咨询与建议

限定检索结果

文献类型

  • 482 篇 会议
  • 184 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 673 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 345 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 65 篇 信息与通信工程
    • 35 篇 生物工程
    • 28 篇 控制科学与工程
    • 27 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 土木工程
  • 126 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 125 篇 理学
    • 67 篇 数学
    • 39 篇 生物学
    • 21 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 19 篇 法学
    • 12 篇 社会学
    • 7 篇 法学
  • 11 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 文学
  • 4 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 33 篇 virtual machinin...
  • 30 篇 servers
  • 27 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 25 篇 bandwidth
  • 23 篇 cloud computing
  • 22 篇 scalability
  • 22 篇 computer archite...
  • 20 篇 resource managem...
  • 20 篇 computers
  • 19 篇 kernel
  • 19 篇 hardware
  • 18 篇 protocols
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 15 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 29 篇 national enginee...
  • 29 篇 cluster and grid...
  • 28 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...

作者

  • 332 篇 hai jin
  • 240 篇 jin hai
  • 83 篇 xiaofei liao
  • 55 篇 deqing zou
  • 51 篇 liao xiaofei
  • 40 篇 song wu
  • 32 篇 zou deqing
  • 27 篇 shi xuanhua
  • 27 篇 wu song
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 25 篇 xuanhua shi
  • 22 篇 ran zheng
  • 19 篇 qin zhang
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 638 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Cluster and Grid Computing Lab Services Computing Technology"
673 条 记 录,以下是661-670 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
AMSPM: Adaptive Model Selection and Partition Mechanism for Edge Intelligence-driven 5G Smart City with Dynamic computing Resources
收藏 引用
ACM Transactions on Sensor Networks 1000年
作者: Xin Niu Xuejiao Cao Chen Yu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the help of 5G network, edge intelligence (EI) can not only provide distributed, low-latency, and high-reliable intelligent services, but also enable intelligent maintenance and management of smart city. However,... 详细信息
来源: 评论
iGniter: Interference-Aware GPU Resource Provisioning for Predictable DNN Inference in the Cloud
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fei Xu, Jianian Chen, Jiabin Chen, Li Shang, Ruitao Zhou, Zhi Liu, Fangming The Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University 3663 N. Zhongshan Road Shanghai200062 China The School of Computing and Informatics University of Louisiana at Lafayette 301 East Lewis Street LafayetteLA70504 United States The Guangdong Key Laboratory of Big Data Analysis and Processing School of Computer Science and Engineering Sun Yat-sen University 132 E. Waihuan Road Guangzhou510006 China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl... 详细信息
来源: 评论
Accelerating GPGPU architecture simulation  13
Accelerating GPGPU architecture simulation
收藏 引用
Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems
作者: Zhibin Yu Lieven Eeckhout Nilanjan Goswami Tao Li Lizy John Hai Jin Chengzhong Xu Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China ELIS Department Ghent University Ghent Belgium Intelligent Design of Efficient Architectures Lab University of Florida Gainesville USA Department of Electrical and Computer Engineering University of Texas at Austin Austin USA Service Computing Technologies and System Lab/Cluster and Grid Computing Lab HUST Wuhan China Department of Electrical and Computer Engineering Wayne State University Detroit USA
Recently, graphics processing units (GPUs) have opened up new opportunities for speeding up general-purpose parallel applications due to their massive computational power and up to hundreds of thousands of threads ena... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
Corrigendum to “Improved Algorithm for Permutation Testing” [Theoretical Computer Science 986 (2024) 114316]
收藏 引用
Theoretical Computer Science 2024年 999卷
作者: Xiaojin Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
Cheetah: Accelerating Dynamic Graph Mining with Grouping Updates
收藏 引用
ACM Transactions on Architecture and Code Optimization 1000年
作者: Yi Zhang Xiaomeng Yi Yu Huang Jingrui Yuan Chuangyi Gui Dan Chen Long Zheng Jianhui Yue Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Software Engineering Huazhong University of Science and Technology Wuhan China Eastern Institute of Technology Ningbo China National University of Singapore Singapore Singapore Michigan Technological University Houghton United States School of Computer Science and Engieering UNSW Sydney Kensington Australia
Graph pattern mining is essential for deciphering complex networks. In the real world, graphs are dynamic and evolve over time, necessitating updates in mining patterns to reflect these changes. Traditional methods us... 详细信息
来源: 评论
gECC: A GPU-based high-throughput framework for Elliptic Curve Cryptography
收藏 引用
ACM Transactions on Architecture and Code Optimization 1000年
作者: Qian Xiong Weiliang Ma Xuanhua Shi Yongluan Zhou Hai Jin Kaiyi Huang Haozhou Wang Zhengru Wang Huazhong University of Science and Technology Wuhan China School of Computer Huazhong University of Science and Technology Wuhan China University of Copenhagen Copenhagen Denmark School of computer science and technology Huazhong University of Science and Technology Services Computing Technology and System Laboratory / Cluster and Grid Computing Laboratory Wu hanwu China NVIDIA Corp Shanghai China
Elliptic Curve Cryptography (ECC) is an encryption method that provides security comparable to traditional techniques like Rivest–Shamir–Adleman (RSA) but with lower computational complexity and smaller key sizes, m... 详细信息
来源: 评论
Preface
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3252卷 V-VI页
作者: Jin, Hai Pan, Yi Huazhong University of Science and Technology Cluster and Grid Computing Lab Wuhan China Georgia State University Department of Computer Science 34 Peachtree Street Suite 1450 AtlantaGA United States
来源: 评论