咨询与建议

限定检索结果

文献类型

  • 416 篇 会议
  • 157 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 580 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 350 篇 工学
    • 314 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 59 篇 信息与通信工程
    • 33 篇 生物工程
    • 28 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 24 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 13 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 化学工程与技术
    • 6 篇 仪器科学与技术
    • 6 篇 土木工程
  • 121 篇 理学
    • 64 篇 数学
    • 36 篇 生物学
    • 21 篇 系统科学
    • 13 篇 化学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
  • 99 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 15 篇 法学
    • 8 篇 法学
    • 7 篇 社会学
  • 10 篇 经济学
    • 9 篇 应用经济学
  • 5 篇 医学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 2 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 cloud computing
  • 24 篇 grid computing
  • 24 篇 computational mo...
  • 22 篇 servers
  • 19 篇 scalability
  • 19 篇 semantics
  • 17 篇 bandwidth
  • 17 篇 virtualization
  • 17 篇 virtual machine
  • 14 篇 computer archite...
  • 13 篇 memory managemen...
  • 13 篇 feature extracti...
  • 13 篇 instruction sets
  • 13 篇 data models
  • 12 篇 algorithm design...
  • 12 篇 heuristic algori...
  • 11 篇 throughput
  • 11 篇 protocols
  • 10 篇 computer science
  • 10 篇 parallel process...

机构

  • 102 篇 national enginee...
  • 69 篇 services computi...
  • 55 篇 school of comput...
  • 53 篇 services computi...
  • 49 篇 services computi...
  • 49 篇 school of cyber ...
  • 33 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 cluster and grid...
  • 27 篇 services computi...
  • 26 篇 hubei key labora...
  • 25 篇 huazhong univers...
  • 17 篇 school of softwa...
  • 16 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 national enginee...

作者

  • 248 篇 jin hai
  • 242 篇 hai jin
  • 60 篇 xiaofei liao
  • 51 篇 liao xiaofei
  • 39 篇 deqing zou
  • 33 篇 shi xuanhua
  • 32 篇 zou deqing
  • 30 篇 wu song
  • 27 篇 song wu
  • 23 篇 hu shengshan
  • 22 篇 ran zheng
  • 19 篇 long zheng
  • 19 篇 haikun liu
  • 18 篇 jiang wenbin
  • 17 篇 yu zhang
  • 16 篇 zhang leo yu
  • 16 篇 xuanhua shi
  • 15 篇 jiang xiao
  • 13 篇 xia xie
  • 13 篇 yuan pingpeng

语言

  • 556 篇 英文
  • 19 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab"
580 条 记 录,以下是41-50 订阅
排序:
Ciphertext-Policy Attribute-Based Encryption with Short Keys
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 655-660页
作者: XU Peng TANG Yong JIANG Wenbin JIN Hai ZOU Deqing Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to red... 详细信息
来源: 评论
Text-augmented long-term relation dependency learning for knowledge graph representation
High-Confidence Computing
收藏 引用
High-Confidence computing 2025年
作者: Quntao Zhu Mengfan Li Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) ... 详细信息
来源: 评论
Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第4期1卷 436-449页
作者: YU Yijiao JIN Hai Services Computing Technology and System Lab Cluster and Grid Computing LabHuazhong University of Science and TechnologyWuhan 430074China
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart o... 详细信息
来源: 评论
ReCSA:a dedicated sort accelerator using ReRAM-based content addressable memory
收藏 引用
Frontiers of Computer Science 2023年 第2期17卷 1-13页
作者: Huize LI Hai JIN Long ZHENG Yu HUANG Xiaofei LIAO National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the increasing amount of data,there is an urgent need for efficient sorting algorithms to process large data *** sorting algorithms have attracted much attention because they can take advantage of different hardw... 详细信息
来源: 评论
Precise control of page cache for containers
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 17-30页
作者: Kun WANG Song WU Shengbang LI Zhuo HUANG Hao FAN Chen YU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi... 详细信息
来源: 评论
Resource abstraction and data placement for distributed hybrid memory pool
收藏 引用
Frontiers of Computer Science 2021年 第3期15卷 47-57页
作者: Tingting CHEN Haikun LIU Xiaofei LIAO Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Gluster and Grid Computing LabSchool of Gomputing Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Emerging byte-addressable non-volatile memory(NVM)technologies offer higher density and lower cost than DRAM,at the expense of lower performance and limited write *** have been many studies on hybrid NVM/DRAM memory m... 详细信息
来源: 评论
FunctionFlow:coordinating parallel tasks
收藏 引用
Frontiers of Computer Science 2019年 第1期13卷 73-85页
作者: Xuepeng FAN Xiaofei LIAO Hai JIN Services Computing Technology and System Lab (SCTS)&Cluster and Grid Computing Lab (CGCL) School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the growing allel programming,nowadays popularity of task-based partask-parallel programming libraries and languages are still with limited support for coordinating parallel *** limitation forces programmers to u... 详细信息
来源: 评论
Optimizing the Copy-on-Write Mechanism of Docker by Dynamic Prefetching
收藏 引用
Tsinghua Science and technology 2021年 第3期26卷 266-274页
作者: Yan Jiang Wei Liu Xuanhua Shi Weizhong Qiang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHuazhong University of Science and TechnologyWuhan 430074China
Docker,as a mainstream container solution,adopts the Copy-on-Write(CoW)mechanism in its storage *** mechanism satisfies the need of different containers to share the same ***,when a single container performs operation... 详细信息
来源: 评论
Answering reachability queries with ordered label constraints over labeled graphs
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 105-117页
作者: Daoliang HE Pingpeng YUAN Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science&TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands labe... 详细信息
来源: 评论
CMM :Credential Migration Management system based on trusted computing in CGSP
收藏 引用
中国高等学校学术文摘·计算机科学 2007年 第2期1卷 200-207页
作者: JIN Hai YI Chuanjiang Services Computing Technology and System Lab Cluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
In grid computing environment,grid users often *** the original user may be under the risk of information leakage and identity abused for sending his credential to remote computing *** grid security practice has few m... 详细信息
来源: 评论