咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 28 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61 篇 工学
    • 47 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 电气工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 19 篇 理学
    • 13 篇 数学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 5 篇 医学
    • 5 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 6 篇 wireless communi...
  • 6 篇 wireless sensor ...
  • 5 篇 approximation al...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 robot sensing sy...
  • 4 篇 virtualization
  • 3 篇 conferences
  • 3 篇 runtime
  • 3 篇 registers
  • 3 篇 linux
  • 3 篇 throughput
  • 3 篇 graphics process...
  • 3 篇 semantics
  • 3 篇 algorithm design...
  • 3 篇 receivers
  • 3 篇 protocols
  • 3 篇 kernel
  • 3 篇 hardware
  • 3 篇 robot kinematics

机构

  • 25 篇 shanghai key lab...
  • 10 篇 shanghai key lab...
  • 9 篇 school of softwa...
  • 9 篇 state key labora...
  • 8 篇 shanghai key lab...
  • 7 篇 school of softwa...
  • 6 篇 shanghai key lab...
  • 6 篇 department of co...
  • 5 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 school of softwa...
  • 4 篇 intel china soft...
  • 4 篇 school of softwa...
  • 4 篇 department of co...
  • 3 篇 school of softwa...
  • 3 篇 national key lab...
  • 3 篇 school of inform...
  • 3 篇 department of co...
  • 3 篇 alibaba group
  • 2 篇 school of mathem...

作者

  • 21 篇 guan haibing
  • 13 篇 haibing guan
  • 11 篇 guihai chen
  • 10 篇 liang alei
  • 10 篇 qi zhengwei
  • 7 篇 alei liang
  • 6 篇 haipeng dai
  • 5 篇 zhengwei qi
  • 5 篇 chen kai
  • 5 篇 wu fan
  • 5 篇 chen guihai
  • 4 篇 dong yaozu
  • 4 篇 xiaofeng gao
  • 4 篇 ma ruhui
  • 4 篇 bin yao
  • 4 篇 xiaobing wu
  • 4 篇 li wu-jun
  • 4 篇 fan wu
  • 3 篇 chen kefei
  • 3 篇 kai chen

语言

  • 98 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=School of Software and Shanghai Key Laboratory of Scalable Computing and Systems"
103 条 记 录,以下是51-60 订阅
排序:
VGRIS: Virtualized GPU resource isolation and scheduling in cloud gaming
VGRIS: Virtualized GPU resource isolation and scheduling in ...
收藏 引用
22nd ACM International Symposium on High-Performance Parallel and Distributed computing, HPDC 2013
作者: Yu, Miao Zhang, Chao Qi, Zhengwei Yao, Jianguo Wang, Yin Guan, Haibing School of Software Shanghai Jiao Tong University Shanghai China HP Labs. Palo Alto CA United States Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Cylab Carnegie Mellon University United States
Fueled by the maturity of virtualization technology for Graphics Processing Unit (GPU), there is an increasing number of data centers dedicated to GPU-related computation tasks in cloud gaming. However, GPU resource s... 详细信息
来源: 评论
HYBit: A hybrid taint analyzing framework for binary programs
HYBit: A hybrid taint analyzing framework for binary program...
收藏 引用
4th International Conference on Advances in Swarm Intelligence, ICSI 2013
作者: Zhu, Erzhou Guan, Haibing Liang, Alei Xu, Rongbin Li, Xuejian Liu, Feng Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei 230601 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China
For the purpose of discovering security flaws in software, many dynamic and static taint analyzing techniques have been proposed. The dynamic techniques can precisely find the security flaws of the software;but it suf... 详细信息
来源: 评论
An energy-efficient and scalable eDRAM-based register file architecture for GPGPU  13
An energy-efficient and scalable eDRAM-based register file a...
收藏 引用
40th Annual International Symposium on Computer Architecture, ISCA 2013
作者: Jing, Naifeng Shen, Yao Lu, Yao Ganapathy, Shrikanth Mao, Zhigang Guo, Minyi Canal, Ramon Liang, Xiaoyao Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China School of Microelectronics Shanghai Jiao Tong University Shanghai China Universitat Politecnica de Catalunya Barcelona Spain
The heavily-threaded data processing demands of streaming multiprocessors (SM) in a GPGPU require a large register file (RF). The fast increasing size of the RF makes the area cost and power consumption unaffordable f... 详细信息
来源: 评论
VGRIS: virtualized GPU resource isolation and scheduling in cloud gaming  13
VGRIS: virtualized GPU resource isolation and scheduling in ...
收藏 引用
Proceedings of the 22nd international symposium on High-performance parallel and distributed computing
作者: Miao Yu Chao Zhang Zhengwei Qi Jianguo Yao Yin Wang Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems. School of Software Shanghai Jiao Tong University Shanghai China HP Labs Palo Alto USA
Fueled by the maturity of virtualization technology for Graphics Processing Unit (GPU), there is an increasing number of data centers dedicated to GPU-related computation tasks in cloud gaming. However, GPU resource s... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Dynamic monitoring of optimal locations in road network databases
收藏 引用
The VLDB Journal 2013年 第5期23卷 697-720页
作者: Bin Yao Xiaokui Xiao Feifei Li Yifan Wu Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China School of Computer Engineering Nanyang Technological University Singapore Singapore School of Computing University of Utah Salt Lake City USA
Optimal location (OL) queries are a type of spatial queries that are particularly useful for the strategic planning of resources. Given a set of existing facilities and a set of clients, an OL query asks for a locatio...
来源: 评论
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
Static program analysis assisted dynamic taint tracking for ...
收藏 引用
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program from malicious behaviors, but fails to prov... 详细信息
来源: 评论
An Algorithm for Cost-Effectively Storing Scientific Datasets with Multiple Service Providers in the Cloud
An Algorithm for Cost-Effectively Storing Scientific Dataset...
收藏 引用
IEEE International Conference on e-Science and Grid computing
作者: Dong Yuan Xiao Liu Lizhen Cui Tiantian Zhang Wenhao Li Dahai Cao Yun Yang Centre for Computing Engineering and Software Systems Swinburne University of Technology Melbourne Australia Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute of East China Normal University Shanghai China School of Computer Science and Technology Shandong University Jinan China School of Computer Science and Technology Anhui University Hefei China
The proliferation of cloud computing allows scientists to deploy computation and data intensive applications without infrastructure investment, where large generated datasets can be flexibly stored with multiple cloud... 详细信息
来源: 评论
High availability through output continuity
High availability through output continuity
收藏 引用
2012 IEEE International Conference on Cluster computing Workshops, Cluster Workshops 2012
作者: Ye, Wei Dong, Yaozu Ma, Ruhui Liang, Alei Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Intel China Software Center Shanghai 200241 China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论