咨询与建议

限定检索结果

文献类型

  • 411 篇 会议
  • 240 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 355 篇 工学
    • 287 篇 计算机科学与技术...
    • 192 篇 软件工程
    • 59 篇 信息与通信工程
    • 35 篇 生物工程
    • 32 篇 控制科学与工程
    • 29 篇 电气工程
    • 26 篇 网络空间安全
    • 23 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 14 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 核科学与技术
    • 11 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 156 篇 理学
    • 59 篇 数学
    • 57 篇 物理学
    • 41 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 92 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 30 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 文学
  • 5 篇 军事学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 54 篇 grid computing
  • 34 篇 virtual machinin...
  • 31 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 24 篇 resource managem...
  • 23 篇 peer to peer com...
  • 22 篇 servers
  • 20 篇 protocols
  • 19 篇 hardware
  • 19 篇 cloud computing
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 application soft...
  • 15 篇 kernel
  • 12 篇 access control
  • 12 篇 benchmark testin...
  • 12 篇 computers

机构

  • 103 篇 national enginee...
  • 64 篇 services computi...
  • 59 篇 school of comput...
  • 46 篇 services computi...
  • 41 篇 school of cyber ...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...

作者

  • 246 篇 hai jin
  • 165 篇 jin hai
  • 57 篇 xiaofei liao
  • 35 篇 deqing zou
  • 34 篇 m. klein
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 611 篇 英文
  • 35 篇 其他
  • 14 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer"
659 条 记 录,以下是241-250 订阅
排序:
Text-augmented long-term relation dependency learning for knowledge graph representation
High-Confidence Computing
收藏 引用
High-Confidence computing 2025年
作者: Quntao Zhu Mengfan Li Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) ... 详细信息
来源: 评论
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
iGniter: Interference-Aware GPU Resource Provisioning for Predictable DNN Inference in the Cloud
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fei Xu, Jianian Chen, Jiabin Chen, Li Shang, Ruitao Zhou, Zhi Liu, Fangming The Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University 3663 N. Zhongshan Road Shanghai200062 China The School of Computing and Informatics University of Louisiana at Lafayette 301 East Lewis Street LafayetteLA70504 United States The Guangdong Key Laboratory of Big Data Analysis and Processing School of Computer Science and Engineering Sun Yat-sen University 132 E. Waihuan Road Guangzhou510006 China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl... 详细信息
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
Shared Incentive System for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption
Diabetes Mellitus Type 2 Data Sharing System Based on Blockc...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Zhenhui Lu Xia Xie Duoqiang Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
Medical data sharing can improve the quality of medical care and promote progress in the field of public health. However, medical data has high confidentiality and complexity. Taking the clinical diagnosis and treatme... 详细信息
来源: 评论
A Resilient Decentralized Learning Approach against Byzantine Attack via Reputation Evaluation
A Resilient Decentralized Learning Approach against Byzantin...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Heng Zhang Wenting Wang Xuguo Jiao Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan P. R. China College of Control Science and Engineering Zhejiang University Hangzhou China State Grid Shandong Electric Power Research Institute Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne... 详细信息
来源: 评论
Corrigendum to “Improved Algorithm for Permutation Testing” [Theoretical computer Science 986 (2024) 114316]
收藏 引用
Theoretical computer Science 2024年 999卷
作者: Xiaojin Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论
China in the eyes of news media:a case study under COVID-19 epidemic
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2021年 第11期22卷 1443-1457页
作者: Hong HUANG Zhexue CHEN Xuanhua SHI Chenxu WANG Zepeng HE Hai JIN Mingxin ZHANG Zongya LI National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Journalism and Information Communication Huazhong University of Science and TechnologyWuhan430074China
As one of the early COVID-19 epidemic outbreak areas,China attracted the global news media’s attention at the beginning of *** the epidemic period,Chinese people united and actively fought against the ***,in the eyes... 详细信息
来源: 评论
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhou, Ziqi Zhang, Yechao Zhang, Leo Yu Zheng, Yifeng He, Yuanyuan Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information Technology Deakin University VIC3216 Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan430074 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs... 详细信息
来源: 评论