咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 69 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 网络空间安全
    • 8 篇 电气工程
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 129 篇 hai jin
  • 44 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 ran zheng
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 long zheng
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 224 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Laboratory of Services Computing Technology and System"
240 条 记 录,以下是61-70 订阅
排序:
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Collaborative wi-fi fingerprinting indoor positioning using near relation  24
Collaborative wi-fi fingerprinting indoor positioning using ...
收藏 引用
2020 24th ISPRS Congress - Technical Commission IV on Spatial Information Science
作者: Wang, Y. Wang, W. Li, X. Zhang, W. Guo, R. National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Urban Informatics Shenzhen Key Laboratory of Spatial Smart Sensing and Services Research Institute for Smart Cities School of Architecture and Urban Planning Shenzhen University Shenzhen China
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment. Howeve... 详细信息
来源: 评论
VRFPS: A Novel Virtual Machine-Based Real-time File Protection system
VRFPS: A Novel Virtual Machine-Based Real-time File Protecti...
收藏 引用
International Conference on Software Engineering Research, Management and Applications (SERA)
作者: Feng Zhao Yali Jiang Guofu Xiang Hai Jin Wenbin Jiang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the development of virtualization technology, file protection in virtual machine, especially in guest OS, becomes more and more important. Traditional host-based file protection system resides the critical module... 详细信息
来源: 评论
Fast Triangle Counting on GPU
Fast Triangle Counting on GPU
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Chuangyi Gui Long Zheng Pengcheng Yao Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China
Triangle counting is one of the most basic graph applications to solve many real-world problems in a wide variety of domains. Exploring the massive parallelism of the Graphics Processing Unit (GPU) to accelerate the t... 详细信息
来源: 评论
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Network
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Net...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Hao Zhang Hai Jin Qin Zhang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks beco... 详细信息
来源: 评论
Adaptive audio-aware scheduling in Xen virtual environment
Adaptive audio-aware scheduling in Xen virtual environment
收藏 引用
IEEE/ACS International Conference on Computer systems and Applications
作者: Huacai Chen Hai Jin Kan Hu Minhao Yuan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the development of client virtualization technology, it has become an important tendency to apply soft real-time applications in virtual environment. Currently, most schedulers in VMM (i.e., virtual machine monit... 详细信息
来源: 评论
Content-Based Design Patent Image Retrieval Using Structured Features and Multiple Feature Fusion
Content-Based Design Patent Image Retrieval Using Structured...
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Lei Zhu Hai Jin Ran Zheng Qin Zhang Xia Xie Mingrui Guo Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Traditional design patent verification based on manual comparison is too labor-intensive, time-consuming and subjective to be applied efficiently in practice. Design patent image retrieval system is designed to retrie... 详细信息
来源: 评论
Optimize Performance of Virtual Machine Checkpointing via Memory Exclusion
Optimize Performance of Virtual Machine Checkpointing via Me...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Haikun Liu Hai Jin Xiaofei Liao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Virtual machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level... 详细信息
来源: 评论
XenLR: Xen-based Logging for Deterministic Replay
XenLR: Xen-based Logging for Deterministic Replay
收藏 引用
Japan-China Joint Workshop on Frontier of Computer Science and technology (FCST)
作者: Haikun Liu Hai Jin Xiaofei Liao Zhengqiu Pan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Virtual machine (VM) based logging-and-replay technology has attracted much attention for system security, fault tolerance, and debugging. However, so far there is not a replay system designed on virtual machine monit... 详细信息
来源: 评论