咨询与建议

限定检索结果

文献类型

  • 191 篇 会议
  • 67 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 260 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 73 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 12 篇 信息与通信工程
    • 12 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 化学工程与技术
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
    • 2 篇 轻工技术与工程
    • 1 篇 光学工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 32 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 8 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 30 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 系统科学
    • 1 篇 物理学
  • 5 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 64 篇 grid computing
  • 28 篇 peer to peer com...
  • 26 篇 virtual machinin...
  • 18 篇 resource managem...
  • 16 篇 computer science
  • 16 篇 computer archite...
  • 16 篇 bandwidth
  • 15 篇 application soft...
  • 15 篇 servers
  • 15 篇 computers
  • 14 篇 kernel
  • 14 篇 web services
  • 13 篇 monitoring
  • 13 篇 protocols
  • 13 篇 distributed comp...
  • 12 篇 scalability
  • 12 篇 virtual machine ...
  • 12 篇 hardware
  • 12 篇 cloud computing
  • 12 篇 delay

机构

  • 53 篇 services computi...
  • 47 篇 cluster and grid...
  • 40 篇 school of comput...
  • 35 篇 school of cyber ...
  • 25 篇 national enginee...
  • 25 篇 cluster and grid...
  • 23 篇 hubei key labora...
  • 23 篇 hubei engineerin...
  • 22 篇 services computi...
  • 16 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 9 篇 huazhong univers...
  • 7 篇 cluster and grid...
  • 7 篇 cluster and grid...
  • 7 篇 jinyinhu laborat...
  • 6 篇 zhejiang lab
  • 5 篇 services computi...

作者

  • 171 篇 hai jin
  • 51 篇 jin hai
  • 30 篇 deqing zou
  • 26 篇 xiaofei liao
  • 25 篇 song wu
  • 16 篇 hu shengshan
  • 13 篇 xuanhua shi
  • 12 篇 qin zhang
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 xia xie
  • 9 篇 long zheng
  • 9 篇 金海
  • 9 篇 li qi
  • 8 篇 hanhua chen
  • 8 篇 pingpeng yuan
  • 8 篇 zou deqing
  • 7 篇 kan hu

语言

  • 244 篇 英文
  • 11 篇 中文
  • 5 篇 其他
检索条件"机构=Cluster and Grid Computing Laboratory"
260 条 记 录,以下是171-180 订阅
排序:
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure
Building dynamic integrity protection for multiple independe...
收藏 引用
International Workshop on grid computing
作者: Ge Cheng Hai Jin Deqing Zou Xinwen Zhang Min Li Chen Yu Guofu Xiang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Samsung Information Systems America Inc. San Jose CA USA
In grid and cloud computing infrastructures, the integrity of a computing platform is a critical security requirement in order to provide secure and honest computing environments to service providers and resource cons... 详细信息
来源: 评论
X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream Analytics
X-Stream: A Flexible, Adaptive Video Transformer for Privacy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Dou Feng Lin Wang Shutong Chen Lingching Tung Fangming Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Paderborn University Germany National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Guangxi University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Peng Cheng Laboratory China
Video stream analytics (VSA) systems fuel many exciting applications that facilitate people’s lives, but also raise critical concerns about exposing too much individuals’ privacy. To alleviate these concerns, variou... 详细信息
来源: 评论
grid Security Interoperation between CGSP and VEGA
Grid Security Interoperation between CGSP and VEGA
收藏 引用
International Conference on Future Generation Communication and Networking (FGCN)
作者: Deqing Zou Hai Jin Xueguang Chen Zongfen Han Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan China
grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UN... 详细信息
来源: 评论
Event-Driven Scheduling for P2P VoD
Event-Driven Scheduling for P2P VoD
收藏 引用
Chinagrid Annual Conference (Chinagrid)
作者: Bin Cheng Hai Jin Xiaofei Liao Bo Li Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms th... 详细信息
来源: 评论
The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications
The Content Pollution in Peer-to-Peer Live Streaming Systems...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Sirui Yang Hai Jin Bo Li Xiaofei Liao Hong Yao Xuping Tu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
There has been significant progress in the development and deployment of peer-to-peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experien... 详细信息
来源: 评论
LEEN: Locality/Fairness-Aware Key Partitioning for MapReduce in the Cloud
LEEN: Locality/Fairness-Aware Key Partitioning for MapReduce...
收藏 引用
IEEE International Conference on Cloud computing Technology and Science (CloudCom)
作者: Shadi Ibrahim Hai Jin Lu Lu Song Wu Bingsheng He Li Qi Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan China School of Computer Engineering Nanyang Technological University Singapore Information and Technology Department China Development Bank Beijing China
This paper investigates the problem of Partitioning Skew in MapReduce-based system. Our studies with Hadoop, a widely used MapReduce implementation, demonstrate that the presence of partitioning skew causes a huge amo... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
Data Hiding in Virtual Machine Disk Images
Data Hiding in Virtual Machine Disk Images
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Yu Su Xiaofei Liao Hai Jin Tim Bell Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science and Software Engineering College of Engineering University of Canterbury Christchurch New Zealand
Data hiding in computer system is an interesting and important research issue, which brings benefits for secret communication and watermarking. The development of virtual machine brings new potential for data hiding. ... 详细信息
来源: 评论
Ripple: Toward a Substrate Middleware for Peer-to-Peer Applications
Ripple: Toward a Substrate Middleware for Peer-to-Peer Appli...
收藏 引用
International Conference on Innovative computing, Information and Control (ICICIC)
作者: Hong Yao Linchen Yu Hai Jin Sirui Yang Qi Huang Wenjian Jiang Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology China University of Geoscience Wuhan China France Telecom Research and Development Center Beijing China
Peers in multiple P2P applications execute overlapped operations with different implementation, like neighbour management, resource publish/lookup, delay investigation, which leads to poor interoperability and unneces... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论