咨询与建议

限定检索结果

文献类型

  • 196 篇 会议
  • 90 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 291 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 140 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 29 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 19 篇 生物工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 网络空间安全
    • 5 篇 材料科学与工程(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 66 篇 理学
    • 38 篇 数学
    • 19 篇 生物学
    • 8 篇 化学
    • 8 篇 系统科学
    • 7 篇 物理学
    • 5 篇 统计学(可授理学、...
  • 36 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 12 篇 图书情报与档案管...
  • 10 篇 法学
    • 7 篇 社会学
    • 3 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 distributed comp...
  • 25 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 concurrent compu...
  • 15 篇 resource managem...
  • 12 篇 quality of servi...
  • 11 篇 computer archite...
  • 10 篇 machine learning
  • 9 篇 grid computing
  • 8 篇 application soft...
  • 8 篇 processor schedu...
  • 8 篇 computer network...
  • 7 篇 parallel algorit...
  • 7 篇 deep learning
  • 7 篇 deep neural netw...
  • 6 篇 time factors
  • 6 篇 interference
  • 6 篇 feature extracti...
  • 6 篇 high performance...
  • 6 篇 testing

机构

  • 38 篇 school of cyber ...
  • 36 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 hubei engineerin...
  • 23 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 17 篇 parallel and dis...
  • 15 篇 school of inform...
  • 8 篇 jinyinhu laborat...
  • 7 篇 centre for paral...
  • 7 篇 national enginee...
  • 7 篇 science and tech...
  • 6 篇 huazhong univers...
  • 6 篇 center for paral...
  • 5 篇 parallel and dis...
  • 5 篇 department of co...
  • 5 篇 parallel and dis...
  • 5 篇 school of cyber ...

作者

  • 30 篇 jin hai
  • 22 篇 hai jin
  • 18 篇 li kuan-ching
  • 18 篇 yang chao-tung
  • 17 篇 hu shengshan
  • 12 篇 zhang leo yu
  • 12 篇 albert y. zomaya
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 11 篇 cai wentong
  • 10 篇 zomaya albert y.
  • 10 篇 wan wei
  • 8 篇 zahir tari
  • 7 篇 deqing zou
  • 7 篇 wentong cai
  • 7 篇 shengshan hu
  • 6 篇 javid taheri
  • 6 篇 minghui li
  • 6 篇 dehne f
  • 6 篇 dandamudi sivara...

语言

  • 278 篇 英文
  • 11 篇 其他
  • 2 篇 中文
检索条件"机构=Parallel and Distributed Computing Center School of Computer Science"
291 条 记 录,以下是61-70 订阅
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model Compression
Knowledge Distillation with Source-free Unsupervised Domain ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jing Tian Juan Chen Ning Jiang Chen Lin Bai Suqun Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Education Department of Guangxi Zhuang Autonomous Region Key Laboratory of Parallel Distributed and Intelligent Computing (Guangxi University) Nanning China
The pre-training language model BERT has brought significant performance improvements to a series of natural language processing tasks, but due to the large scale of the model, it is difficult to be applied in many pr...
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 875-894页
作者: Muhammad Reazul Haque Saw Chin Tan Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.P.C.Rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya Prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya Faculty of Computing&Informatics Multimedia UniversityPersiaranMultimediaCyberjaya63100SelangorMalaysia Faculty of Engineering Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Faculty of Computing and Informatics University Malaysia SabahJalan UMSKota Kinabalu Sabah88400Malaysia Telekom Malaysia Research&Development TM Innovation Centre63000CyberjayaSelangorMalaysia Federal University of Piauí(UFPI) TeresinaPIBrazil Instituto de Telecomunica珲es 6201-001Covilh?Portugal National Center of Robotics and Automation-Condition Monitoring Systems Lab MUETJamshoroPakistan Department of Electrical and Electronic Engineering BUETDhaka1205Bangladesh Department of Electrical Engineering and Computer Science Data Science and Cybersecurity CenterHoward UniversityWashingtonDCUSA Cloud Computing and Distributed Systems(CLOUDS)Laboratory School of Computing and Information SystemsThe University of MelbourneMelbourneVIC 3053Australia
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论