咨询与建议

限定检索结果

文献类型

  • 190 篇 会议
  • 131 篇 期刊文献

馆藏范围

  • 321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 103 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 53 篇 电气工程
    • 26 篇 信息与通信工程
    • 24 篇 生物工程
    • 20 篇 控制科学与工程
    • 13 篇 动力工程及工程热...
    • 12 篇 网络空间安全
    • 11 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 化学工程与技术
    • 9 篇 核科学与技术
    • 8 篇 仪器科学与技术
    • 8 篇 环境科学与工程(可...
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
  • 108 篇 理学
    • 56 篇 物理学
    • 26 篇 数学
    • 26 篇 生物学
    • 9 篇 化学
    • 9 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 47 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 经济学
  • 1 篇 农学

主题

  • 10 篇 data models
  • 8 篇 deep neural netw...
  • 8 篇 grid computing
  • 7 篇 efficiency
  • 7 篇 higgs bosons
  • 7 篇 feature extracti...
  • 6 篇 supersymmetric m...
  • 6 篇 accuracy
  • 6 篇 particle data an...
  • 5 篇 graph database
  • 5 篇 deep learning
  • 5 篇 peer to peer com...
  • 5 篇 xml
  • 5 篇 resource managem...
  • 5 篇 supersymmetry
  • 5 篇 hadron colliders
  • 5 篇 machine learning
  • 5 篇 cloud computing
  • 5 篇 top quark
  • 5 篇 training

机构

  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 40 篇 institute of phy...
  • 40 篇 department of ph...
  • 40 篇 physics departme...
  • 39 篇 dipartimento di ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 instituto de fís...
  • 38 篇 fakultät für phy...
  • 38 篇 tomsk state univ...
  • 38 篇 dipartimento di ...
  • 37 篇 department of ph...
  • 37 篇 department of ph...
  • 37 篇 department of ph...

作者

  • 34 篇 jin hai
  • 33 篇 hai jin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...

语言

  • 305 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 日文
检索条件"机构=Grid Computing Research Laboratory"
321 条 记 录,以下是1-10 订阅
排序:
A smart grid computational offloading policy generation method for end-edge-cloud environments
收藏 引用
Journal of Reliable Intelligent Environments 2025年 第1期11卷 1-13页
作者: Liu, Weiwei Wang, Yue Xu, Chenxi Zheng, Min State Grid Laboratory of Grid Advanced Computing and Applications State Grid Smart Grid Research Institute Co. Ltd. Beijing102209 China
With the continuous progress of the Internet of Things (IoT) technology, smart grid has become the key to improve the efficiency of the power system. At present, how to reasonably distribute the massive power computin... 详细信息
来源: 评论
Network Intrusion Detection for Modern Smart grids Based on Adaptive Online Incremental Learning
收藏 引用
IEEE Transactions on Smart grid 2025年 第3期16卷 2541-2553页
作者: Lu, Qiuyu An, Kexin Li, Jun'e Wang, Jin Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China State Grid Hubei Electric Power Research Institute Energy Internet Research Center Wuhan430072 China
New and evolving cyber attacks against smart grids are emerging. This necessitates that the network intrusion detection systems (IDSs) have online learning ability. However, most existing methods struggle to handle ne... 详细信息
来源: 评论
FlexIM: Efficient and Verifiable Index Management in Blockchain
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年 第6期37卷 3399-3412页
作者: Li, Binhong Lin, Licheng Zhang, Shijie Xu, Jianliang Xiao, Jiang Li, Bo Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory The Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China Hong Kong Baptist University School of Computer Science Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong999077 Hong Kong
Blockchain-based query with its traceability and data provenance has become increasingly popular and widely adopted in numerous applications. Yet existing index-based query approaches are only efficient under static b... 详细信息
来源: 评论
Impulsive Control of Nonlinear Multi-Agent Systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent Systems (MASs) with u... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis  23
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China and Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
A Flexible Multi-Mechanism Market Model for Air Conditioning Users in Electricity Market: Design and Application
收藏 引用
IEEE Access 2025年
作者: Xiao, Chupeng Tang, Zhuofan Wang, Suoyue Wang, Kui Xiang, Rui Li, Xiaojing State Grid Electric Power Research Institute Wuhan Efficiency Evaluation Company Limited Hubei Wuhan China State Grid Electric Power Research Institute Jiangsu Nanjing China State Grid Shanghai Electric Power Company Shanghai China Shanghai Key Laboratory of Smart Grid Demand Response Shanghai China State Grid Shandong Marketing Service Center Shandong Jinan China PKU-Changsha Institute for Computing and Digital Economy Hunan Changsha China
With the continuous growth of electricity demand, optimizing load management strategies has become a crucial approach for alleviating the pressure on power supply. As a significant component of power consumption, air ... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
It Takes Two to Tango: Serverless Workflow Serving via Bilaterally Engaged Resource Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Jing Wang, Lin Deng, Quanfeng Yu, Chen Zhang, Dong Yan, Bingheng Liu, Fangming National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology China Paderborn University Germany Inspur Data Co. Ltd. China Peng Cheng Laboratory China
Serverless platforms typically adopt an early-binding approach for function sizing, requiring developers to specify an immutable size for each function within a workflow beforehand. Accounting for potential runtime va... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论