咨询与建议

限定检索结果

文献类型

  • 474 篇 会议
  • 180 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 372 篇 工学
    • 326 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 59 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 电气工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
  • 119 篇 理学
    • 65 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 117 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 13 篇 经济学
    • 12 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 34 篇 virtual machinin...
  • 30 篇 servers
  • 29 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 26 篇 cloud computing
  • 25 篇 scalability
  • 24 篇 bandwidth
  • 23 篇 computer archite...
  • 21 篇 computers
  • 20 篇 resource managem...
  • 19 篇 protocols
  • 19 篇 kernel
  • 19 篇 hardware
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 16 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 virtual machine ...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 29 篇 national enginee...
  • 28 篇 cluster and grid...
  • 27 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 21 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 13 篇 services computi...
  • 13 篇 cluster and grid...
  • 12 篇 national enginee...
  • 12 篇 service computin...

作者

  • 326 篇 hai jin
  • 234 篇 jin hai
  • 80 篇 xiaofei liao
  • 52 篇 deqing zou
  • 50 篇 liao xiaofei
  • 42 篇 song wu
  • 32 篇 zou deqing
  • 31 篇 shi xuanhua
  • 29 篇 wu song
  • 28 篇 xuanhua shi
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 qin zhang
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 626 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab & Cluster and Grid Computing Lab"
661 条 记 录,以下是191-200 订阅
排序:
Significant Engagement Community Search on Temporal Networks: Concepts and Algorithms
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yifei Lin, Longlong Yuan, Pingpeng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science & Technology HuaZhong University of Science and Technology Luoyu Road 1037 Hubei Wuhan430074 China
Community search, retrieving the cohesive subgraph which contains the query vertex, has been widely touched over the past decades. The existing studies on community search mainly focus on static networks. However, rea... 详细信息
来源: 评论
FedMoS: Taming Client Drift in Federated Learning with Double Momentum and Adaptive Selection
FedMoS: Taming Client Drift in Federated Learning with Doubl...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Xiong Wang Yuxin Chen Yuqing Li Xiaofei Liao Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Wuhan University Wuhan China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Federated learning (FL) enables massive clients to collaboratively train a global model by aggregating their local updates without disclosing raw data. Communication has become one of the main bottlenecks that prolong...
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
LOPO: An Out-of-order Layer Pulling Orchestration Strategy for Fast Microservice Startup
LOPO: An Out-of-order Layer Pulling Orchestration Strategy f...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Lin Gu Junhao Huang Shaoxing Huang Deze Zeng Bo Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science China University of Geosciences Wuhan China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Container based microservices have been widely applied to promote the cloud elasticity. The mainstream Docker containers are structured in layers, which are organized in stack with bottom-up dependency. To start a mic...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
When the Metaverse Meets Carbon Neutrality: Ongoing Efforts and Directions
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Fangming Pei, Qiangyu Chen, Shutong Yuan, Yongjie Wang, Lin Mühlhäuser, Max Huazhong University of Science and Technology Peng Cheng Laboratory China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China VU Amsterdam Netherlands TU Darmstadt Germany The Telecooperation Lab TU Darmstadt Germany
The metaverse has recently gained increasing attention from the public. It builds up a virtual world where we can live as a new role regardless of the role we play in the physical world. However, building and operatin... 详细信息
来源: 评论
Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving Exploration
Effective Concurrency Testing for Go via Directional Primiti...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zongze Jiang Ming Wen Yixin Yang Chao Peng Ping Yang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System ByteDance Beijing China School of Computer Science and Technology Huazhong University of Science and Technology China
The Go language (Go/Golang) has been attracting increasing attention from the industry over recent years due to its strong concurrency support and ease of deployment. This programming language encourages developers to...
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论
Cross-links matter for link prediction: rethinking the debiased GNN from a data perspective  23
Cross-links matter for link prediction: rethinking the debia...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Zihan Luo Hong Huang Jianxun Lian Xiran Song Xing Xie Hai Jin National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Microsoft Research Asia Beijing China
Recently, the bias-related issues in GNN-based link prediction have raised widely spread concerns. In this paper, we emphasize the bias on links across different node clusters, which we call cross-links, after conside...
来源: 评论