咨询与建议

限定检索结果

文献类型

  • 333 篇 会议
  • 140 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 282 篇 计算机科学与技术...
    • 207 篇 软件工程
    • 54 篇 信息与通信工程
    • 32 篇 生物工程
    • 25 篇 电气工程
    • 21 篇 控制科学与工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 交通运输工程
    • 7 篇 光学工程
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
  • 107 篇 理学
    • 53 篇 数学
    • 35 篇 生物学
    • 19 篇 系统科学
    • 11 篇 化学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
  • 96 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 16 篇 法学
    • 9 篇 社会学
    • 7 篇 法学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 文学
  • 3 篇 农学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 24 篇 grid computing
  • 20 篇 computational mo...
  • 15 篇 scalability
  • 15 篇 cloud computing
  • 14 篇 bandwidth
  • 13 篇 semantics
  • 11 篇 servers
  • 11 篇 virtualization
  • 10 篇 deep neural netw...
  • 10 篇 feature extracti...
  • 9 篇 memory managemen...
  • 9 篇 computer archite...
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 computer science
  • 8 篇 operating system...
  • 8 篇 software enginee...
  • 8 篇 mapreduce
  • 8 篇 machine learning
  • 8 篇 privacy

机构

  • 100 篇 national enginee...
  • 71 篇 services computi...
  • 53 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 cluster and grid...
  • 28 篇 national enginee...
  • 27 篇 cluster and grid...
  • 26 篇 hubei engineerin...
  • 25 篇 services computi...
  • 24 篇 huazhong univers...
  • 23 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 15 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 services computi...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...

作者

  • 211 篇 jin hai
  • 191 篇 hai jin
  • 42 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 31 篇 deqing zou
  • 29 篇 zou deqing
  • 25 篇 wu song
  • 24 篇 shi xuanhua
  • 21 篇 song wu
  • 19 篇 hu shengshan
  • 17 篇 haikun liu
  • 14 篇 jiang xiao
  • 14 篇 ran zheng
  • 13 篇 zhang leo yu
  • 13 篇 yu zhang
  • 12 篇 xia xie
  • 12 篇 wan yao
  • 12 篇 zhou ziqi
  • 12 篇 li minghui
  • 11 篇 zhang hongyu

语言

  • 458 篇 英文
  • 17 篇 其他
  • 6 篇 中文
检索条件"机构=Services Computing Technology and System Lab. Cluster and Grid Computing Lab."
480 条 记 录,以下是311-320 订阅
排序:
SKVM: Scaling In-Memory Key-Value Store on Multicore
SKVM: Scaling In-Memory Key-Value Store on Multicore
收藏 引用
IEEE Symposium on Computers and Communication
作者: Ran Zheng Wenjin Wang Hai Jin Qin Zhang Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
SKVM is a high performance in-memory Key-Value (KV) store for multicore, which is designed for high concurrent data access. There are some problems of existing systems dealing with high concurrent data processing on m... 详细信息
来源: 评论
Cost Minimization for Code Offloading with Cellular Traffic Aggregation
Cost Minimization for Code Offloading with Cellular Traffic ...
收藏 引用
IEEE Symposium on Computers and Communication
作者: Jiao Song Feng Lu Hai Jin Zaiyang Tang Peng Li Xiaofei Liao Xia Xie Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Code offloading has been proposed to improve the performance and energy-efficiency of mobile devices by sending heavy computation tasks to resourceful cloud, instead of executing all tasks on local mobile devices. Unf... 详细信息
来源: 评论
A Novel Fast Approach for Convolutional Networks with Small Filters Based on GPU
A Novel Fast Approach for Convolutional Networks with Small ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Wenbin Jiang Yiming Chen Hai Jin Bin Luo Ye Chi Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Recently, convolutional networks have achieved great successes in the field of computer vision. In order to improve the efficiency of convolutional networks, large amount of solutions focusing on training algorithms a... 详细信息
来源: 评论
Cost-Effective Hybrid Replacement Strategy for SSD in Web Cache
Cost-Effective Hybrid Replacement Strategy for SSD in Web Ca...
收藏 引用
IEEE International Conference on Ubiquitous computing and Communications
作者: Qu Li Xiaofei Liao Hai Jin Li Lin Xia Xie Qiongjie Yao Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
The increasing popularity of photo sharing in social networking service (SNS) complicates the challenge of storing and transmitting large photo data for SNS providers. Distributed web caches are generally used by SNS ... 详细信息
来源: 评论
A Map-reduce Method for Training Autoencoders on Xeon Phi
A Map-reduce Method for Training Autoencoders on Xeon Phi
收藏 引用
IEEE International Conference on Ubiquitous computing and Communications
作者: Qiongjie Yao Xiaofei Liao Hai Jin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
The stacked autoencoder is a deep learning model that consists of multiple autoencoders. This model has been widely applied in numerous machine learning applications. A significant amount of effort has been made to in... 详细信息
来源: 评论
URMG: Enhanced CBMG-Based Method for Automatically Testing Web Applications in the Cloud
收藏 引用
Tsinghua Science and technology 2014年 第1期19卷 65-75页
作者: Xiaolin Xu Hai Jin Song Wu Lixiang Tang Yihong Wang Services Computing Technology and System Lab and Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalab.lity provided by clouds, a sing... 详细信息
来源: 评论
Ciphertext-Policy Attribute-Based Encryption with Short Keys
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 655-660页
作者: XU Peng TANG Yong JIANG Wenbin JIN Hai ZOU Deqing Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to red... 详细信息
来源: 评论
Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor
Scheme for Ensuring Data Security on Cloud Data Storage in a...
收藏 引用
International Conference on Computer Science and Network technology
作者: Zaid Alaa Hussien Hai Jin Zaid Ameen Abduljabbar Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Cluster and Grid Computing Lab Big Data Technology and System Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Cloud computing is a promising information technology service that allocates and reallocates resources when a client requires virtual data storage and network facility at any time and place. Cloud computing provides l... 详细信息
来源: 评论
A Secured Scheme for Geographical Distance Computation over Encrypted Cloud Data
A Secured Scheme for Geographical Distance Computation over ...
收藏 引用
International Conference on Computer Science and Network technology
作者: Zaid Ameen Abduljabbar Hai Jin Ayad Ibrahim Aqeel Noori Mohammed Abdulridha Hussain Zaid Alaa Hussien Deqing Zou Salah H. Abbdal Cluster and Grid Computing Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China University of Basrah Basrah Iraq
Popular service providers, such as Google and Amazon, have turned their vast resources into a cloud computing model and enforced their businesses to run applications on the servers of such new model. To ensure securit... 详细信息
来源: 评论
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment
Robust image document authentication code with autonomous bi...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Zaid Ameen Abduljabbar Hai Jin Zaid Alaa Hussien Ali A. Yassin Mohammed Abdulridha Hussain Salah H. Abbdal Deqing Zou Cluster and Grid Computing Lab Services Computing Technology and System Lab Huazhong University of Science and Technology Wuhan China University of Basrah Basrah Iraq Southern Technical University Basrah Iraq
Recently, security issues are obstructing the development and using of cloud computing services. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to rec... 详细信息
来源: 评论