咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 70 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 75 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 134 篇 hai jin
  • 45 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 long zheng
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 225 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Services Computing Technology and System Laboratory"
241 条 记 录,以下是11-20 订阅
排序:
Understanding and identifying latent data races cross-thread interleaving
收藏 引用
Frontiers of Computer Science 2015年 第4期9卷 524-539页
作者: Long ZHEN~ Xiaofei LIAO Song WU Xuepeng FAN Hai JIN Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Data races are ubiquitous in multi-threaded ap- plications, but they are by no means easy to detect. One of the most important reasons is the complexity of thread in- terleavings. A volume of research has been devoted... 详细信息
来源: 评论
Exploring Semantic Association Rules Between Keyword and Visual Feature Clusters for Web Image Retrieval
收藏 引用
电子学报(英文版) 2008年 第1期17卷 59-65页
作者: JIN Hai HE Ruhan TAO Wenbing Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan 430074 China
The semantic gap is a big challenge in image retrieval area. Previous studies in web image retrieval have mainly focused on Relevance feedback (RF) and Latent semantic indexing (LSI) to alleviate the gap. This paper p... 详细信息
来源: 评论
A Protective Mechanism for the Access Control system in the Virtual Domain
收藏 引用
China Communications 2016年 第11期13卷 129-142页
作者: Jinan Shen Deqing Zou Hai Jin Kai Yang Bin Yuan Weiming Li Services Computing Technology and System Laboratory Cluster and Grid Computing LaboratorySchool of Computing Science and TechnologyHuazhong University of Science and Technology School of Information Engineering Hubei University for Nationalities
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... 详细信息
来源: 评论
Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
收藏 引用
Chinese Science Bulletin 2014年 第32期59卷 4201-4209页
作者: Peng Xu Hongwu Chen Deqing Zou Hai Jin Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology
Cloud is an emerging computing *** has drawn extensive attention from both academia and *** its security issues have been considered as a critical obstacle in its rapid *** data owners store their data as plaintext in... 详细信息
来源: 评论
Finding and evaluating the community structure in semantic peer-to-peer overlay networks
收藏 引用
Science China(Information Sciences) 2011年 第7期54卷 1340-1351页
作者: CHEN HanHua & JIN Hai services computing technology and system laboratory,Cluster and Grid computing laboratory,School of Computer Science and technology,Huazhong University of Science and technology,Wuhan 430074,China 1. Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Recently much attention has been paid to semantic overlay networks for information retrieval in large scale peer-to-peer networks,and much research work on semantic overlay protocols and searching algorithms has been ... 详细信息
来源: 评论
An approach for indexing, storing and retrieving domain knowledge
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied computing 2007年 1381-1382页
作者: Wu, Hao Jin, Hai Ning, Xiaomin Cluster and Grid Computing Laboratory Services Computing Technology and System Lab. Huazhong University of Science and Technology Wuhan 430074 China
In this short paper, we present our solution to index, store and retrieve the domain knowledge. The main principle exploits Lucene to index the domain knowledge under guide of the domain schema. The method to map doma... 详细信息
来源: 评论
UiLog: Improving Log-Based Fault Diagnosis by Log Analysis
收藏 引用
Journal of Computer Science & technology 2016年 第5期31卷 1038-1052页
作者: De-Qing Zou Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan ~3007~ China Big Data Technology and System Laboratory Huazhong University of Science and Technology Wuhan 430074 China Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan 430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
In modern computer systems, system event logs have always been the primary source for checking system status. As computer systems become more and more complex, the interaction between software and hardware increases f... 详细信息
来源: 评论
Evaluating RISC-V Vector Instruction Set Architecture Extension with Computer Vision Workloads
收藏 引用
Journal of Computer Science & technology 2023年 第4期38卷 807-820页
作者: 李若时 彭平 邵志远 金海 郑然 National Engineering Research Center for Big Data Technology and System Huazhong University of Science and Technology Wuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and TechnologyWuhan 430074 China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power... 详细信息
来源: 评论
A Survey of Non-Volatile Main Memory Technologies:State-of-the-Arts,Practices,and Future Directions
收藏 引用
Journal of Computer Science & technology 2021年 第1期36卷 4-32页
作者: Hai-Kun Liu Di Chen Hai Jin Xiao-Fei Liao Binsheng He Kan Hu Yu Zhang National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computing Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Computing National University of SingaporeSingapore 117418Singapore
Non-Volatile Main Memories (NVMMs) have recently emerged as a promising technology for future memory systems. Generally, NVMMs have many desirable properties such as high density, byte-addressability, non-volatility, ... 详细信息
来源: 评论
Minimal Context-Switching Data Race Detection with Dataflow Tracking
收藏 引用
Journal of Computer Science & technology 2024年 第1期39卷 211-226页
作者: 郑龙 李洋 辛杰 刘海峰 郑然 廖小飞 金海 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Data race is one of the most important concurrent anomalies in multi-threaded *** con-straint-based techniques are leveraged into race detection,which is able to find all the races that can be found by any oth-er soun... 详细信息
来源: 评论