咨询与建议

限定检索结果

文献类型

  • 410 篇 会议
  • 174 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 320 篇 工学
    • 278 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 48 篇 信息与通信工程
    • 31 篇 生物工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 61 篇 数学
    • 34 篇 生物学
    • 15 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 95 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...

作者

  • 303 篇 hai jin
  • 196 篇 jin hai
  • 79 篇 xiaofei liao
  • 49 篇 deqing zou
  • 43 篇 liao xiaofei
  • 37 篇 song wu
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 xuanhua shi
  • 21 篇 wu song
  • 20 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 556 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
591 条 记 录,以下是181-190 订阅
排序:
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing Data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed computing systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
A General Offloading Approach for Near-DRAM Processing-In-Memory Architectures
A General Offloading Approach for Near-DRAM Processing-In-Me...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Dan Chen Hai Jin Long Zheng Yu Huang Pengcheng Yao Chuangyi Gui Qinggang Wang Haifeng Liu Haiheng He Xiaofei Liao Ran Zheng National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology China
Processing-in-memory (PIM) is promising to solve the well-known data movement challenge by performing in-situ computations near the data. Leveraging PIM features is pretty profitable to boost the energy efficiency of ... 详细信息
来源: 评论
Graft: Efficient Inference Serving for Hybrid Deep Learning with SLO Guarantees via DNN Re-alignment
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jing Wang, Lin Jin, Qirui Liu, Fangming The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Peng Cheng Laboratory Huazhong University of Science and Technology China
Deep neural networks (DNNs) have been widely adopted for various mobile inference tasks, yet their ever-increasing computational demands are hindering their deployment on resource-constrained mobile devices. Hybrid de... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
GraphFly: Efficient Asynchronous Streaming Graphs Processing via Dependency-Flow
GraphFly: Efficient Asynchronous Streaming Graphs Processing...
收藏 引用
Supercomputing Conference
作者: Dan Chen Chuangyi Gui Yi Zhang Hai Jin Long Zheng Yu Huang Xiaofei Liao National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Existing streaming graph processing systems typically adopt two phases of refinement and recomputation to ensure the correctness of the incremental computation. However, severe redundant memory accesses exist due to t... 详细信息
来源: 评论
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Network for Segmenting Pathology Lesion of the Focal Lymphocytic Sialadenitis
M2CF-Net: A Multi-Resolution and Multi-Scale Cross Fusion Ne...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Hao Han Feng Lu Yanhan Deng Xiaofang Luo Hai Jin Wei Tu Xia Xie National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
In the medical realm, the pivotal role of pathological Whole Slide Images (WSIs) in detecting cancer, tracking disease progression, and evaluating treatment efficacy is indisputable. Nevertheless, the identification a...
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论