咨询与建议

限定检索结果

文献类型

  • 407 篇 会议
  • 171 篇 期刊文献

馆藏范围

  • 578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 317 篇 工学
    • 275 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 48 篇 信息与通信工程
    • 31 篇 生物工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 61 篇 数学
    • 34 篇 生物学
    • 15 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 95 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics
  • 13 篇 costs

机构

  • 99 篇 national enginee...
  • 64 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 huazhong univers...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 17 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...

作者

  • 291 篇 hai jin
  • 196 篇 jin hai
  • 78 篇 xiaofei liao
  • 49 篇 deqing zou
  • 43 篇 liao xiaofei
  • 37 篇 song wu
  • 26 篇 zou deqing
  • 25 篇 haikun liu
  • 24 篇 long zheng
  • 24 篇 shi xuanhua
  • 21 篇 wu song
  • 20 篇 ran zheng
  • 20 篇 xuanhua shi
  • 19 篇 hu shengshan
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 14 篇 yu huang
  • 14 篇 liu haikun

语言

  • 543 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
578 条 记 录,以下是241-250 订阅
排序:
China in the eyes of news media:a case study under COVID-19 epidemic
收藏 引用
Frontiers of Information technology & Electronic Engineering 2021年 第11期22卷 1443-1457页
作者: Hong HUANG Zhexue CHEN Xuanhua SHI Chenxu WANG Zepeng HE Hai JIN Mingxin ZHANG Zongya LI National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Journalism and Information Communication Huazhong University of Science and TechnologyWuhan430074China
As one of the early COVID-19 epidemic outbreak areas,China attracted the global news media’s attention at the beginning of *** the epidemic period,Chinese people united and actively fought against the ***,in the eyes... 详细信息
来源: 评论
Dynamic cluster strategy for hierarchical rollback-recovery protocols in MPI HPC applications
Dynamic cluster strategy for hierarchical rollback-recovery ...
收藏 引用
作者: Liao, Xiaofei Zheng, Long Zhang, Binsheng Zhang, Yu Jin, Hai Shi, Xuanhua Lin, Yi Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Computer Science and Technology Civil Aviation University of China Tianjin300300 China
Fault tolerance in parallel computing becomes increasingly important with a significant rise in high-performance computing systems. Coordinated checkpointing and message logging protocols are commonly used fault toler... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
DepGraph: A Dependency-Driven Accelerator for Efficient Iterative Graph Processing
DepGraph: A Dependency-Driven Accelerator for Efficient Iter...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Yu Zhang Xiaofei Liao Hai Jin Ligang He Bingsheng He Haikun Liu Lin Gu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China University of Warwick United Kingdom National University of Singapore Singapore
Many graph processing systems have been recently developed for many-core processors. However, for iterative graph processing, due to the dependencies between vertices' states, the propagations of new states of ver... 详细信息
来源: 评论
VulCNN: An Image-inspired Scalable Vulnerability Detection system
VulCNN: An Image-inspired Scalable Vulnerability Detection S...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yueming Wu Deqing Zou Shihan Dou Wei Yang Duo Xu Hai Jin Huazhong University of Science and Technology China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering HUST Wuhan China Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System HUST Wuhan China Fudan University China University of Texas at Dallas United States Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Since deep learning (DL) can automatically learn features from source code, it has been widely used to detect source code vulnerability. To achieve scalable vulnerability scanning, some prior studies intend to process... 详细信息
来源: 评论
CKG: Dynamic Representation Based on Context and Knowledge Graph
CKG: Dynamic Representation Based on Context and Knowledge G...
收藏 引用
International Conference on Pattern Recognition
作者: Xunzhu Tang Tiezhu Sun Rujie Zhu Shi Wang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Momenta Suzhou China University of Central Florida Orlando FL USA Institute of Computing Technology Chinese Academy beijing China
Recently, neural language representation models pre-trained on large corpus can capture rich co-occurrence information and be fine-tuned in downstream tasks to improve the performance. As a result, they have achieved ... 详细信息
来源: 评论
Moto: Enhancing Embedding with Multiple Joint Factors for Chinese Text Classification
Moto: Enhancing Embedding with Multiple Joint Factors for Ch...
收藏 引用
International Conference on Pattern Recognition
作者: Xunzhu Tang Rujie Zhu Tiezhu Sun Shi Wang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China University of Central Florida Orlando FL USA Momenta Suzhou China Institute of Computing Technology Chinese Academy beijing China
Recently, language representation techniques have achieved great performances in text classification. However, most existing representation models are specifically designed for English materials, which may fail in Chi... 详细信息
来源: 评论