咨询与建议

限定检索结果

文献类型

  • 410 篇 会议
  • 174 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 320 篇 工学
    • 278 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 48 篇 信息与通信工程
    • 31 篇 生物工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 61 篇 数学
    • 34 篇 生物学
    • 15 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 95 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 46 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 19 篇 school of softwa...
  • 18 篇 zhejiang lab
  • 15 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...

作者

  • 303 篇 hai jin
  • 196 篇 jin hai
  • 79 篇 xiaofei liao
  • 49 篇 deqing zou
  • 43 篇 liao xiaofei
  • 37 篇 song wu
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 xuanhua shi
  • 21 篇 wu song
  • 20 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 556 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
591 条 记 录,以下是311-320 订阅
排序:
VulDeeLocator: A deep learning-based fine-grained vulnerability detector
arXiv
收藏 引用
arXiv 2020年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Chen, Zhaoxuan Zhu, Yawei Jin, Hai The National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Cyber Security and Computer Hebei University Baoding071002 China The Department of Computer Science University of Colorado Colorado Springs CO80918 United States University of Texas San Antonio United States
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne... 详细信息
来源: 评论
Modeling Distributed Stream Processing systems Under Heavy Workload
Modeling Distributed Stream Processing Systems Under Heavy W...
收藏 引用
International Conference on Cyberworlds
作者: Muhammad Mudassar Qureshi Hanhua Chen Hai Jin Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Big data applications play a significant role in diverse fields. Distributed Stream Processing Engines (DSPEs) are widely used to support real time applications efficiently. Partitioning algorithms are used to partiti... 详细信息
来源: 评论
A survey on graph processing accelerators: Challenges and opportunities
arXiv
收藏 引用
arXiv 2019年
作者: Gui, Chuang-Yi Zheng, Long He, Bing-Sheng Liu, Cheng Chen, Xin-Yu Liao, Xiao-Fei Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China School of Computing National University of Singapore 117418 Singapore
Graph is a well known data structure to represent the associated relationships in a variety of applications, e.g., data science and machine learning. Despite a wealth of existing efforts on developing graph processing... 详细信息
来源: 评论
CNLoc: Channel state information assisted indoor WLAN localization using nomadic access points  1
收藏 引用
15th IFIP International Conference on Network and Parallel computing, NPC 2018
作者: Xiao, Jiang Li, Huichuwu Li, He Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Information and Electronic Engineering Muroran Institute of Technology MuroranHokkaido Japan
Wireless local area network (WLAN) based indoor localization is expanding its fast-paced adoption to facilitate a variety of indoor location-based services (ILBS). Unfortunately, the performance of current WLAN locali... 详细信息
来源: 评论
Privacy preserving search over multiple servers
收藏 引用
International Journal of Autonomous and Adaptive Communications systems 2017年 第4期10卷 426-442页
作者: Ibrahim, Ayad Jin, Hai Yassin, Ali A. Zou, Deqing Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of Science and Technology Wuhan430074 China
Search over encrypted data is a hot topic. In this paper, we propose a secure scheme for searching the encrypted servers. Such scheme enables the authorised user to search multiple servers with multi-keyword queries a... 详细信息
来源: 评论
Saudi cloud infrastructure: a security analysis
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 152-164页
作者: Wahid RAJEH Hai JIN Deqing ZOU Services Computing Technology and System Lab Big Data Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology School of Computers and Information Technology University of Tabuk
The growing demand and dependence upon cloud services have garnered an increasing level of threat to user data and security. Some of such critical web and cloud platforms have become constant targets for persistent ma... 详细信息
来源: 评论
Hybrid followee recommendation in microblogging systems
收藏 引用
Science China(Information Sciences) 2017年 第1期60卷 21-34页
作者: Hanhua CHEN Hai JIN Xiaolong CUI Services Computing Technology and System Laboratory Big Data Technology and System LaboratoryCluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and Technology
Followee recommendation plays an important role in information sharing over microblogging platforms. Existing followee recommendation schemes adopt either content relevance or social information for followee ranking, ... 详细信息
来源: 评论
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Yueming Wu Xiaodi Li Deqing Zou Wei Yang Xin Zhang Hai Jin Cluster and Grid Computing Lab Services Computing Technology and System Lab National Engineering Research Center for Big Data Technology and System School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Texas at Dallas Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use either syntax-based features which can be evaded by transformation attacks or semantic-based features which ... 详细信息
来源: 评论
Towards dataflow based graph processing
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 274-276页
作者: Hai JIN Pengcheng YAO Xiaofei LIAO Service Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology
Modern graph processing is widely used for solving a vast variety of real-world problems,e.g.,web sites ranking[1]and community detection[2].To better adapt and express the procedure of graph iteration,a wide spectrum... 详细信息
来源: 评论
POSTER: Layrub: Layer-centric GPU memory reuse and data migration in extreme-scale deep learning systems
收藏 引用
ACM SIGPLAN Notices 2018年 第1期53卷 405-406页
作者: Liu, Bo Jiang, Wenbin Jin, Hai Shi, Xuanhua Ma, Yang Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Growing accuracy and robustness of Deep Neural Networks (DNN) models are accompanied by growing model capacity (going deeper or wider). However, high memory requirements of those models make it difficult to execute th... 详细信息
来源: 评论