咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 141 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 447 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 269 篇 工学
    • 239 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 53 篇 信息与通信工程
    • 30 篇 生物工程
    • 23 篇 电气工程
    • 21 篇 控制科学与工程
    • 18 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 13 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 6 篇 安全科学与工程
    • 5 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
  • 95 篇 理学
    • 53 篇 数学
    • 31 篇 生物学
    • 15 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 73 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 5 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 文学
  • 3 篇 医学
  • 2 篇 农学
  • 1 篇 军事学

主题

  • 21 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 13 篇 cloud computing
  • 11 篇 computer archite...
  • 11 篇 servers
  • 11 篇 costs
  • 11 篇 data models
  • 10 篇 deep neural netw...
  • 10 篇 memory managemen...
  • 10 篇 feature extracti...
  • 9 篇 computer science
  • 9 篇 operating system...
  • 9 篇 throughput
  • 9 篇 virtual machinin...
  • 9 篇 training
  • 8 篇 software enginee...
  • 8 篇 machine learning

机构

  • 101 篇 national enginee...
  • 73 篇 services computi...
  • 55 篇 school of comput...
  • 45 篇 school of cyber ...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 16 篇 school of softwa...
  • 16 篇 zhejiang lab
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 9 篇 school of comput...
  • 8 篇 cluster and grid...
  • 8 篇 jinyinhu laborat...

作者

  • 195 篇 hai jin
  • 171 篇 jin hai
  • 48 篇 xiaofei liao
  • 33 篇 liao xiaofei
  • 32 篇 deqing zou
  • 23 篇 zou deqing
  • 20 篇 song wu
  • 19 篇 hu shengshan
  • 19 篇 haikun liu
  • 19 篇 shi xuanhua
  • 18 篇 wu song
  • 17 篇 long zheng
  • 15 篇 jiang xiao
  • 15 篇 ran zheng
  • 14 篇 yu zhang
  • 13 篇 zhang leo yu
  • 13 篇 yu huang
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui

语言

  • 423 篇 英文
  • 19 篇 其他
  • 6 篇 中文
检索条件"机构=Grid and Services Computing Lab"
447 条 记 录,以下是21-30 订阅
排序:
It Takes Two to Tango: Serverless Workflow Serving via Bilaterally Engaged Resource Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Jing Wang, Lin Deng, Quanfeng Yu, Chen Zhang, Dong Yan, Bingheng Liu, Fangming National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology China Paderborn University Germany Inspur Data Co. Ltd. China Peng Cheng Laboratory China
Serverless platforms typically adopt an early-binding approach for function sizing, requiring developers to specify an immutable size for each function within a workflow beforehand. Accounting for potential runtime va... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
FedMHO: Heterogeneous One-Shot Federated Learning Towards Resource-Constrained Edge Devices
arXiv
收藏 引用
arXiv 2025年
作者: Yao, Dezhong Shi, Yuexin Liu, Tongtong Xu, Zhiqiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates
Federated Learning (FL) is increasingly adopted in edge computing scenarios, where a large number of heterogeneous clients operate under constrained or sufficient resources. The iterative training process in conventio... 详细信息
来源: 评论
Maverick: Personalized Edge-Assisted Federated Learning with Contrastive Training  34
Maverick: Personalized Edge-Assisted Federated Learning with...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Kaibin He, Qiang Dong, Zeqian Chen, Rui He, Chuan Chua, Caslon Chen, Feifei Yang, Yun Swinburne University of Technology Melbourne Australia Huazhong University of Science and Technology Wuhan China Deakin University Melbourne Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
In an edge-assisted federated learning (FL) system, edge servers aggregate the local models from the clients within their coverage areas to produce intermediate models for the production of the global model. This sign... 详细信息
来源: 评论
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit Dataflows
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Wenju Zhao Pengcheng Yao Dan Chen Long Zheng Xiaofei Liao Qinggang Wang Shaobo Ma Yu Li Haifeng Liu Wenjing Xiao Yufei Sun Bing Zhu Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore School of Computer Electronics and Information Guangxi University NanNing China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
Working Smarter Not Harder: Hybrid Cooling for Deep Learning in Edge Datacenters
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2025年
作者: Pei, Qiangyu Yuan, Yongjie Hu, Haichuan Wang, Lin Zhang, Dong Yan, Bingheng Yu, Chen Liu, Fangming Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Jinan Inspur Data Co. Ltd. China Huazhong University of Science and Technology Peng Cheng Laboratory China
The proliferation of deep-learning-based mobile and IoT applications has driven the increasing deployment of edge datacenters equipped with domain-specific accelerators. The unprecedented computing power offered by th... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
EdgeThemis: Ensuring Model Integrity for Edge Intelligence  25
EdgeThemis: Ensuring Model Integrity for Edge Intelligence
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Yang, Jiyu He, Qiang Zhou, Zheyu Dai, Xiaohai Chen, Feifei Tian, Cong Yang, Yun Swinburne University of Technology Melbourne Australia Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Deakin University Melbourne Australia Xidian University Xi’an China
Machine learning (ML) models are widely deployed on edge nodes, such as mobile phones and edge servers, to power a wide range of AI applications over the web. Ensuring the integrity of these edge models is paramount, ... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论