咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 356 篇 期刊文献

馆藏范围

  • 717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 426 篇 工学
    • 311 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 72 篇 信息与通信工程
    • 56 篇 生物工程
    • 47 篇 电气工程
    • 46 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 29 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 21 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 网络空间安全
    • 15 篇 建筑学
    • 15 篇 交通运输工程
  • 242 篇 理学
    • 115 篇 数学
    • 71 篇 物理学
    • 63 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 地球物理学
    • 18 篇 系统科学
  • 110 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 21 篇 法学
    • 13 篇 社会学
  • 10 篇 经济学
  • 10 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 semantics
  • 19 篇 deep learning
  • 17 篇 machine learning
  • 16 篇 training
  • 14 篇 accuracy
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 12 篇 graph neural net...
  • 11 篇 cloud computing
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 optimization
  • 9 篇 costs
  • 9 篇 blockchain

机构

  • 102 篇 national enginee...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 28 篇 beijing advanced...
  • 27 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 21 篇 guangxi cooperat...
  • 18 篇 school of inform...
  • 16 篇 center for data ...
  • 14 篇 dipartimento di ...
  • 14 篇 zhejiang lab
  • 13 篇 shandong provinc...
  • 13 篇 national enginee...
  • 13 篇 national center ...
  • 13 篇 key laboratory o...

作者

  • 125 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 17 篇 zhang leo yu
  • 16 篇 zou deqing
  • 16 篇 yu zhang
  • 16 篇 lionetti stefano
  • 15 篇 deqing zou
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan wei
  • 11 篇 dinkar sitaram
  • 11 篇 wan yao

语言

  • 647 篇 英文
  • 62 篇 其他
  • 14 篇 中文
检索条件"机构=National Center in Big Data and Cloud Computing"
717 条 记 录,以下是271-280 订阅
排序:
GraphFly: Efficient Asynchronous Streaming Graphs Processing via Dependency-Flow
GraphFly: Efficient Asynchronous Streaming Graphs Processing...
收藏 引用
Supercomputing Conference
作者: Dan Chen Chuangyi Gui Yi Zhang Hai Jin Long Zheng Yu Huang Xiaofei Liao National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Existing streaming graph processing systems typically adopt two phases of refinement and recomputation to ensure the correctness of the incremental computation. However, severe redundant memory accesses exist due to t... 详细信息
来源: 评论
FaaSTube: Optimizing GPU-oriented data Transfer for Serverless computing
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Hao Deng, Junxiao Yu, Minchen Yu, Yue Liu, Yaochen Fan, Hao Wu, Song Wang, Wei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Hong Kong University of Science and Technology Hong Kong The Chinese University of Hong Kong Shenzhen China
Serverless computing has gained significant traction for machine learning inference applications, which are often deployed as serverless workflows consisting of multiple CPU and GPU functions with data dependency. How... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 875-894页
作者: Muhammad Reazul Haque Saw Chin Tan Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.P.C.Rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya Prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya Faculty of Computing&Informatics Multimedia UniversityPersiaranMultimediaCyberjaya63100SelangorMalaysia Faculty of Engineering Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Faculty of Computing and Informatics University Malaysia SabahJalan UMSKota Kinabalu Sabah88400Malaysia Telekom Malaysia Research&Development TM Innovation Centre63000CyberjayaSelangorMalaysia Federal University of Piauí(UFPI) TeresinaPIBrazil Instituto de Telecomunica珲es 6201-001Covilh?Portugal National Center of Robotics and Automation-Condition Monitoring Systems Lab MUETJamshoroPakistan Department of Electrical and Electronic Engineering BUETDhaka1205Bangladesh Department of Electrical Engineering and Computer Science Data Science and Cybersecurity CenterHoward UniversityWashingtonDCUSA Cloud Computing and Distributed Systems(CLOUDS)Laboratory School of Computing and Information SystemsThe University of MelbourneMelbourneVIC 3053Australia
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... 详细信息
来源: 评论
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lowe...
收藏 引用
Reliable Distributed Systems
作者: Xiaohai Dai Zhaonan Zhang Jiang Xiao Jingtao Yue Xia Xie Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China
To enable parallel processing, the Directed Acyclic Graph (DAG) structure is introduced to the design of asyn-chronous Byzantine Fault Tolerant (BFT) consensus protocols, known as DAG-based BFT. Existing DAG-based BFT...
来源: 评论
QoS-Aware and Cost-Efficient Dynamic Resource Allocation for Serverless ML Workflows
QoS-Aware and Cost-Efficient Dynamic Resource Allocation for...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Hao Wu Junxiao Deng Hao Fan Shadi Ibrahim Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Inria Univ. Rennes CNRS IRISA France
Machine Learning (ML) workflows are increasingly deployed on serverless computing platforms to benefit from their elasticity and fine-grain pricing. Proper resource allocation is crucial to achieve fast and cost-effic...
来源: 评论
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论
No Free Lunch Theorem for Privacy-Preserving LLM Inference
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaojin Fei, Yulin Kang, Yan Chen, Wei Fan, Lixin Jin, Hai Yang, Qiang Huazhong University of Science and Technology China WeBank China Hong Kong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Individuals and businesses have been significantly benefited by Large Language Models (LLMs) including PaLM, Gemini and ChatGPT in various ways. For example, LLMs enhance productivity, reduce costs, and enable us to f... 详细信息
来源: 评论
Energy Efficiency for HDFS  9
Energy Efficiency for HDFS
收藏 引用
9th IEEE International Conference on cloud computing in Emerging Markets, CCEM 2020
作者: Das, Abhishek Snv, Bhargav Sanketh Reddy, N. Phalachandra, H.L. Pes University Dept. of Computer Science and Engineering Bangalore India Center for Cloud Computing and Big Data Pes University Bangalore India
The rapidly increasing growth of big data is leading to increased usage of distributed computing and clusters as this can enable tasks to be split and processed in parallel resulting in higher computational efficiency... 详细信息
来源: 评论
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Challenges and Approaches for Mitigating Byzantine Attacks i...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Junyu Shi Wei Wan Shengshan Hu Jianrong Lu Leo Yu Zhang School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Information Technology Deakin University
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论