咨询与建议

限定检索结果

文献类型

  • 407 篇 会议
  • 174 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 588 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 320 篇 工学
    • 278 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 48 篇 信息与通信工程
    • 31 篇 生物工程
    • 25 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 控制科学与工程
    • 19 篇 网络空间安全
    • 16 篇 动力工程及工程热...
    • 15 篇 机械工程
    • 9 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 化学工程与技术
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 61 篇 数学
    • 34 篇 生物学
    • 15 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 物理学
  • 95 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 28 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 8 篇 社会学
    • 6 篇 法学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 3 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 grid computing
  • 33 篇 virtual machinin...
  • 25 篇 computer science
  • 25 篇 peer to peer com...
  • 25 篇 computational mo...
  • 24 篇 bandwidth
  • 24 篇 servers
  • 21 篇 scalability
  • 20 篇 computers
  • 20 篇 cloud computing
  • 19 篇 resource managem...
  • 19 篇 hardware
  • 18 篇 kernel
  • 17 篇 operating system...
  • 17 篇 computer archite...
  • 16 篇 application soft...
  • 16 篇 protocols
  • 15 篇 memory managemen...
  • 15 篇 virtual machine ...
  • 14 篇 semantics

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 60 篇 school of comput...
  • 53 篇 services computi...
  • 45 篇 school of cyber ...
  • 29 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 23 篇 hubei key labora...
  • 18 篇 zhejiang lab
  • 17 篇 school of softwa...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 service computin...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...

作者

  • 301 篇 hai jin
  • 196 篇 jin hai
  • 79 篇 xiaofei liao
  • 49 篇 deqing zou
  • 43 篇 liao xiaofei
  • 37 篇 song wu
  • 26 篇 zou deqing
  • 25 篇 long zheng
  • 25 篇 haikun liu
  • 24 篇 shi xuanhua
  • 21 篇 xuanhua shi
  • 21 篇 wu song
  • 20 篇 ran zheng
  • 19 篇 hu shengshan
  • 17 篇 yu zhang
  • 16 篇 xia xie
  • 16 篇 qin zhang
  • 15 篇 jiang xiao
  • 15 篇 yu huang
  • 14 篇 liu haikun

语言

  • 553 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Services Computing Technology and System Lab Cluster and Grid Computing"
588 条 记 录,以下是61-70 订阅
排序:
Maverick: Personalized Edge-Assisted Federated Learning with Contrastive Training  25
Maverick: Personalized Edge-Assisted Federated Learning with...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Wang, Kaibin He, Qiang Dong, Zeqian Chen, Rui He, Chuan Chua, Caslon Chen, Feifei Yang, Yun Swinburne University of Technology Melbourne Australia Huazhong University of Science and Technology Wuhan China Deakin University Melbourne Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In an edge-assisted federated learning (FL) system, edge servers aggregate the local models from the clients within their coverage areas to produce intermediate models for the production of the global model. This sign... 详细信息
来源: 评论
Demystifying Ethereum account diversity:observations,models and analysis
收藏 引用
Frontiers of Computer Science 2022年 第4期16卷 119-130页
作者: Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin Clusters and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Centre for Distributed and High Performance Computing School of Information TechnologiesThe University of SydneyCamperdownNew South Wales2006Australia
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke... 详细信息
来源: 评论
ChestBox: Enabling Fast State Sharing for Stateful Serverless computing with State Functions
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2024年
作者: Zhang, Xinmin Wu, Song Gu, Lin He, Qiang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan Hubei430074 China
This paper presents ChestBox, a novel approach that utilizes state functions to facilitate low-latency state sharing for stateful serverless computing. When an application function needs to share a state, the state fu... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
SaGraph: A Similarity-Aware Hardware Accelerator for Temporal Graph Processing  23
SaGraph: A Similarity-Aware Hardware Accelerator for Tempora...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Jin Zhao Yu Zhang Jian Cheng Yiyang Wu Chuyue Ye Hui Yu Zhiying Huang Hai Jin Xiaofei Liao Lin Gu Haikun Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab Hangzhou China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Temporal graph processing is used to handle the snapshots of the temporal graph, which concerns changes in graph over time. Although several software/hardware solutions have been designed for efficient temporal graph ...
来源: 评论
Impulsive Control of Nonlinear Multi-Agent systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy systems 2025年
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent systems (MASs) with u... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Towards trustworthy blockchain systems in the era of “Internet of value”: development, challenges, and future trends
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 250-260页
作者: Hai JIN Jiang XIAO National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology
Since the advent of cryptocurrencies such as Bitcoin, blockchain, as their underlying technologies,has drawn a massive amount of attention from both academia and the industry. This ever-evolving technology inherits t... 详细信息
来源: 评论