咨询与建议

限定检索结果

文献类型

  • 333 篇 会议
  • 140 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 282 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 电气工程
    • 21 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 53 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
  • 96 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 24 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 15 篇 cloud computing
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 11 篇 servers
  • 11 篇 virtualization
  • 10 篇 deep neural netw...
  • 10 篇 feature extracti...
  • 9 篇 memory managemen...
  • 9 篇 computer archite...
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 computer science
  • 8 篇 operating system...
  • 8 篇 software enginee...
  • 8 篇 mapreduce
  • 8 篇 machine learning
  • 8 篇 privacy

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...

作者

  • 211 篇 jin hai
  • 191 篇 hai jin
  • 42 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 31 篇 deqing zou
  • 29 篇 zou deqing
  • 25 篇 wu song
  • 24 篇 shi xuanhua
  • 21 篇 song wu
  • 19 篇 hu shengshan
  • 17 篇 haikun liu
  • 14 篇 jiang xiao
  • 14 篇 ran zheng
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 12 篇 xia xie
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 zhang hongyu

语言

  • 458 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab. Cluster and Grid Computing Lab."
480 条 记 录,以下是251-260 订阅
排序:
µVulDeePecker: A deep learning-based system for multiclass vulnerability detection
arXiv
收藏 引用
arXiv 2020年
作者: Zou, Deqing Wang, Sujuan Xu, Shouhuai Li, Zhen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
Fine-grained software vulnerability detection is an important and challenging problem. Ideally, a detection system (or detector) not only should be able to detect whether or not a program contains vulnerabilities, but... 详细信息
来源: 评论
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Improve Docker Performance  16th
N-Docker: A NVM-HDD Hybrid Docker Storage Framework to Impro...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2019
作者: Gu, Lin Tang, Qizhi Wu, Song Jin, Hai Zhang, Yingxi Shi, Guoqiang Lin, Tingyu Rao, Jia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China State Key Laboratory of Intelligent Manufacturing System Technology Beijing100854 China The University of Texas at Arlington ArlingtonTX76019 United States
Docker has been widely adopted in production environment, but unfortunately deployment and cold-start of container are limited by the low speed of disk. The emerging non-volatile memory (NVM) technology, which has hig... 详细信息
来源: 评论
Minimum Spanning Tree clustering Based on Density Filtering  7th
Minimum Spanning Tree Clustering Based on Density Filtering
收藏 引用
7th CCF Academic Conference on BigData, CCF BigData 2019
作者: Wang, Ke Xie, Xia Sun, Jiayu Cao, Wenzhi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hunan University of Technology and Business Changsha410205 China
clustering analysis is an important method in data mining. In order to recognize clusters with arbitrary shapes as well as clusters with different density, we propose a new clustering approach: minimum spanning tree c... 详细信息
来源: 评论
NaturalCC: A toolkit to naturalize the source code corpus
arXiv
收藏 引用
arXiv 2020年
作者: Wan, Yao He, Yang Zhang, Jian-Guo Sui, Yulei Jin, Hai Xu, Guandong Xiong, Caiming Yu, Philip S. Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney NSW Australia Department of Computer Science University of Illinois at Chicago IL United States Salesforce Research Palo Alto United States
We present NATURALCC, an efficient and extensible toolkit to bridge the gap between natural language and programming language, and facilitate the research on big code analysis. Using NATURALCC, researchers both from n... 详细信息
来源: 评论
WiWrite: Wi-Fi Based Handwriting Recognition like Playing Lego
WiWrite: Wi-Fi Based Handwriting Recognition like Playing Le...
收藏 引用
International Conference on Computer Communications and Networks (ICCCN)
作者: Jiang Xiao Huichuwu Li Yuxiang Liu Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Effective finger writing underpins semantic text input task for virtual reality applications. We demonstrate WiWrite, a novel finger writing system that leverages the ubiquitous wireless signals to enable character re... 详细信息
来源: 评论
Energy Saving Strategy of Power system cluster Based on Container Virtualization
Energy Saving Strategy of Power System Cluster Based on Cont...
收藏 引用
IEEE Asia Power and Energy Engineering Conference (APEEC)
作者: Ran Zheng Hao Wang Hai Jin Dechao Xu Yong Chen Xiaomeng Li Yufei Rao Zhenan Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research Institute Haidian District Beijing China State Grid Henan Electric Power Company Electric Power Research Institute Zhengzhou China
With the continuous development of power grids, the scale of supercomputing clusters has also gradually increased to carry a large number of power system simulation calculations, and the problem of high energy consump...
来源: 评论
Svega: Answering natural language questions over knowledge base with semantic matching  30
Svega: Answering natural language questions over knowledge b...
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Li, Gaofeng Yuan, Pingpeng Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Nowadays, more and more large scale knowledge bases are availab.e for public access. Although these knowledge bases have their inherent access interfaces, such as SPARQL, they are generally unfriendly to end users. An... 详细信息
来源: 评论
Context aware 3d unet for brain tumor segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Ahmad, Parvez Qamar, Saqib Shen, Linlin Saeed, Adnan National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China School of Hydropower and Information Technology Huazhong University of Science and Technology Wuhan430074 China
Deep convolutional neural network (CNN) achieves remarkable performance for medical image analysis. UNet is the primary source in the performance of 3D CNN architectures for medical imaging tasks, including brain tumo... 详细信息
来源: 评论
VAIL: A victim-aware cache policy for improving lifetime of hybrid memory  9
VAIL: A victim-aware cache policy for improving lifetime of ...
收藏 引用
9th International Workshop on Programming Models and Applications for Multicores and Manycores, PMAM 2018
作者: Jia, Youchuang Zhou, Fang Gao, Xiang Wu, Song Jin, Hai Liao, Xiaofei Yuan, Pingpeng Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Nowadays emerging Non-Volatile Memory (NVM) technologies are introduced to remedy the shortages of the current DRAM-based memory system. However, NVM has limited write endurance, which would severely restrict the perf... 详细信息
来源: 评论
Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation  20
Shattered chain of trust: understanding security risks in cr...
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang Deqing Zou Hai Jin Yuqing Zhang School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University Bloomington School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
来源: 评论