咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 69 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 网络空间安全
    • 8 篇 电气工程
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 129 篇 hai jin
  • 44 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 ran zheng
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 long zheng
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 224 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Laboratory of Services Computing Technology and System"
240 条 记 录,以下是191-200 订阅
排序:
The Theory of Triangle Type-2 Fuzzy Sets
The Theory of Triangle Type-2 Fuzzy Sets
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Zehua Lv Hai Jin Pingpeng Yuan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Interval type-2 fuzzy set is the most popular kind of type-2 fuzzy set, its characteristic is that all the secondary membership functions equal to 1. Though interval type-2 fuzzy sets can reduce the calculation comple... 详细信息
来源: 评论
Agent-Based Data Loading Method in MedImGrid
Agent-Based Data Loading Method in MedImGrid
收藏 引用
International Conference on New Trends in Information and Service Science, NISS
作者: Ran Zheng Hai Jin Qin Zhang Xin Liu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Agent-based grid data loading method aims at integrating heterogeneous hospitalspsila information systems into a medical information exchange platform based on grid middleware. It collects distributed data sets for de... 详细信息
来源: 评论
Service Guarantee for Inter-domain Movement in Wireless Peer-to-Peer Live Streaming system
Service Guarantee for Inter-domain Movement in Wireless Peer...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN)
作者: Wenbin Jiang Haixiang Li Hai Jin Xiaofei Liao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
When extending peer-to-peer live streaming system to IEEE 802.11-based wireless network, service guarantee for inter-domain movement is an obstacle since IEEE 802.11 has no QoS maintenance mechanism for it. The stream... 详细信息
来源: 评论
DVM-MAC: A Mandatory Access Control system in Distributed Virtual computing Environment
DVM-MAC: A Mandatory Access Control System in Distributed Vi...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Deqing Zou Lei Shi Hai Jin Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
We design and implement a Mandatory Access Control (MAC) system in distributed virtual computing environment, named DVM-MAC, aiming to provide distributed trust through enforcing MAC policies. In DVM-MAC, Prioritized ... 详细信息
来源: 评论
A performance study of web server based on Hardware-assisted Virtual Machine
A performance study of web server based on Hardware-assisted...
收藏 引用
ACS/IEEE International Conference on Computer systems and Applications
作者: Zhiyuan Shao Hai Jin De Zhang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the resurgence of virtual machine technology, vendors build virtualization technology support in the processors. Virtual machines relying on such support are called Hardware-assisted Virtual Machines (HVM guests ... 详细信息
来源: 评论
A Simulation Times Model of Multi-core Simulation
A Simulation Times Model of Multi-core Simulation
收藏 引用
WRI World Congress on Software Engineering, WCSE
作者: Zhibin Yu Hai Jin Yabin Hu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Chip multi-processor (CMP) increases processor throughput by duplicating resources for many threads. Due to the main frequency of a single processor approaching to limit, CMP is becoming more and more popular. However... 详细信息
来源: 评论
A method of multi-VM automatic network configuration
A method of multi-VM automatic network configuration
收藏 引用
IEEE International Conference on Intelligent computing and Intelligent systems (ICIS)
作者: Xin Ge Hai Jin Song Wu Xuanhua Shi Wei Gao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
In multi-VM (virtual machine) environment, the virtual machine network management plays an important role. Traditional multi-VM management systems are accustomed to using the DHCP mechanism. However, with the developm... 详细信息
来源: 评论
Pulmonary Disease Census Aiding system Based on Medical Image Grid
Pulmonary Disease Census Aiding System Based on Medical Imag...
收藏 引用
Asian Conference on Intelligent Information and Database systems, ACIIDS
作者: Hai Jin Aobing Sun Qin Zhang Ran Zheng Ruhan He Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratorie school of Computer Science and Technology Huazhong University of Science and Technology HUST Wuhan China
The large population exerts high burdens to Chinese health census works. In this paper, we propose our PDCAS (pulmonary disease census aiding system) based on medical image grid, which aims to utilize the superioritie... 详细信息
来源: 评论
Worm Containment in Peer-to-Peer Networks
Worm Containment in Peer-to-Peer Networks
收藏 引用
International Conference on Scalable computing and Communications;International Conference on Embedded computing, SCALCOM-EMBEDDEDCOM
作者: Sirui Yang Hai Jin Bo Li Xiaofei Liao Hong Yao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Hong Kong University of Science and Technology Hong Kong China
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) networks, especially with respect to worm epidemics. However, existing worm containment mechanisms can be largely ineffectiv... 详细信息
来源: 评论
Modeling and Analyzing Dynamic Forensics system Based on Intrusion Tolerance
Modeling and Analyzing Dynamic Forensics System Based on Int...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Lin Chen Zhitang Li Cuixia Gao Yingshu Liu School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
As an important part of computer forensics, network forensics particularly places emphasis on dynamic network information collection and proactive defense. Most forensics systems based on intrusion detection or honeyp... 详细信息
来源: 评论