咨询与建议

限定检索结果

文献类型

  • 404 篇 会议
  • 238 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 348 篇 工学
    • 280 篇 计算机科学与技术...
    • 192 篇 软件工程
    • 58 篇 信息与通信工程
    • 35 篇 生物工程
    • 28 篇 电气工程
    • 26 篇 控制科学与工程
    • 26 篇 网络空间安全
    • 23 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 14 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 核科学与技术
    • 11 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 156 篇 理学
    • 59 篇 数学
    • 57 篇 物理学
    • 41 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 92 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 文学
  • 5 篇 军事学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 54 篇 grid computing
  • 34 篇 virtual machinin...
  • 31 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 24 篇 resource managem...
  • 23 篇 peer to peer com...
  • 22 篇 servers
  • 20 篇 protocols
  • 19 篇 hardware
  • 19 篇 cloud computing
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 application soft...
  • 15 篇 kernel
  • 12 篇 access control
  • 12 篇 benchmark testin...
  • 12 篇 computers

机构

  • 100 篇 national enginee...
  • 64 篇 services computi...
  • 56 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...

作者

  • 246 篇 hai jin
  • 163 篇 jin hai
  • 57 篇 xiaofei liao
  • 35 篇 deqing zou
  • 34 篇 m. klein
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 616 篇 英文
  • 21 篇 其他
  • 14 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer"
650 条 记 录,以下是111-120 订阅
排序:
FlexiFed: Personalized Federated Learning for Edge Clients with Heterogeneous Model Architectures  23
FlexiFed: Personalized Federated Learning for Edge Clients w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Chen, Chunyang Huang, Faliang Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Information Technology Monash University Australia Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Mobile and Web-of-Things (WoT) devices at the network edge account for more than half of the world's web traffic, making a great data source for various machine learning (ML) applications, particularly federated l... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
RAHP: A Redundancy-aware Accelerator for High-performance Hypergraph Neural Network
RAHP: A Redundancy-aware Accelerator for High-performance Hy...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Hui Yu Yu Zhang Ligang He Yingqi Zhao Xintao Li Ruida Xin Jin Zhao Xiaofei Liao Haikun Liu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Warwick United Kingdom National University of Singapore Singapore
Hypergraph Neural Network (HyperGNN) has emerged as a potent methodology for dissecting intricate multilateral connections among various entities. Current software/hardware solutions leverage a sequential execution mo... 详细信息
来源: 评论
A Scalable, Efficient, and Robust Dynamic Memory Management Library for HLS-based FPGAs
A Scalable, Efficient, and Robust Dynamic Memory Management ...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Qinggang Wang Long Zheng Zhaozeng An Shuyi Xiong Runze Wang Yu Huang Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Nowadays, high-level synthesis (HLS) has gained prominence for FPGA-based architecture prototyping, enhancing productivity significantly. Despite this advancement, HLS tools are impeded by a critical drawback: they la...
来源: 评论
AFaVS: Accurate Yet Fast Version Switching for Graph Processing Systems
AFaVS: Accurate Yet Fast Version Switching for Graph Process...
收藏 引用
International Conference on Data Engineering
作者: Long Zheng Xiangyu Ye Haifeng Liu Qinggang Wang Yu Huang Chuangyi Gui Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering UNSW Sydney Australia
Multi-version graph processing has been widely used to solve many real-world problems. The process of the multi-version graph processing typically includes: (1) a history graph version switching at a specific time and...
来源: 评论
Layered Structure Aware Dependent Microservice Placement Toward Cost Efficient Edge Clouds
Layered Structure Aware Dependent Microservice Placement Tow...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Deze Zeng Hongmin Geng Lin Gu Zhexiong Li School of Computer Science China University of Geosciences Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Although the containers are featured by light-weightness, it is still resource-consuming to pull and startup a large container image, especially in relatively resource-constrained edge cloud. Fortunately, Docker, as t...
来源: 评论
Efficient FPGA-based graph processing with hybrid pull-push computational model
收藏 引用
Frontiers of computer Science 2020年 第4期14卷 13-28页
作者: Chengbo YANG Long ZHENG Chuangyi GUI Hai JIN National Engineering Research Center for Big Data Technology and System/Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan430074China
Hybrid pull-push computational model can provide compelling results over either of single one for processing real-world *** and pipeline parallelism of FPGAs make it potential to process different stages of graph ***,... 详细信息
来源: 评论
A Data-Centric Accelerator for High-Performance Hypergraph Processing  22
A Data-Centric Accelerator for High-Performance Hypergraph P...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Qinggang Wang Long Zheng Ao Hu Yu Huang Pengcheng Yao Chuangyi Gui Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China and Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Hypergraph processing has emerged as a powerful approach for analyzing complex multilateral relationships among multiple entities. Past research on building hypergraph systems suggests that changing the scheduling ord... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论