咨询与建议

限定检索结果

文献类型

  • 407 篇 会议
  • 171 篇 期刊文献

馆藏范围

  • 578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 275 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 48 篇 信息与通信工程
    • 31 篇 生物工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 61 篇 数学
    • 34 篇 生物学
    • 15 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 95 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics
  • 13 篇 costs

机构

  • 99 篇 national enginee...
  • 64 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 17 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...

作者

  • 291 篇 hai jin
  • 196 篇 jin hai
  • 78 篇 xiaofei liao
  • 49 篇 deqing zou
  • 43 篇 liao xiaofei
  • 37 篇 song wu
  • 26 篇 zou deqing
  • 25 篇 haikun liu
  • 24 篇 long zheng
  • 24 篇 shi xuanhua
  • 21 篇 wu song
  • 20 篇 ran zheng
  • 20 篇 xuanhua shi
  • 19 篇 hu shengshan
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 14 篇 yu huang
  • 14 篇 liu haikun

语言

  • 543 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
578 条 记 录,以下是111-120 订阅
排序:
On Pipelined GCN with Communication-Efficient Sampling and Inclusion-Aware Caching
On Pipelined GCN with Communication-Efficient Sampling and I...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Shulin Wang Qiang Yu Xiong Wang Yuqing Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Wuhan University Wuhan China
Graph convolutional network (GCN) has achieved enormous success in learning structural information from unstructured data. As graphs become increasingly large, distributed training for GCNs is severely prolonged by fr... 详细信息
来源: 评论
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
收藏 引用
International Conference on Data Engineering
作者: Feng Cheng Jiang Xiao Cunyang Liu Shijie Zhang Yifan Zhou Bo Li Baochun Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Hong Kong University of Science and Technology Hong Kong University of Toronto Canada
Directed Acyclic Graph (DAG)-based blockchain (a.k.a distributed ledger) has become prevalent for supporting highly concurrent applications. Its inherent parallel data structure accelerates block generation significan... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
StreamFP: Learnable Fingerprint-guided Data Selection for Efficient Stream Learning
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Tongjun Zhang, Shuhao Chen, Binbin He, Bingsheng National Engineering Research Center for Big DataTechnology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Singapore University of Technology and Design Singapore National University of Singapore Singapore
Stream Learning (SL) requires models that can quickly adapt to continuously evolving data, posing significant challenges in both computational efficiency and learning accuracy. Effective data selection is critical in ... 详细信息
来源: 评论
Graph for Science: From API based Programming to Graph Engine based Programming for HPC
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yu Wang, Zixiao Zhao, Jin Guo, Yuluo Yu, Hui Huang, Zhiying Shi, Xuanhua Liao, Xiaofei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Modern scientific applications predominantly run on large-scale computing platforms, necessitating collaboration between scientific domain experts and high-performance computing (HPC) experts. While domain experts are... 详细信息
来源: 评论
The Entry-Extensible Cuckoo Filter  17th
The Entry-Extensible Cuckoo Filter
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2020
作者: Yu, Shuiying Wu, Sijie Chen, Hanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The emergence of large-scale dynamic sets in real applications brings severe challenges in approximate set representation structures. A dynamic set with changing cardinality requires an elastic capacity of the approxi... 详细信息
来源: 评论
A multi-dimensional index for privacy-preserving queries in cloud computing
A multi-dimensional index for privacy-preserving queries in ...
收藏 引用
作者: Xu, Hui Ding, Xiaofeng Jin, Hai Yu, Qing National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Although cloud computing saves the cost of enterprises and individuals to manage data in various applications on public cloud servers, it also causes the problem of the leakage of critical personal information and sen... 详细信息
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers
收藏 引用
Journal of Computer Science & technology 2021年 第5期36卷 1051-1070页
作者: Yu-Wei Wu Qing-Gang Wang Long Zheng Xiao-Fei Liao Hai Jin Wen-Bin Jiang Ran Zheng Kan Hu National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
With the rapid growth of real-world graphs,the size of which can easily exceed the on-chip(board)storage capacity of an accelerator,processing large-scale graphs on a single Field Programmable Gate Array(FPGA)becomes ... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论