咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,927 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,797 篇 工学
    • 1,906 篇 计算机科学与技术...
    • 1,500 篇 软件工程
    • 580 篇 信息与通信工程
    • 345 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,428 篇 理学
    • 707 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 151 篇 化学
    • 147 篇 系统科学
  • 755 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 94 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 65 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 liu yang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,966 篇 英文
  • 186 篇 其他
  • 139 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4285 条 记 录,以下是3911-3920 订阅
排序:
Threshold Quantum Secret Sharing of Secure Direct Communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Network
Yarqs: Yet Another Range Queries Schema in DHT Based P2P Net...
收藏 引用
International Conference on computer and Information technology (CIT)
作者: Hao Zhang Hai Jin Qin Zhang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks beco... 详细信息
来源: 评论
VRFPS: A Novel Virtual Machine-Based Real-time File Protection system
VRFPS: A Novel Virtual Machine-Based Real-time File Protecti...
收藏 引用
International Conference on Software Engineering Research, Management and Applications (SERA)
作者: Feng Zhao Yali Jiang Guofu Xiang Hai Jin Wenbin Jiang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the development of virtualization technology, file protection in virtual machine, especially in guest OS, becomes more and more important. Traditional host-based file protection system resides the critical module... 详细信息
来源: 评论
PMonitor: A Lightweight Performance Monitor for Virtual Machines
PMonitor: A Lightweight Performance Monitor for Virtual Mach...
收藏 引用
International Workshop on Education technology and computer science, ETCS
作者: Zhiyuan Shao Hai Jin Xiaowen Lu Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Performance monitor for virtual machines can monitor the performance metrics of virtual machines and gain the resource consumption status, and thus provide reliable basis for system performance evaluation and further ... 详细信息
来源: 评论
Optimize Performance of Virtual Machine Checkpointing via Memory Exclusion
Optimize Performance of Virtual Machine Checkpointing via Me...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Haikun Liu Hai Jin Xiaofei Liao Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Virtual machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level... 详细信息
来源: 评论
VDE: Seamless Mobility on Desktop Environment
VDE: Seamless Mobility on Desktop Environment
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Xiaofei Liao Xianwen Chen Hai Jin Zongfen Han Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Virtual desktop environment (VDE) provides a real virtual working environment in which users could personally customize and update the application list from application template libraries. The heterogeneous applicatio... 详细信息
来源: 评论
Live virtual machine migration with adaptive, memory compression
Live virtual machine migration with adaptive, memory compres...
收藏 引用
IEEE International Conference on Cluster computing
作者: Hai Jin Li Deng Song Wu Xuanhua Shi Xiaodong Pan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Live migration of virtual machines has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance, and power-saving, especially in clusters or data centers. Although pre-copy is a predomina... 详细信息
来源: 评论
Fast Isosurface Extraction for Medical Volume Dataset on Cell BE
Fast Isosurface Extraction for Medical Volume Dataset on Cel...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Hai Jin Bo Li Ran Zheng Qin Zhang Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The size of volumetric data generated by medical imaging and scientific simulations is increased significantly due to the dramatic advances in medical imaging modalities and computing technologies. The volumetric data... 详细信息
来源: 评论
The Theory of Triangle Type-2 Fuzzy Sets
The Theory of Triangle Type-2 Fuzzy Sets
收藏 引用
International Conference on computer and Information technology (CIT)
作者: Zehua Lv Hai Jin Pingpeng Yuan Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Interval type-2 fuzzy set is the most popular kind of type-2 fuzzy set, its characteristic is that all the secondary membership functions equal to 1. Though interval type-2 fuzzy sets can reduce the calculation comple... 详细信息
来源: 评论
DVM-MAC: A Mandatory Access Control system in Distributed Virtual computing Environment
DVM-MAC: A Mandatory Access Control System in Distributed Vi...
收藏 引用
International Conference on Parallel and Distributed systems (ICPADS)
作者: Deqing Zou Lei Shi Hai Jin Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
We design and implement a Mandatory Access Control (MAC) system in distributed virtual computing environment, named DVM-MAC, aiming to provide distributed trust through enforcing MAC policies. In DVM-MAC, Prioritized ... 详细信息
来源: 评论