
  • 126 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 125 篇 理学
    • 67 篇 数学
    • 39 篇 生物学
    • 21 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 19 篇 法学
    • 12 篇 社会学
    • 7 篇 法学
  • 11 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 文学
  • 4 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 33 篇 virtual machinin...
  • 30 篇 servers
  • 27 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 25 篇 bandwidth
  • 23 篇 cloud computing
  • 22 篇 scalability
  • 22 篇 computer archite...
  • 20 篇 resource managem...
  • 20 篇 computers
  • 19 篇 kernel
  • 19 篇 hardware
  • 18 篇 protocols
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 15 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...

作者

  • 334 篇 hai jin
  • 240 篇 jin hai
  • 83 篇 xiaofei liao
  • 55 篇 deqing zou
  • 51 篇 liao xiaofei
  • 40 篇 song wu
  • 32 篇 zou deqing
  • 27 篇 shi xuanhua
  • 27 篇 wu song
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 25 篇 xuanhua shi
  • 22 篇 ran zheng
  • 19 篇 qin zhang
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 641 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services Computing Technology"
676 条 记 录,以下是521-530 订阅
排序:
SMU: Towards Cloud Oriented Service MashUp
SMU: Towards Cloud Oriented Service MashUp
收藏 引用
Fifth International Conference on Semantics,Knowledge and grid(第五届语义、知识与网格国际会议 SKG 2009)
作者: Xia Xie Ke Fan Xuanhua Shi Song Wu Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Based on increasing popularity of cloud computing, social computing and web 2.0 technology, Internet resources are extremely increasing. How to provide service invoking interfaces ceaselessly while minimizing the cost... 详细信息
来源: 评论
ImageFlow: Workflow Based Image Processing with Legacy Program in grid
ImageFlow: Workflow Based Image Processing with Legacy Progr...
收藏 引用
International Seminar on Future Information technology and Management Engineering, FITME
作者: Haijun Cao Hai Jin Song Wu Shadi Ibrahim Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
As image processing has been widely used in many scientific research areas, how to find a powerful and inexpensive approach to solve large-scale image processing problems poses great challenges. In this paper, based o... 详细信息
来源: 评论
Two-layered metadata service model in grid environment
收藏 引用
International Journal of High Performance computing and Networking 2009年 第2期6卷 130-136页
作者: Xiong, Muzhou Jin, Hai Wu, Song Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan 430074 China
The primary problem of data management in grid environment is how to effectively organise the geographical distributed storage devices to support the collaborative data operations. This paper focuses on how to resolve... 详细信息
来源: 评论
The Similarity Measure between Interval Type-2 Fuzzy Sets based on Triangles
The Similarity Measure between Interval Type-2 Fuzzy Sets ba...
收藏 引用
2009 IEEE International Conference on Information and Automation(2009年 IEEE信息与自动化国际学术会议)
作者: Zehua Lv Hai Jin Pingpeng Yuan Services Computing Technology and System Laboratory Cluster and Grid Computing laboratoryHuazhong University of Science and TechnologyWuhan430074China
Interval Type-2 Fuzzy Sets (IT2 FSs) has been used in wide range of applications, such as decision making, pattern recognitions. However, there is little investigation on the clustering techniques of IT2 FSs, since it... 详细信息
来源: 评论
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure
Building dynamic integrity protection for multiple independe...
收藏 引用
2009 10th IEEE/ACM International Conference on grid computing, grid 2009
作者: Cheng, Ge Jin, Hai Zou, Deqing Zhang, Xinwen Li, Min Yu, Chen Xiang, Guofu Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Samsung Information Systems America San Jose CA United States
In grid and cloud computing infrastructures, the integrity of a computing platform is a critical security requirement in order to provide secure and honest computing environments to service providers and resource cons... 详细信息
来源: 评论
VRFPS: A Novel Virtual Machine-Based Real-time File Protection System
VRFPS: A Novel Virtual Machine-Based Real-time File Protecti...
收藏 引用
International Conference on Software Engineering Research, Management and Applications (SERA)
作者: Feng Zhao Yali Jiang Guofu Xiang Hai Jin Wenbin Jiang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the development of virtualization technology, file protection in virtual machine, especially in guest OS, becomes more and more important. Traditional host-based file protection system resides the critical module... 详细信息
来源: 评论
PMonitor: A Lightweight Performance Monitor for Virtual Machines
PMonitor: A Lightweight Performance Monitor for Virtual Mach...
收藏 引用
International Workshop on Education technology and Computer Science, ETCS
作者: Zhiyuan Shao Hai Jin Xiaowen Lu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Performance monitor for virtual machines can monitor the performance metrics of virtual machines and gain the resource consumption status, and thus provide reliable basis for system performance evaluation and further ... 详细信息
来源: 评论
Live virtual machine migration with adaptive, memory compression
Live virtual machine migration with adaptive, memory compres...
收藏 引用
IEEE International Conference on cluster computing
作者: Hai Jin Li Deng Song Wu Xuanhua Shi Xiaodong Pan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Live migration of virtual machines has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance, and power-saving, especially in clusters or data centers. Although pre-copy is a predomina... 详细信息
来源: 评论
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Network
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Net...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Hao Zhang Hai Jin Qin Zhang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks beco... 详细信息
来源: 评论
Optimize Performance of Virtual Machine Checkpointing via Memory Exclusion
Optimize Performance of Virtual Machine Checkpointing via Me...
收藏 引用
Chinagrid Annual Conference (Chinagrid)
作者: Haikun Liu Hai Jin Xiaofei Liao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Virtual machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level... 详细信息
来源: 评论