咨询与建议

限定检索结果

文献类型

  • 474 篇 会议
  • 180 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 372 篇 工学
    • 326 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 59 篇 信息与通信工程
    • 32 篇 生物工程
    • 30 篇 电气工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 7 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
  • 119 篇 理学
    • 65 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 11 篇 化学
    • 10 篇 物理学
  • 117 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 13 篇 经济学
    • 12 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 grid computing
  • 34 篇 virtual machinin...
  • 30 篇 servers
  • 29 篇 computer science
  • 27 篇 peer to peer com...
  • 26 篇 computational mo...
  • 26 篇 cloud computing
  • 25 篇 scalability
  • 24 篇 bandwidth
  • 23 篇 computer archite...
  • 21 篇 computers
  • 20 篇 resource managem...
  • 19 篇 protocols
  • 19 篇 kernel
  • 19 篇 hardware
  • 17 篇 operating system...
  • 17 篇 application soft...
  • 16 篇 memory managemen...
  • 15 篇 costs
  • 15 篇 virtual machine ...

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 29 篇 national enginee...
  • 28 篇 cluster and grid...
  • 27 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 21 篇 cluster and grid...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 13 篇 services computi...
  • 13 篇 cluster and grid...
  • 12 篇 national enginee...
  • 12 篇 service computin...

作者

  • 326 篇 hai jin
  • 234 篇 jin hai
  • 80 篇 xiaofei liao
  • 52 篇 deqing zou
  • 50 篇 liao xiaofei
  • 42 篇 song wu
  • 32 篇 zou deqing
  • 31 篇 shi xuanhua
  • 29 篇 wu song
  • 28 篇 xuanhua shi
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 xia xie
  • 17 篇 qin zhang
  • 17 篇 yu zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 626 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab & Cluster and Grid Computing Lab"
661 条 记 录,以下是331-340 订阅
排序:
Sysevr: A framework for using deep learning to detect software vulnerabilities
arXiv
收藏 引用
arXiv 2018年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Jin, Hai Zhu, Yawei Chen, Zhaoxuan Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem that has yet to be tackled, as manifested by many vulnerabilities reported on a daily basis. This calls for machine lear... 详细信息
来源: 评论
Theory and methodology of research on cloud security
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 15-17页
作者: Hai JIN Weiqi DAI Deqing ZOU Services Computing Technology and System Lab Big Data Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strat... 详细信息
来源: 评论
Exploring the Impact of Processing Guarantees on Performance of Stream Data Processing
Exploring the Impact of Processing Guarantees on Performance...
收藏 引用
2017 17th IEEE International Conference on Communication technology (ICCT 2017)
作者: Syed Muhammad Abrar Akber Changfu Lin Hanhua Chen Fan Zhang Hai Jin Cluster and Grid Computing Lab Services Computing Technology and System Lab Big Data Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology
Processing semantics ensure tuple processing guarantees during system recovery from failures. It determines whether particular tuples are re-processed or not upon system recovery. Processing semantics facilitate to ma... 详细信息
来源: 评论
A Protective Mechanism for the Access Control system in the Virtual Domain
收藏 引用
China Communications 2016年 第11期13卷 129-142页
作者: Jinan Shen Deqing Zou Hai Jin Kai Yang Bin Yuan Weiming Li Services Computing Technology and System Laboratory Cluster and Grid Computing LaboratorySchool of Computing Science and TechnologyHuazhong University of Science and Technology School of Information Engineering Hubei University for Nationalities
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... 详细信息
来源: 评论
Scalable Hash Ripple Join on Spark
Scalable Hash Ripple Join on Spark
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Hao Liu Jiang Xiao Fengchao Peng The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Shool of Computer Science and Technology Huazhong University of Science and Technology
Hash Ripple join is an online aggregation algorithm that can rapidly give good approximate join results increases with the progress of the join operation and converges to the real result when the join finishes. Luo et... 详细信息
来源: 评论
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”
收藏 引用
Security and Communication Networks 2018年 第1期2018卷
作者: Weizhong Qiang Shizhen Wang Hai Jin Jiangying Zhong Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 ***
来源: 评论
Core maintenance in dynamic graphs: A parallel approach based on matching
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Na Yu, Dongxiao Jin, Hai Hua, Qiang-Sheng Shi, Xuanhua Xie, Xia Services Computing Technology and System Lab Big Data Technology and System Lab Clusters and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
—The core number of a vertex is a basic index depicting cohesiveness of a graph, and has been widely used in large-scale graph analytics. In this paper, we study the update of core numbers of vertices in dynamic grap... 详细信息
来源: 评论
LaLDPC: Latency-aware LDPC for read performance improvement of solid state drives  33
LaLDPC: Latency-aware LDPC for read performance improvement ...
收藏 引用
33rd International Conference on Massive Storage systems and technology, MSST 2017
作者: Du, Yajuan Zou, Deqing Li, Qiao Shi, Liang Jin, Hai Xuey, Chun Jason Service Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Technol. and Syst. Lab Sch. of Comp. Sci. and Technology Huazhong Univ. of Sci. and Technol. Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon Hong Kong College of Computer Science Chongqing University Chongqing China
High-density Solid State Drives (SSDs) have to use Low-Density Parity-Check (LDPC) codes to store data reliably. Current LDPC implementations apply multiple read-retry steps to find the appropriate set of multiple Ref... 详细信息
来源: 评论
Maximizing the Profit of Cloud Broker with Priority Aware Pricing
Maximizing the Profit of Cloud Broker with Priority Aware Pr...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Xinhou Wang Song Wu Kezhi Wang Sheng Di Hai Jin Kun Yang Shumao Ou Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Northumbria University UK Argonne National Laboratory USA University of Essex UK Oxford Brookes University UK
A practical problem facing Infrastructure-as-a-Service (IaaS) cloud users is how to minimize their costs by choosing different pricing options based on their own demands. Recently, cloud brokerage service is introduce... 详细信息
来源: 评论
Efficient multiple-reference temporal error concealment algorithm based on H.264/AVC  2nd
Efficient multiple-reference temporal error concealment algo...
收藏 引用
2nd International Conference on Human Centered computing, HCC 2016
作者: Yu, Chen Cheng, Chao Jin, Hai Zhou, Jingli Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Temporal error concealment at the video communication receiver recovers damaged blocks using temporal information redundancy. To enhance the quality of reconstructed image, a multiple-reference temporal error concealm... 详细信息
来源: 评论