咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 70 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 75 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 134 篇 hai jin
  • 45 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 long zheng
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 225 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Services Computing Technology and System Laboratory"
241 条 记 录,以下是141-150 订阅
排序:
Grid Security Interoperation between CGSP and VEGA
Grid Security Interoperation between CGSP and VEGA
收藏 引用
International Conference on Future Generation Communication and Networking (FGCN)
作者: Deqing Zou Hai Jin Xueguang Chen Zongfen Han Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan China
Grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UN... 详细信息
来源: 评论
Event-Driven Scheduling for P2P VoD
Event-Driven Scheduling for P2P VoD
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Bin Cheng Hai Jin Xiaofei Liao Bo Li Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms th... 详细信息
来源: 评论
The Content Pollution in Peer-to-Peer Live Streaming systems: Analysis and Implications
The Content Pollution in Peer-to-Peer Live Streaming Systems...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Sirui Yang Hai Jin Bo Li Xiaofei Liao Hong Yao Xuping Tu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
There has been significant progress in the development and deployment of peer-to-peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experien... 详细信息
来源: 评论
Performance Modeling of Resource Failures in Grid Environments
Performance Modeling of Resource Failures in Grid Environmen...
收藏 引用
Japan-China Joint Workshop on Frontier of Computer Science and technology (FCST)
作者: Yongcai Tao Song Wu Lei Shi School of Information Engineering University of Zhengzhou Zhengzhou Henan China Services Computing Technology and System Laboratory Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China
Grid is susceptible to a number of software and hardware failures, so a deep understanding of and modeling the grid resource failures are a challenge and have significant influence on grid researching. However, due to... 详细信息
来源: 评论
HAND: Highly Available Dynamic Deployment Infrastructure for Globus Toolkit 4
HAND: Highly Available Dynamic Deployment Infrastructure for...
收藏 引用
Euromicro Conference on Parallel, Distributed and Network-Based Processing
作者: Li Qi Hai Jin Ian Foster Jarek Gawor Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Chicago USA Mathematics and Computer Science Division Argonne National Laboratory USA
Grid computing is becoming more and more attractive for coordinating large-scale heterogeneous resource sharing and problem solving. Of particular interest for effective grid computing is a software provisioning mecha... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Audio-on-demand over wireless sensor networks  12
Audio-on-demand over wireless sensor networks
收藏 引用
International Workshop on Quality of Service
作者: Hanhua Chen Hai Jin Lingchao Guo Shaoliang Wu Tao Gu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Mathematics and Computer Science University of Southern Denmark Odense M Denmark
Audio represents one of the most appealing yet least exploited modalities in wireless sensor networks, due to the potentially extremely large data volumes and limited wireless capacity. Therefore, how to effectively c... 详细信息
来源: 评论
Minimizing inter-server communications by exploiting self-similarity in online social networks
Minimizing inter-server communications by exploiting self-si...
收藏 引用
International Conference on Network Protocols
作者: Hanhua Chen Hai Jin Ning Jin Tao Gu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Mathematics and Computer Science University of Southern Denmark Odense M Denmark
Efficiently operating on relevant data for users in large-scale online social network (OSN) systems is a challenging problem. Storage systems used by popular OSN systems often rely on key-value stores, where randomly ... 详细信息
来源: 评论
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure
Building dynamic integrity protection for multiple independe...
收藏 引用
International Workshop on Grid computing
作者: Ge Cheng Hai Jin Deqing Zou Xinwen Zhang Min Li Chen Yu Guofu Xiang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Samsung Information Systems America Inc. San Jose CA USA
In grid and cloud computing infrastructures, the integrity of a computing platform is a critical security requirement in order to provide secure and honest computing environments to service providers and resource cons... 详细信息
来源: 评论