咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 223 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 615 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 270 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 51 篇 信息与通信工程
    • 32 篇 生物工程
    • 29 篇 控制科学与工程
    • 25 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 23 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 13 篇 光学工程
    • 12 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 145 篇 理学
    • 54 篇 数学
    • 54 篇 物理学
    • 35 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 85 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 deep neural netw...

机构

  • 103 篇 national enginee...
  • 64 篇 services computi...
  • 59 篇 school of comput...
  • 46 篇 services computi...
  • 41 篇 school of cyber ...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...

作者

  • 245 篇 hai jin
  • 165 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 569 篇 英文
  • 35 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
615 条 记 录,以下是241-250 订阅
排序:
iGniter: Interference-Aware GPU Resource Provisioning for Predictable DNN Inference in the Cloud
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fei Xu, Jianian Chen, Jiabin Chen, Li Shang, Ruitao Zhou, Zhi Liu, Fangming The Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University 3663 N. Zhongshan Road Shanghai200062 China The School of Computing and Informatics University of Louisiana at Lafayette 301 East Lewis Street LafayetteLA70504 United States The Guangdong Key Laboratory of Big Data Analysis and Processing School of Computer Science and Engineering Sun Yat-sen University 132 E. Waihuan Road Guangzhou510006 China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl... 详细信息
来源: 评论
Corrigendum to “Improved Algorithm for Permutation Testing” [Theoretical computer science 986 (2024) 114316]
收藏 引用
Theoretical computer science 2024年 999卷
作者: Xiaojin Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论
VulCNN: An Image-inspired Scalable Vulnerability Detection System
VulCNN: An Image-inspired Scalable Vulnerability Detection S...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yueming Wu Deqing Zou Shihan Dou Wei Yang Duo Xu Hai Jin Huazhong University of Science and Technology China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering HUST Wuhan China Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System HUST Wuhan China Fudan University China University of Texas at Dallas United States Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Xin Li Zhaoyang Qu Tong Yu Ming Xie Fu Yu Wei Ding School of Electrical Engineering Northeast Electric Power University Jilin China People’s Bank of China Qinghai Provincial Branch Xining China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning China Bijie Power Supply Bureau China Guizhou Power Grid Co. Ltd. Bijie China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
DepGraph: A Dependency-Driven Accelerator for Efficient Iterative Graph Processing
DepGraph: A Dependency-Driven Accelerator for Efficient Iter...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Yu Zhang Xiaofei Liao Hai Jin Ligang He Bingsheng He Haikun Liu Lin Gu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China University of Warwick United Kingdom National University of Singapore Singapore
Many graph processing systems have been recently developed for many-core processors. However, for iterative graph processing, due to the dependencies between vertices' states, the propagations of new states of ver... 详细信息
来源: 评论
Superpage-Friendly Page Table Design for Hybrid Memory Systems  6th
Superpage-Friendly Page Table Design for Hybrid Memory Syste...
收藏 引用
6th International Conference of Pioneering computer Scientists, Engineers and Educators, ICPCSEE 2020
作者: Wang, Xiaoyuan Liu, Haikun Liao, Xiaofei Jin, Hai National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan430074 China Service Computing Technology and System Lab Huazhong University of Science and Technology Wuhan430074 China Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Page migration has long been adopted in hybrid memory systems comprising dynamic random access memory (DRAM) and non-volatile memories (NVMs), to improve the system performance and energy efficiency. However, page mig... 详细信息
来源: 评论
Continual learning via inter-task synaptic mapping
arXiv
收藏 引用
arXiv 2021年
作者: Fubing, Mao Weiwei, Weng Pratama, Mahardhika Kien Yee, Edward Yapp National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Singapore Institute of Manufacturing Technology A*Star Singapore Singapore
Learning from streaming tasks leads a model to catastrophically erase unique experiences it absorbs from previous episodes. While regularization techniques such as LWF, SI, EWC have proven themselves as an effective a... 详细信息
来源: 评论