咨询与建议

限定检索结果

文献类型

  • 329 篇 会议
  • 139 篇 期刊文献

馆藏范围

  • 468 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 307 篇 工学
    • 280 篇 计算机科学与技术...
    • 206 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 电气工程
    • 21 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 13 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
  • 106 篇 理学
    • 53 篇 数学
    • 35 篇 生物学
    • 18 篇 系统科学
    • 11 篇 化学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
  • 96 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 24 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 15 篇 cloud computing
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 11 篇 servers
  • 11 篇 virtualization
  • 10 篇 deep neural netw...
  • 10 篇 feature extracti...
  • 9 篇 memory managemen...
  • 9 篇 computer archite...
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 computer science
  • 8 篇 mapreduce
  • 8 篇 machine learning
  • 8 篇 privacy
  • 8 篇 virtual machinin...
  • 7 篇 parallel process...

机构

  • 99 篇 national enginee...
  • 64 篇 services computi...
  • 53 篇 school of comput...
  • 43 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 16 篇 school of softwa...
  • 14 篇 zhejiang lab
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...

作者

  • 211 篇 jin hai
  • 181 篇 hai jin
  • 42 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 31 篇 deqing zou
  • 29 篇 zou deqing
  • 25 篇 wu song
  • 24 篇 shi xuanhua
  • 21 篇 song wu
  • 19 篇 hu shengshan
  • 17 篇 haikun liu
  • 14 篇 jiang xiao
  • 14 篇 ran zheng
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 12 篇 xia xie
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 zhang hongyu

语言

  • 446 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab. Cluster and Grid Computing Lab."
468 条 记 录,以下是221-230 订阅
排序:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean lab.l
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhou, Ziqi Zhang, Yechao Zhang, Leo Yu Zheng, Yifeng He, Yuanyuan Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Information Technology Deakin University VIC3216 Australia School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security HUST Wuhan430074 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs... 详细信息
来源: 评论
Sparse online relative similarity learning
arXiv
收藏 引用
arXiv 2021年
作者: Yao, Dezhong Zhao, Peilin Yu, Chen Jin, Hai Li, Bin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Data Analytics Department Institute for Infocomm Research A*STAR 138632 Singapore Economics and Management School Wuhan University Wuhan430072 China
For many data mining and machine learning tasks, the quality of a similarity measure is the key for their performance. To automatically find a good similarity measure from datasets, metric learning and similarity lear... 详细信息
来源: 评论
Hardware-Based Address-Centric Acceleration of Key-Value Store
Hardware-Based Address-Centric Acceleration of Key-Value Sto...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA Computer Science University of Central Florida Florida USA
Efficiently retrieving data is essential for key-value store applications. A major part of the retrieving time is on data addressing, that is, finding the location of the value in memory that corresponds to a key. Thi... 详细信息
来源: 评论
Optimizing non-coalesced memory access for irregular applications with GPU computing
收藏 引用
Frontiers of Information technology & Electronic Engineering 2020年 第9期21卷 1285-1301页
作者: Ran ZHENG Yuan-dong LIU Hai JIN National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
General purpose graphics processing units(GPGPUs)can be used to improve computing performance considerably for regular ***,irregular memory access exists in many applications,and the benefits of graphics processing un... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
Partitioning large-scale property graph for efficient distributed query processing  21
Partitioning large-scale property graph for efficient distri...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and systems, HPCC/SmartCity/DSS 2019
作者: Pang, Haohan Gan, Peng Yuan, Pingpeng Jin, Hai Hua, Qiangsheng National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Clusters and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Recently, many communities have published their domain knowledge in the form of graphs. A significant trend is that the relations between pairs of nodes in the graph have become so complex that these data can be treat... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
Decentralized Task Offloading in Edge computing: A Multi-User Multi-Armed Bandit Approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Xiong Ye, Jiancheng Lui, John C.S. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Network Technology Lab Hong Kong Research Center Huawei Technologies Co. Ltd. Hong Kong Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Mobile edge computing facilitates users to offload computation tasks to edge servers for meeting their stringent delay requirements. Previous works mainly explore task offloading when system-side information is given ... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Fine-grained Scheduling in FPGA-Based Convolutional Neural Networks
Fine-grained Scheduling in FPGA-Based Convolutional Neural N...
收藏 引用
IEEE International Conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Wei Zhang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
FPGA has been considered as a promising solution to accelerate Convolutional Neural Networks (CNNs) for its excellent performance in energy efficiency and programmability. However, prior designs are usually designed f... 详细信息
来源: 评论