咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 70 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 75 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 134 篇 hai jin
  • 45 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 long zheng
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 225 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Services Computing Technology and System Laboratory"
241 条 记 录,以下是121-130 订阅
排序:
Desktop Virtualization: Techniques and Applications
Desktop Virtualization: Techniques and Applications
收藏 引用
International Conference on Pervasive computing and Applications (ICPCA)
作者: Hai Jin Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science슠and슠Technology Wuhan China
In this talk, the author discusses some recent advances in desktop virtualization field. Especially, the author talks about desktop virtualization research work in the National 973 Basic Research Program, The Research... 详细信息
来源: 评论
Adaptive Interference-Aware VNF Placement for Service-Customized 5G Network Slices
Adaptive Interference-Aware VNF Placement for Service-Custom...
收藏 引用
IEEE Conference on Computer Communications
作者: Qixia Zhang Fangming Liu Chaobing Zeng Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
Based on network function virtualization (NFV) and software defined network (SDN), network slicing is proposed as a new paradigm for building service-customized 5G network. In each network slice, service-required virt... 详细信息
来源: 评论
iDARE: Proactive Data Replication Mechanism for P2P VoD system
iDARE: Proactive Data Replication Mechanism for P2P VoD Syst...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Xiaofei Liao Fan Zhang Hai Jin Linchen Yu Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China China University of Geoscience Wuhan China
Peer-to-peer (P2P) on-demand streaming systems inevitably suffer from peers churn that is the inherent dynamic characteristic of overlay network. With frequent peer departure, a large amount of media data cached on pe... 详细信息
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment
SHelp: Automatic Self-Healing for Multiple Application Insta...
收藏 引用
IEEE International Conference on Cluster computing
作者: Gang Chen Hai Jin Deqing Zou Bing Bing Zhou Weizhong Qiang Gang Hu Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan China Centre of Distributed and High Performance Computing School of Information Technologies University of Sydney NSW Australia
When multiple instances of an application running on multiple virtual machines, an interesting problem is how to utilize the fault handling result from one application instance to heal the same fault occurred on other... 详细信息
来源: 评论
Worm Containment in Peer-to-Peer Networks
Worm Containment in Peer-to-Peer Networks
收藏 引用
International Conference on Scalable computing and Communications;International Conference on Embedded computing, SCALCOM-EMBEDDEDCOM
作者: Sirui Yang Hai Jin Bo Li Xiaofei Liao Hong Yao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Hong Kong University of Science and Technology Hong Kong China
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) networks, especially with respect to worm epidemics. However, existing worm containment mechanisms can be largely ineffectiv... 详细信息
来源: 评论
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response
When smart grid meets geo-distributed cloud: An auction appr...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Zhi Zhou Fangming Liu Zongpeng Li Hai Jin Key Laboratory of Services Computing Technology and System Huazhong University of Science and Technology China Department of Computer Science University of Calgary Canada
Datacenter demand response is envisioned as a promising tool for mitigating operational stability issues faced by smart grids. It enables significant potentials in peak load reduction and facilitates the incorporation... 详细信息
来源: 评论
Analyzing and Improving MPI Communication Performance in Overcommitted Virtualized systems
Analyzing and Improving MPI Communication Performance in Ove...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication systems (MASCOTS)
作者: Zhiyuan Shao Qiang Wang Xuejiao Xie Hai Jin Ligang He Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Warwick Coventry UK
Nowadays, it is an important trend in the system domain to use the software-based virtualization technology to build the execution environments (e.g., Clouds) and serve high performance computing (HPC) applications. H... 详细信息
来源: 评论
Adaptive Disk I/O Scheduling for MapReduce in Virtualized Environment
Adaptive Disk I/O Scheduling for MapReduce in Virtualized En...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Shadi Ibrahim Hai Jin Lu Lu Bingsheng He Song Wu Cluster and Grid Computing laboratory Services Computing Technology and System laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Engineering Nanyang Technological University Singapore
Virtual machine (VM) interference has long been a challenging problem for performance predictability and system throughput for large-scale virtualized environments in the cloud. Such interferences are contributed by i... 详细信息
来源: 评论