咨询与建议

限定检索结果

文献类型

  • 409 篇 会议
  • 176 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 281 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 52 篇 信息与通信工程
    • 31 篇 生物工程
    • 27 篇 电气工程
    • 27 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 13 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
  • 111 篇 理学
    • 65 篇 数学
    • 34 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 10 篇 化学
    • 8 篇 物理学
  • 98 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics

机构

  • 102 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 19 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 13 篇 huazhong univers...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 11 篇 services computi...

作者

  • 306 篇 hai jin
  • 200 篇 jin hai
  • 79 篇 xiaofei liao
  • 49 篇 deqing zou
  • 45 篇 liao xiaofei
  • 37 篇 song wu
  • 27 篇 long zheng
  • 26 篇 zou deqing
  • 25 篇 haikun liu
  • 24 篇 shi xuanhua
  • 22 篇 ran zheng
  • 22 篇 wu song
  • 21 篇 xuanhua shi
  • 19 篇 hu shengshan
  • 18 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 16 篇 yu huang
  • 15 篇 jiang xiao
  • 14 篇 liu haikun

语言

  • 555 篇 英文
  • 25 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
592 条 记 录,以下是171-180 订阅
排序:
AutoCSD: Automatic cloud system deployment in data centers  2nd
AutoCSD: Automatic cloud system deployment in data centers
收藏 引用
2nd International Conference on Cloud computing and Big Data, CloudCom-Asia 2015
作者: Xie, Tao Chen, Haibao Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer and Information Engineering Chuzhou University Chuzhou239000 China
It is a huge challenge to deploy a cloud computing system in large-scale data centers. In order to help resolve this issue, we propose an automatic cloud system deployment approach with the characteristics of reliabil... 详细信息
来源: 评论
P3DC:Reducing DRAM Cache Hit Latency by Hybrid Mappings
收藏 引用
Journal of Computer Science & technology 2024年 第6期39卷 1341-1360页
作者: Ye Chi Ren-Tong Guo Xiao-Fei Liao Hai-Kun Liu Jianhui Yue National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Laboratory Wuhan 430074China Cluster and Grid Computing Laboratory Wuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Big Data and Internet Shenzhen Technology UniversityShenzhen 518118China Department of Computer Science Michigan Technological UniversityHoughton 49931-1295U.S.A.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca... 详细信息
来源: 评论
CNLoc: Channel state information assisted indoor WLAN localization using nomadic access points  1
收藏 引用
15th IFIP International Conference on Network and Parallel computing, NPC 2018
作者: Xiao, Jiang Li, Huichuwu Li, He Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Information and Electronic Engineering Muroran Institute of Technology MuroranHokkaido Japan
Wireless local area network (WLAN) based indoor localization is expanding its fast-paced adoption to facilitate a variety of indoor location-based services (ILBS). Unfortunately, the performance of current WLAN locali... 详细信息
来源: 评论
Efficient subgraph search on large anonymized graphs
Efficient subgraph search on large anonymized graphs
收藏 引用
作者: Ding, Xiaofeng Ou, Yangling Jia, Jianhong Jin, Hai Liu, Jixue Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information Technology & Mathematical Sciences University of South Australia Adelaide Australia
Graph is one of the most important data structures to model social networks and becomes popular to find interesting relationships between individuals. Since graphs may contain sensitive information, data curators usua... 详细信息
来源: 评论
Heterogeneous differential privacy for vertically partitioned databases
Heterogeneous differential privacy for vertically partitione...
收藏 引用
作者: Xia, Yang Zhu, Tianqing Ding, Xiaofeng Jin, Hai Zou, Deqing National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Deakin University Victoria Australia
Existing privacy-preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a no... 详细信息
来源: 评论
Can Language Models Serve as Temporal Knowledge Bases?
Can Language Models Serve as Temporal Knowledge Bases?
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhao, Ruilin Zhao, Feng Xu, Guandong Zhang, Sixiao Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Recent progress regarding the use of language models (LMs) as knowledge bases (KBs) has shown that language models can act as structured knowledge bases for storing relational facts. However, most existing works only ... 详细信息
来源: 评论
Predicting Friendship Using a Unified Probability Model  7th
Predicting Friendship Using a Unified Probability Model
收藏 引用
7th CCF Academic Conference on BigData, CCF BigData 2019
作者: Kou, Zhijuan Wang, Hua Yuan, Pingpeng Jin, Hai Xie, Xia National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Now, it is popular for people to share their feelings, activities tagged with geography and temporal information in Online Social Networks (OSNs). The spatial and temporal interactions occurred in OSNs contain a wealt... 详细信息
来源: 评论
Autonomous Agent Based Intrusion Detection in Virtual computing Environment
Autonomous Agent Based Intrusion Detection in Virtual Comput...
收藏 引用
2010 IEEE International Conference Conferenhce on Wireless Communications,Networking and Information Security(2010 IEEE 无线通信、网络技术与信息安全国际会议 WCNIS)
作者: Feng Zhao Alex K. Ohoussou Deqing Zou Hai Jin Guofu Xiang Ge Cheng Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of S Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of S
One of the motivations for virtualization technology is the desire to develop new services to enhance system security without trusting both the applications and the operating systems. An intrusion detection system is ... 详细信息
来源: 评论
A Hybrid Model Combined with SVM and CNN for Community Content Classification  23
A Hybrid Model Combined with SVM and CNN for Community Conte...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Ye, Yukui Xie, Xia Jin, Hai Wang, Duoqiang National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
Community websites bring many conveniences to people, and the classification of community content is playing an important role in website management and information searching. As the carrier of community content, post... 详细信息
来源: 评论
Dynamic cluster strategy for hierarchical rollback-recovery protocols in MPI HPC applications
Dynamic cluster strategy for hierarchical rollback-recovery ...
收藏 引用
作者: Liao, Xiaofei Zheng, Long Zhang, Binsheng Zhang, Yu Jin, Hai Shi, Xuanhua Lin, Yi Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Computer Science and Technology Civil Aviation University of China Tianjin300300 China
Fault tolerance in parallel computing becomes increasingly important with a significant rise in high-performance computing systems. Coordinated checkpointing and message logging protocols are commonly used fault toler... 详细信息
来源: 评论