咨询与建议

限定检索结果

文献类型

  • 39 篇 会议
  • 30 篇 期刊文献

馆藏范围

  • 69 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 11 篇 生物工程
    • 8 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 12 篇 生物学
    • 5 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 6 篇 deep neural netw...
  • 4 篇 machine learning
  • 3 篇 scalability
  • 3 篇 computer archite...
  • 3 篇 containers
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 2 篇 runtime
  • 2 篇 deep learning
  • 2 篇 resource managem...
  • 2 篇 monitoring
  • 2 篇 codes
  • 2 篇 detectors
  • 2 篇 training
  • 2 篇 adaptation model...
  • 1 篇 ciphertext
  • 1 篇 software systems
  • 1 篇 information syst...
  • 1 篇 maintenance engi...

机构

  • 35 篇 school of cyber ...
  • 32 篇 school of comput...
  • 25 篇 cluster and grid...
  • 24 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 hubei engineerin...
  • 22 篇 services computi...
  • 15 篇 school of softwa...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 7 篇 huazhong univers...
  • 7 篇 jinyinhu laborat...
  • 5 篇 national enginee...
  • 4 篇 jin yinhu labora...
  • 4 篇 school of comput...
  • 4 篇 nanyang technolo...
  • 4 篇 national enginee...
  • 4 篇 school of cyber ...
  • 3 篇 institute for ne...
  • 3 篇 school of inform...

作者

  • 32 篇 jin hai
  • 26 篇 hai jin
  • 16 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 7 篇 zou deqing
  • 7 篇 wan wei
  • 7 篇 deqing zou
  • 7 篇 wang xianlong
  • 5 篇 zhang hangtao
  • 5 篇 shengshan hu
  • 5 篇 zhang yechao
  • 4 篇 yao dezhong
  • 4 篇 leo yu zhang
  • 4 篇 minghui li
  • 4 篇 liu wei
  • 4 篇 ming wen
  • 4 篇 xu peng
  • 3 篇 yueming wu

语言

  • 66 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Key Lab of Cluster and Grid Computing"
69 条 记 录,以下是11-20 订阅
排序:
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Improve Docker Performance  16th
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Impro...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Gu, Lin Tang, Qizhi Wu, Song Jin, Hai Zhang, Yingxi Shi, Guoqiang Lin, Tingyu Rao, Jia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China State Key Laboratory of Intelligent Manufacturing System Technology Beijing100854 China The University of Texas at Arlington ArlingtonTX76019 United States
Docker has been widely adopted in production environment, but unfortunately deployment and cold-start of container are limited by the low speed of disk. The emerging non-volatile memory (NVM) technology, which has hig... 详细信息
来源: 评论
A Secure Synchronized Reading System over Time-Critical Online Contests
A Secure Synchronized Reading System over Time-Critical Onli...
收藏 引用
IEEE International Conference on Communications
作者: Wei Wang Peng Xu Hui Li Laurence Tianruo Yang Key Lab of Cloud Computing Technology Peking University Shenzhen China Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Embedded and Pervasive Computing Lab Huazhong University of Science and Technology Wuhan China
The time-critical online contest environment calls for an elegant and precise management system to start a contest online. The management system should simultaneously follow three rules of security that are confidenti... 详细信息
来源: 评论
FlexiFed: Personalized Federated Learning for Edge Clients with Heterogeneous Model Architectures  23
FlexiFed: Personalized Federated Learning for Edge Clients w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Chen, Chunyang Huang, Faliang Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Information Technology Monash University Australia Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Mobile and Web-of-Things (WoT) devices at the network edge account for more than half of the world's web traffic, making a great data source for various machine learning (ML) applications, particularly federated l... 详细信息
来源: 评论
GradSA: Gradient Sparsification and Accumulation for Communication-Efficient Distributed Deep Learning  15th
GradSA: Gradient Sparsification and Accumulation for Communi...
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Liu, Bo Jiang, Wenbin Zhao, Shaofeng Jin, Hai He, Bingsheng National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Huazhong University of Science and Technology Wuhan China Library Henan University of Economics and Law Zhengzhou China Department of Computer Science School of Computing National University of Singapore Singapore Singapore
Large-scale distributed deep learning is of great importance in various applications. For distributed training, the inter-node gradient communication often becomes the performance bottleneck. Gradient sparsification h... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论