咨询与建议

限定检索结果

文献类型

  • 474 篇 会议
  • 180 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 372 篇 工学
    • 326 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 59 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 电气工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
  • 119 篇 理学
    • 65 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 117 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 13 篇 经济学
    • 12 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 34 篇 virtual machinin...
  • 30 篇 servers
  • 29 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 26 篇 cloud computing
  • 25 篇 scalability
  • 24 篇 bandwidth
  • 23 篇 computer archite...
  • 21 篇 computers
  • 20 篇 resource managem...
  • 19 篇 protocols
  • 19 篇 kernel
  • 19 篇 hardware
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 16 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 virtual machine ...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 29 篇 national enginee...
  • 28 篇 cluster and grid...
  • 27 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 21 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 13 篇 services computi...
  • 13 篇 cluster and grid...
  • 12 篇 national enginee...
  • 12 篇 service computin...

作者

  • 326 篇 hai jin
  • 234 篇 jin hai
  • 80 篇 xiaofei liao
  • 52 篇 deqing zou
  • 50 篇 liao xiaofei
  • 42 篇 song wu
  • 32 篇 zou deqing
  • 31 篇 shi xuanhua
  • 29 篇 wu song
  • 28 篇 xuanhua shi
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 qin zhang
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 626 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab & Cluster and Grid Computing Lab"
661 条 记 录,以下是161-170 订阅
排序:
WebCode2M: A Real-World Dataset for Code Generation from Webpage Designs  25
WebCode2M: A Real-World Dataset for Code Generation from Web...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Gui, Yi Li, Zhen Wan, Yao Shi, Yemin Zhang, Hongyu Su, Yi Chen, Bohua Chen, Dongping Wu, Siyuan Zhou, Xing Jiang, Wenbin Jin, Hai Zhang, Xiangliang Huazhong University of Science and Technology Wuhan China Peking University Beijing China Chongqing University Chongqing China Hubei University of Automotive Technology Shiyan China Rabbitpre AI Shenzhen China University of Notre Dame Notre Dame United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology China
Automatically generating webpage code from webpage designs can significantly reduce the workload of front-end developers, and recent Multimodal Large Language Models (MLLMs) have shown promising potential in this area... 详细信息
来源: 评论
Hyperbit: A Financial Temporal Knowledge Graph Data Storage system
SSRN
收藏 引用
SSRN 2022年
作者: Yuan, Pingpeng Han, Sheng Zang, Shaoqi Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In the field of finance, data has the characteristics of temporal multi-frequency and heterogeneous high dimension, and the traditional knowledge graph is not suitable to express the temporal relation of financial dat... 详细信息
来源: 评论
Reconciling Selective Logging and Hardware Persistent Memory Transaction
Reconciling Selective Logging and Hardware Persistent Memory...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Yan Sha Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA University of Central Florida Florida USA
Log creation, maintenance, and its persist ordering are known to be performance bottlenecks for durable transactions on persistent memory. Existing hardware persistent memory transactions overlook an important opportu... 详细信息
来源: 评论
Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
arXiv
收藏 引用
arXiv 2024年
作者: Bi, Zhangqian Wan, Yao Wang, Zheng Zhang, Hongyu Guan, Batu Lu, Fangxin Zhang, Zili Sui, Yulei Jin, Hai Shi, Xuanhua Huazhong University of Science and Technology China University of Leeds United Kingdom Chongqing University China Shanghai Jiao Tong University China University of New South Wales Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Large Language Models (LLMs) have shown remarkable progress in automated code generation. Yet, LLM-generated code may contain errors in API usage, class, data structure, or missing project-specific information. As muc... 详细信息
来源: 评论
GIDN: A Lightweight Graph Inception Diffusion Network for High-efficient Link Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Zixiao Guo, Yuluo Zhao, Jin Zhang, Yu Yu, Hui Liao, Xiaofei Wang, Biao Yu, Ting National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) model. This model generalizes graph diffusion in different feature spaces, and uses the inception module to avoid the large amount of computations c... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via Data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking  25
Towards high-throughput and low-latency billion-scale vector...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Bing Tian Haikun Liu Yuhang Tang Shihai Xiao Zhuohui Duan Xiaofei Liao Hai Jin Xuecang Zhang Junhua Zhu Yu Zhang National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ...
来源: 评论
SocialEdge: Socialized Learning-Based Request Scheduling for Edge-Cloud systems
SocialEdge: Socialized Learning-Based Request Scheduling for...
收藏 引用
International Conference on Distributed computing systems
作者: Ziwei Wang Yunfeng Zhao Chao Qiu Qiang He Xin Wang Xiaofei Wang Qinghua Hu College of Intelligence and Computing Tianjin University Tianjin China Guangdong Laboratory of Artificial Intelligence and DigitalEconomy (SZ) Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
The ability for cloud data centres and edge data centres to collaborate unleashes the potential of the edge-cloud system. However, its sophistication causes unexpected issues in request scheduling, such as Insufficien...
来源: 评论