咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 24 篇 计算机科学与技术...
    • 18 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 17 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 8 篇 理学
    • 7 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 药学(可授医学、理...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 3 篇 grid computing
  • 2 篇 computer archite...
  • 2 篇 internet
  • 2 篇 augmented realit...
  • 2 篇 scheduling
  • 1 篇 probability dens...
  • 1 篇 knowledge based ...
  • 1 篇 permission manag...
  • 1 篇 virtual addresse...
  • 1 篇 call-chain
  • 1 篇 permission leaks
  • 1 篇 information diss...
  • 1 篇 concurrent compu...
  • 1 篇 graphics process...
  • 1 篇 electronic mail
  • 1 篇 integration
  • 1 篇 androids
  • 1 篇 resource managem...
  • 1 篇 java
  • 1 篇 computer applica...

机构

  • 2 篇 distributed and ...
  • 2 篇 ieee
  • 2 篇 school of comput...
  • 2 篇 acm
  • 2 篇 school of cyber ...
  • 1 篇 department of el...
  • 1 篇 ieee computer so...
  • 1 篇 taiwan
  • 1 篇 st. augustin
  • 1 篇 distributed info...
  • 1 篇 services computi...
  • 1 篇 grid systems s.a...
  • 1 篇 microsoft
  • 1 篇 hubei key labora...
  • 1 篇 department of co...
  • 1 篇 line 1 school of...
  • 1 篇 national enginee...
  • 1 篇 unit faculty of ...
  • 1 篇 candc research l...
  • 1 篇 federal universi...

作者

  • 4 篇 jin hai
  • 3 篇 zou deqing
  • 3 篇 hai jin
  • 2 篇 sato fernando
  • 2 篇 yu heonchang
  • 2 篇 lee jonghyuk
  • 2 篇 kwon oh-young
  • 2 篇 oliveira allan
  • 2 篇 chin sungho
  • 2 篇 botega leonardo
  • 2 篇 buyya rajkumar
  • 2 篇 kim tae-geun
  • 1 篇 hu weisheng
  • 1 篇 guan haibing
  • 1 篇 breton vincent
  • 1 篇 hsu tsan-sheng
  • 1 篇 stynes jeanne
  • 1 篇 f'bio rodigues
  • 1 篇 li heting
  • 1 篇 luo jiwen

语言

  • 31 篇 英文
  • 1 篇 葡萄牙文
检索条件"机构=Grid Computing and Distributed Systems Lab."
32 条 记 录,以下是1-10 订阅
排序:
NebulaFL: Effective Asynchronous Federated Learning for JointCloud computing
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Fei Hu, Ming Xie, Zhiyu Shi, Peichang Xie, Xiaofei Yi, Guodong Wang, Huaimin National Key Lab. of Parallel and Distributed Processing National University of Defense Technology Changsha China School of Computing and Information Systems Singapore Management University Singapore Xiangjiang Lab Changsha China
With advancements in AI infrastructure and Trusted Execution Environment (TEE) technology, Federated Learning as a Service (FLaaS) through JointCloud computing (JCC) is promising to break through the resource constrai... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer Science  20
A Multi-Dimensional Assessment Model and Its Application in ...
收藏 引用
21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
作者: Luo, Jiwen Lu, Feng Wang, Tao Key Lab. of Parallel and Distributed Computing College of Computer National University of Defense Technology Changsha China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Computer science is a practical discipline. It is always a great challenge to evaluate students' computer practice using computer-aided means for large scale students. We always need to address problems such as su... 详细信息
来源: 评论
Espresso: Brewing Java for More Non-Volatility with Non-volatile Memory
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Mingyu Zhao, Ziming Li, Haoyu Li, Heting Chen, Haibo Zang, Binyu Guan, Haibing Shanghai Key Lab. of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University
Fast, byte-addressable non-volatile memory (NVM) em-braces both near-DRAM latency and disk-like persistence, which has generated considerable interests to revolutionize system software stack and programming models. Ho... 详细信息
来源: 评论
Short: CICC: A fine-grained, semantic-aware, and transparent approach to preventing permission leaks for android permission managers  8
Short: CICC: A fine-grained, semantic-aware, and transparent...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: Wang, Daibin Yao, Haixia Li, Yingjiu Jin, Hai Zou, Deqing Deng, Robert H. Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Information Systems Singapore Management University Singapore
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app&#... 详细信息
来源: 评论
Self-Adaptive Extracting Academic Entities from World Wide Web
Self-Adaptive Extracting Academic Entities from World Wide W...
收藏 引用
International Conference on Collab.rative computing: Networking, Applications and Worksharing (Collab.rateCom)
作者: Pingpeng Yuan Yi Li Hai Jin Ling Liu Services Computing Technology and System Lab. Huazhong University of Science and Technology Wuhan China Distributed Data Intensive Systems Lab. Georgia Institute of Technology Atlanta Georgia
Huge amount of entities and theirs relationships are posted on the Web. Those entities and theirs relationship networks help many activities. In this paper, we focus on the task of extracting academic entity network f... 详细信息
来源: 评论
A multi-resource load balancing algorithm for cloud cache systems  13
A multi-resource load balancing algorithm for cloud cache sy...
收藏 引用
28th Annual ACM Symposium on Applied computing, SAC 2013
作者: Jia, Yu Brondino, Ivan Peris, Ricardo Jiménez Martínez, Marta Patiño Ma, Dianfu Distributed Systems Lab. Universidad Politécnica de Madrid Spain Advanced Computing Technology Institute Beihang University China
With the advent of cloud computing model, distributed caches have become the cornerstone for building scalab.e applications. Popular systems like Facebook [1] or Twitter use Memcached [5], a highly scalab.e distribute... 详细信息
来源: 评论
Augmented reality and tangible user interfaces integration for enhancing the user experience
Augmented reality and tangible user interfaces integration f...
收藏 引用
11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry, VRCAI 2012
作者: Rodrigues, Fábio Sato, Fernando Botega, Leonardo Oliveira, Allan Computing and Information Systems Research Lab. Centro Universitário Eurípides de Marília Brazil Wireless Networks and Distributed Interactive Simulations Laboratory Universidade Federal de São Carlos Brazil
The integration of post-wimp computer interfaces arises as an alternative to meet individual limitations of each one, considering both interaction components and feedbacks to users. Tangible interfaces can present res... 详细信息
来源: 评论