咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 221 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 322 篇 工学
    • 264 篇 计算机科学与技术...
    • 177 篇 软件工程
    • 51 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 控制科学与工程
    • 23 篇 网络空间安全
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 14 篇 光学工程
    • 13 篇 机械工程
    • 13 篇 动力工程及工程热...
    • 12 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 交通运输工程
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 143 篇 理学
    • 54 篇 物理学
    • 53 篇 数学
    • 35 篇 生物学
    • 11 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
  • 84 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 25 篇 工商管理
    • 20 篇 图书情报与档案管...
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
  • 4 篇 军事学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 49 篇 grid computing
  • 34 篇 virtual machinin...
  • 28 篇 computer science
  • 26 篇 bandwidth
  • 26 篇 computational mo...
  • 23 篇 resource managem...
  • 22 篇 servers
  • 21 篇 peer to peer com...
  • 20 篇 protocols
  • 19 篇 hardware
  • 18 篇 scalability
  • 17 篇 computer archite...
  • 17 篇 cloud computing
  • 16 篇 operating system...
  • 16 篇 virtual machine ...
  • 15 篇 kernel
  • 14 篇 application soft...
  • 12 篇 benchmark testin...
  • 11 篇 access control
  • 11 篇 deep neural netw...

机构

  • 102 篇 national enginee...
  • 64 篇 services computi...
  • 58 篇 school of comput...
  • 46 篇 services computi...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 40 篇 school of cyber ...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...

作者

  • 245 篇 hai jin
  • 160 篇 jin hai
  • 57 篇 xiaofei liao
  • 34 篇 m. klein
  • 34 篇 deqing zou
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 r. ströhmer

语言

  • 570 篇 英文
  • 27 篇 其他
  • 12 篇 中文
检索条件"机构=Cluster and Grid Computing Laboratory School of Computer Science and Technology"
608 条 记 录,以下是281-290 订阅
Randomised benchmarking for characterizing and forecasting correlated processes
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Xinfang Wu, Zhihao White, Gregory A.L. Xiang, Zhongcheng Hu, Shun Peng, Zhihui Liu, Yong Zheng, Dongning Fu, Xiang Huang, Anqi Poletti, Dario Modi, Kavan Wu, Junjie Deng, Mingtang Guo, Chu Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China School of Physics and Astronomy Monash University VIC3800 Australia Dahlem Center for Complex Quantum Systems Freie Universität Berlin Berlin14195 Germany Institute of Physics Chinese Academy of Sciences Beijing100190 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha410081 China Science Mathematics and Technology Cluster and Engineering Product Development Pillar Singapore University of Technology and Design 8 Somapah Road 487372 Singapore Centre for Quantum Technologies National University of Singapore 117543 Singapore MajuLab CNRS-UNS-NUS-NTU International Joint Research Unit UMI 3654 Singapore Quantum for NSW Sydney2000 Australia
The development of fault-tolerant quantum processors relies on the ability to control noise. A particularly insidious form of noise is temporally correlated or non-Markovian noise. By combining randomized benchmarking... 详细信息
来源: 评论
WiWrite: Wi-Fi Based Handwriting Recognition like Playing Lego
WiWrite: Wi-Fi Based Handwriting Recognition like Playing Le...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Jiang Xiao Huichuwu Li Yuxiang Liu Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Effective finger writing underpins semantic text input task for virtual reality applications. We demonstrate WiWrite, a novel finger writing system that leverages the ubiquitous wireless signals to enable character re... 详细信息
来源: 评论
Deep Reinforcement Learning based Green Resource Allocation Mechanism in Edge computing driven Power Internet of Things  16
Deep Reinforcement Learning based Green Resource Allocation ...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Yang, Mo Yu, Peng Wang, Ying Huang, Xiuli Miu, Weiwei Yu, Pengfei Li, Wei Yang, Ruxia Tao, Minxing Shi, Lei State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Global Energy Interconnection Research Institute Co. Ltd Beijing China Communication Branch State Grid Jiangsu Electric Power Co. Ltd Jiangsu China School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Computing Carlow Institute of Technology Carlow Ireland
Smart grid deploys a large number of smart terminals and sensing devices to form an edge network, as well as a virtual network of information space and the power Internet of Things. As a key component of 5G and future... 详细信息
来源: 评论
An Adaptive Multi-objective Salp Swarm Algorithm for Efficient Demand Side Management
An Adaptive Multi-objective Salp Swarm Algorithm for Efficie...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Zezheng Zhao Chunqiu Xia Lian Chi Xiaomin Chang Wei Li Ting Yang Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Computer Science The University of Sydney Australia Business School Nanjing University of Information Science and Technology China Key Laboratory of Smart Grid of Ministry of Education School of Electrical and Information Engineering Tianjin University China
With the continuous growth in population and energy demands more attention has been paid to energy consumption issues in residential environments. At the user-end, the home energy management system (HEMS) has been pro... 详细信息
来源: 评论
FFSR: Feature focus network based on scale refinement for infrared and visible image fusion
收藏 引用
Infrared Physics and technology 2025年 150卷
作者: Xu, Chuan Zhao, Longyan Hu, Xinglong Wang, Jin Gao, Linyao Xia, Jiali Lei, Cheng Mei, Liye School of Computer Science Hubei University of Technology Wuhan430068 China Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network Hubei University of Technology Wuhan430068 China State Grid Hubei Electric Power Co. Ltd. Huanggang Power Supply Company Huanggang438000 China State Grid Hubei Electric Power Co. Ltd. Wuhan430040 China The Institute of Technological Sciences Wuhan University Wuhan430072 China
Infrared and visible image fusion aims to integrate the features of two source images into a single image, the essence of this method lies in the effective extraction and processing of source image features. The multi... 详细信息
来源: 评论
VulDeeLocator: A deep learning-based fine-grained vulnerability detector
arXiv
收藏 引用
arXiv 2020年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Chen, Zhaoxuan Zhu, Yawei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Cyber Security and Computer Hebei University Baoding071002 China The Department of Computer Science University of Colorado Colorado Springs CO80918 United States University of Texas San Antonio United States
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne... 详细信息
来源: 评论
Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation  20
Shattered chain of trust: understanding security risks in cr...
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang Deqing Zou Hai Jin Yuqing Zhang School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University Bloomington School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
来源: 评论
High performance RDF updates with triplebit +  13
High performance RDF updates with triplebit +
收藏 引用
13th International Conference on Digital Information Management, ICDIM 2018
作者: Yuan, Pingpeng Fan, Lijian Jin, Hai Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science Technology Huazhong University of Science and Technology Wuhan China
The volume of RDF data continues to grow over the past decade and many known RDF datasets have billions of triples. A grant challenge of managing this huge RDF data is how to access this big RDF data efficiently. A po... 详细信息
来源: 评论
BookChain: Library-Free Book Sharing Based on Blockchain technology
BookChain: Library-Free Book Sharing Based on Blockchain Tec...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Jiajie Zeng Xiaohai Dai Jiang Xiao Wenhui Yang Weifeng Hao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindere... 详细信息
来源: 评论
HiNUMA: NUMA-Aware Data Placement and Migration in Hybrid Memory Systems
HiNUMA: NUMA-Aware Data Placement and Migration in Hybrid Me...
收藏 引用
IEEE International Conference on computer Design: VLSI in computers and Processors, (ICCD)
作者: Zhuohui Duan Haikun Liu Xiaofei Liao Hai Jin Wenbin Jiang Yu Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Non-uniform memory access (NUMA) architectures feature asymmetrical memory access latencies on different CPU nodes. Hybrid memory systems composed of non-volatile memory (NVM) and DRAM further diversify memory access ... 详细信息
来源: 评论