咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 70 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 75 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 电气工程
    • 9 篇 网络空间安全
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 34 篇 理学
    • 15 篇 生物学
    • 13 篇 数学
    • 5 篇 化学
    • 3 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 30 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...

主题

  • 30 篇 grid computing
  • 25 篇 virtual machinin...
  • 20 篇 peer to peer com...
  • 19 篇 servers
  • 16 篇 computers
  • 15 篇 computer science
  • 15 篇 cloud computing
  • 14 篇 resource managem...
  • 13 篇 bandwidth
  • 12 篇 application soft...
  • 12 篇 kernel
  • 11 篇 protocols
  • 11 篇 virtual machine ...
  • 11 篇 hardware
  • 10 篇 scalability
  • 9 篇 operating system...
  • 8 篇 computational mo...
  • 8 篇 computer network...
  • 8 篇 large-scale syst...
  • 7 篇 access control

机构

  • 52 篇 services computi...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 17 篇 school of softwa...
  • 15 篇 school of inform...
  • 12 篇 national enginee...
  • 11 篇 services computi...
  • 11 篇 cluster and grid...
  • 8 篇 huazhong univers...
  • 8 篇 services computi...
  • 8 篇 jinyinhu laborat...
  • 7 篇 cluster and grid...
  • 6 篇 key laboratory o...
  • 5 篇 cluster and grid...
  • 5 篇 nanyang technolo...

作者

  • 134 篇 hai jin
  • 45 篇 jin hai
  • 25 篇 xiaofei liao
  • 24 篇 deqing zou
  • 20 篇 song wu
  • 18 篇 hu shengshan
  • 14 篇 zhang leo yu
  • 13 篇 li minghui
  • 13 篇 fangming liu
  • 12 篇 xuanhua shi
  • 11 篇 zou deqing
  • 11 篇 zhou ziqi
  • 10 篇 ran zheng
  • 9 篇 long zheng
  • 8 篇 qin zhang
  • 8 篇 wan wei
  • 8 篇 hong yao
  • 7 篇 kan hu
  • 7 篇 shi xuanhua
  • 7 篇 wang xianlong

语言

  • 225 篇 英文
  • 12 篇 中文
  • 4 篇 其他
检索条件"机构=Services Computing Technology and System Laboratory"
241 条 记 录,以下是221-230 订阅
排序:
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
eTime: Energy-Efficient Transmission between Cloud and Mobile Devices
eTime: Energy-Efficient Transmission between Cloud and Mobil...
收藏 引用
IEEE INFOCOM Conference
作者: Peng Shu Fangming Liu Hai Jin Min Chen Feng Wen Yupeng Qu Bo Li Key Laboratory of Services Computing Technology and System Ministry of Education China Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China Hong Kong University of Science and Technology Hong Kong
Mobile cloud computing, promising to extend the capabilities of resource-constrained mobile devices, is emerging as a new computing paradigm which has fostered a wide range of exciting applications. In this new paradi... 详细信息
来源: 评论
Routing Recovery for UAV Networks with Deliberate Attacks: A Reinforcement Learning based Approach
Routing Recovery for UAV Networks with Deliberate Attacks: A...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Sijie He Ziye Jia Chao Dong Wei Wang Yilu Cao Yang Yang Qihui Wu The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing Jiangsu State Key Laboratory of Integrated Services Networks (Xidian University) Xi'an Institute of Computing Technologies China Academy of Railway Sciences Corporation Limited Beijing
The unmanned aerial vehicle (UAV) network is popular these years due to its various applications. In the UAV network, routing is significantly affected by the distributed network topology, leading to the issue that UA...
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Multi-granularity grid resource reservation technology
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and technology (Natural Science Edition) 2010年 第SUPPL. 1期38卷 68-72页
作者: Xie, Bo Wu, Song Shi, Xuanhua Xiao, Kang College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Services Computing Technology and System Laboratory of the Ministry of Education Huazhong University of Science and Technology Wuhan 430074 China
We develop a system managing resource reservation for grid applications. The system provides different granularity of resource reservation to meet the resource requirements for different applications. In order to adap... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
iGniter: Interference-Aware GPU Resource Provisioning for Predictable DNN Inference in the Cloud
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Fei Xu, Jianian Chen, Jiabin Chen, Li Shang, Ruitao Zhou, Zhi Liu, Fangming The Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University 3663 N. Zhongshan Road Shanghai200062 China The School of Computing and Informatics University of Louisiana at Lafayette 301 East Lewis Street LafayetteLA70504 United States The Guangdong Key Laboratory of Big Data Analysis and Processing School of Computer Science and Engineering Sun Yat-sen University 132 E. Waihuan Road Guangzhou510006 China The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China
GPUs are essential to accelerating the latency-sensitive deep neural network (DNN) inference workloads in cloud datacenters. To fully utilize GPU resources, spatial sharing of GPUs among co-located DNN inference workl... 详细信息
来源: 评论
Routing Recovery for UAV Networks with Deliberate Attacks: A Reinforcement Learning based Approach
arXiv
收藏 引用
arXiv 2023年
作者: He, Sijie Jia, Ziye Dong, Chao Wang, Wei Cao, Yilu Yang, Yang Wu, Qihui The Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Institute of Computing Technologies China Academy of Railway Sciences Corporation Limited Beijing10081 China
The unmanned aerial vehicle (UAV) network is popular these years due to its various applications. In the UAV network, routing is significantly affected by the distributed network topology, leading to the issue that UA... 详细信息
来源: 评论
Distributed Computation Offloading using Deep Reinforcement Learning in Internet of Vehicles
Distributed Computation Offloading using Deep Reinforcement ...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Chen Chen Zheng Wang Qingqi Pei Ci He Zhibin Dou State Key Laboratory of Integrated Services Networks Xidian University Xi'an P.R.China Key Laboratory of Industrial Internet of Things & Networked Control Ministry of Education Chongqing China The Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai China The 54th Research Institute of China Electronics Technology Group Corporation Shijiazhuang China
In this paper, we first take the moving vehicles as a RP (resource pool), by which we proposed a distributed computation offloading scheme to fully utilize the available resources and reduce task execution time in I0V... 详细信息
来源: 评论