咨询与建议

限定检索结果

文献类型

  • 379 篇 会议
  • 221 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 607 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 321 篇 工学
    • 263 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 50 篇 信息与通信工程
    • 32 篇 生物工程
    • 24 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 23 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 13 篇 光学工程
    • 12 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 145 篇 理学
    • 54 篇 数学
    • 54 篇 物理学
    • 35 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 85 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 memory managemen...

机构

  • 100 篇 national enginee...
  • 64 篇 services computi...
  • 56 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...

作者

  • 245 篇 hai jin
  • 163 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 575 篇 英文
  • 21 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
607 条 记 录,以下是201-210 订阅
排序:
GIDN: A Lightweight Graph Inception Diffusion Network for High-efficient Link Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Zixiao Guo, Yuluo Zhao, Jin Zhang, Yu Yu, Hui Liao, Xiaofei Wang, Biao Yu, Ting National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) model. This model generalizes graph diffusion in different feature spaces, and uses the inception module to avoid the large amount of computations c... 详细信息
来源: 评论
FlashWalker: An In-Storage Accelerator for Graph Random Walks
FlashWalker: An In-Storage Accelerator for Graph Random Walk...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Fuping Niu Jianhui Yue Jiangqiu Shen Xiaofei Liao Haikun Liu Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science Michigan Technological University Houghton Michigan USA
Graph random walk is widely used in the graph processing as it is a fundamental component in graph analysis, ranging from vertices ranking to the graph embedding. Different from traditional graph processing workload, ... 详细信息
来源: 评论
An Efficient Block Validation Mechanism for UTXO-based Blockchains
An Efficient Block Validation Mechanism for UTXO-based Block...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiaohai Dai Bin Xiao Jiang Xiao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing The Hong Kong Polytechnic University Hong Kong
It has been recognized that one of the bottlenecks in the UTXO-based blockchain systems is the slow block validation - the process of validating a newly-received block by a node before locally storing it and further b... 详细信息
来源: 评论
A Hybrid Memory Architecture Supporting Fine-Grained Data Migration
SSRN
收藏 引用
SSRN 2022年
作者: Chi, Ye Yue, Jianhui Liao, Xiaofei Liu, Haikun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Science Michigan Technological University HoughtonMI United States
We propose Mocha, a non-hierarchical caching architecture that organizes DRAM and NVM in a flat address space physically, but manages DRAM/NVM in a cache/memory hierarchy in this paper. Since the commercial NVM device... 详细信息
来源: 评论
Significant Engagement Community Search on Temporal Networks: Concepts and Algorithms
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yifei Lin, Longlong Yuan, Pingpeng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science & Technology HuaZhong University of Science and Technology Luoyu Road 1037 Hubei Wuhan430074 China
Community search, retrieving the cohesive subgraph which contains the query vertex, has been widely touched over the past decades. The existing studies on community search mainly focus on static networks. However, rea... 详细信息
来源: 评论
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
An effective framework for asynchronous incremental graph processing
收藏 引用
Frontiers of computer science 2019年 第3期13卷 539-551页
作者: Xinqiao LV Wei XIAO Yu ZHANG Xiaofei LIAO Hai JIN Qiangsheng HUA Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Although many graph processing systems have been proposed, graphs in the real-world are often dynamic. It is important to keep the results of graph computation up-todate. Incremental computation is demonstrated to be ... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
Accelerating Backward Aggregation in GCN Training with Execution Path Preparing on GPUs
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Shaoxian Shao, Zhiyuan Yang, Ci Liao, Xiaofei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
The emerging Graph Convolutional Network (GCN) has been widely used in many domains, where it is important to improve the efficiencies of applications by accelerating GCN trainings. Due to the sparsity nature and expl... 详细信息
来源: 评论