咨询与建议

限定检索结果

文献类型

  • 333 篇 会议
  • 140 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 282 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 电气工程
    • 21 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 53 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
  • 96 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 24 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 15 篇 cloud computing
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 11 篇 servers
  • 11 篇 virtualization
  • 10 篇 deep neural netw...
  • 10 篇 feature extracti...
  • 9 篇 memory managemen...
  • 9 篇 computer archite...
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 computer science
  • 8 篇 operating system...
  • 8 篇 software enginee...
  • 8 篇 mapreduce
  • 8 篇 machine learning
  • 8 篇 privacy

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...

作者

  • 211 篇 jin hai
  • 191 篇 hai jin
  • 42 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 31 篇 deqing zou
  • 29 篇 zou deqing
  • 25 篇 wu song
  • 24 篇 shi xuanhua
  • 21 篇 song wu
  • 19 篇 hu shengshan
  • 17 篇 haikun liu
  • 14 篇 jiang xiao
  • 14 篇 ran zheng
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 12 篇 xia xie
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 zhang hongyu

语言

  • 458 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab. Cluster and Grid Computing Lab."
480 条 记 录,以下是281-290 订阅
排序:
VulDeePecker: A deep learning-based system for vulnerability detection
arXiv
收藏 引用
arXiv 2018年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Ou, Xinyu Jin, Hai Wang, Sujuan Deng, Zhijun Zhong, Yuyi Services Computing Technology and System Lab Big Data Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Security and Computer Hebei University Shenzhen Huazhong University of Science and Technology Research Institute Department of Computer Science University of Texas at San Antonio
The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., inc... 详细信息
来源: 评论
Sysevr: A framework for using deep learning to detect software vulnerabilities
arXiv
收藏 引用
arXiv 2018年
作者: Li, Zhen Zou, Deqing Xu, Shouhuai Jin, Hai Zhu, Yawei Chen, Zhaoxuan Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem that has yet to be tackled, as manifested by many vulnerabilities reported on a daily basis. This calls for machine lear... 详细信息
来源: 评论
Theory and methodology of research on cloud security
收藏 引用
Science China(Information Sciences) 2016年 第5期59卷 15-17页
作者: Hai JIN Weiqi DAI Deqing ZOU Services Computing Technology and System Lab Big Data Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strat... 详细信息
来源: 评论
Exploring the Impact of Processing Guarantees on Performance of Stream Data Processing
Exploring the Impact of Processing Guarantees on Performance...
收藏 引用
2017 17th IEEE International Conference on Communication technology (ICCT 2017)
作者: Syed Muhammad Abrar Akber Changfu Lin Hanhua Chen Fan Zhang Hai Jin Cluster and Grid Computing Lab Services Computing Technology and System Lab Big Data Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology
Processing semantics ensure tuple processing guarantees during system recovery from failures. It determines whether particular tuples are re-processed or not upon system recovery. Processing semantics facilitate to ma... 详细信息
来源: 评论
Scalab.e Hash Ripple Join on Spark
Scalable Hash Ripple Join on Spark
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Hao Liu Jiang Xiao Fengchao Peng The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Shool of Computer Science and Technology Huazhong University of Science and Technology
Hash Ripple join is an online aggregation algorithm that can rapidly give good approximate join results increases with the progress of the join operation and converges to the real result when the join finishes. Luo et... 详细信息
来源: 评论
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”
收藏 引用
Security and Communication Networks 2018年 第1期2018卷
作者: Weizhong Qiang Shizhen Wang Hai Jin Jiangying Zhong Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 ***
来源: 评论
Maximizing the Profit of Cloud Broker with Priority Aware Pricing
Maximizing the Profit of Cloud Broker with Priority Aware Pr...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Xinhou Wang Song Wu Kezhi Wang Sheng Di Hai Jin Kun Yang Shumao Ou Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Northumbria University UK Argonne National Laboratory USA University of Essex UK Oxford Brookes University UK
A practical problem facing Infrastructure-as-a-Service (IaaS) cloud users is how to minimize their costs by choosing different pricing options based on their own demands. Recently, cloud brokerage service is introduce... 详细信息
来源: 评论
Efficient multiple-reference temporal error concealment algorithm based on H.264/AVC  2nd
Efficient multiple-reference temporal error concealment algo...
收藏 引用
2nd International Conference on Human Centered computing, HCC 2016
作者: Yu, Chen Cheng, Chao Jin, Hai Zhou, Jingli Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Temporal error concealment at the video communication receiver recovers damaged blocks using temporal information redundancy. To enhance the quality of reconstructed image, a multiple-reference temporal error concealm... 详细信息
来源: 评论
Secure cryptographic functions via virtualization-based outsourced computing
Secure cryptographic functions via virtualization-based outs...
收藏 引用
作者: Qiang, Weizhong Zhang, Kang Dai, Weiqi Jin, Hai Services Computing Technology and System Lab and Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Cryptographic functions, such as encryption/decryption libraries, are common and important tools for applications to enhance confidentiality of the data. However, these functions could be compromised by subtle attacks... 详细信息
来源: 评论
Runtime-aware adaptive scheduling in stream processing
Runtime-aware adaptive scheduling in stream processing
收藏 引用
作者: Liu, Yuan Shi, Xuanhua Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Long-running stream applications usually share the same fundamental computational infrastructure. To improve the efficiency of data processing in stream processing systems, a data analysis operator could be partitione... 详细信息
来源: 评论