咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 283 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 264 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 93 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 47 篇 控制科学与工程
    • 46 篇 电气工程
    • 28 篇 生物工程
    • 24 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 18 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 核科学与技术
    • 11 篇 力学(可授工学、理...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
  • 250 篇 理学
    • 149 篇 数学
    • 68 篇 物理学
    • 35 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 11 篇 化学
  • 108 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 27 篇 医学
    • 22 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 7 篇 法学
  • 5 篇 农学
  • 3 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 14 篇 computational mo...
  • 13 篇 sensors
  • 11 篇 approximation al...
  • 11 篇 gravitational wa...
  • 11 篇 resource managem...
  • 11 篇 optimization
  • 11 篇 wireless sensor ...
  • 10 篇 semantics
  • 10 篇 algorithm design...
  • 9 篇 monitoring
  • 9 篇 servers
  • 9 篇 virtualization
  • 8 篇 graphics process...
  • 8 篇 wireless communi...
  • 8 篇 games
  • 7 篇 roads
  • 7 篇 schedules
  • 7 篇 protocols
  • 7 篇 gravitational wa...
  • 7 篇 training

机构

  • 66 篇 shanghai key lab...
  • 58 篇 shanghai key lab...
  • 45 篇 department of co...
  • 26 篇 shanghai key lab...
  • 21 篇 shanghai key lab...
  • 20 篇 shanghai key lab...
  • 18 篇 college of mathe...
  • 16 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...

作者

  • 39 篇 guan haibing
  • 39 篇 chen guihai
  • 30 篇 wu fan
  • 29 篇 guihai chen
  • 25 篇 yanmin zhu
  • 25 篇 fan wu
  • 21 篇 haibing guan
  • 19 篇 lu bao-liang
  • 19 篇 zhu yanmin
  • 17 篇 gao xiaofeng
  • 15 篇 r. takahashi
  • 15 篇 j. c. bayley
  • 15 篇 t. m. evans
  • 15 篇 k. komori
  • 15 篇 t. kajita
  • 15 篇 f. hellman
  • 15 篇 s. eguchi
  • 15 篇 m. kinley-hanlon
  • 15 篇 t. mcrae
  • 15 篇 a. parisi

语言

  • 600 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Shanghai Key Laboratory of Scalable Computing and Systems"
627 条 记 录,以下是51-60 订阅
排序:
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
Static program analysis assisted dynamic taint tracking for ...
收藏 引用
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program from malicious behaviors, but fails to prov... 详细信息
来源: 评论
Frontier-based multi-robot map exploration using particle swarm optimization
Frontier-based multi-robot map exploration using particle sw...
收藏 引用
IEEE Symposium on Swarm Intelligence
作者: Wang, Yiheng Liang, Alei Guan, Haibing School of Software Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai 200240 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai 200240 China
Exploring an unknown environment using team of autonomous mobile robots is an important task in many real-world applications. Many existing map exploration algorithms are based on frontier, which is the boundary betwe... 详细信息
来源: 评论
Rethinking benchmarking for NVM-based file systems  16
Rethinking benchmarking for NVM-based file systems
收藏 引用
7th ACM SIGOPS Asia-Pacific Workshop on systems, APSys 2016
作者: Dong, Mingkai Yu, Qianqian Zhou, Xiaozhou Hong, Yang Chen, Haibo Zang, Binyu Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China
Fast, byte-addressable NVM promises near-cache latency and near memory bus throughput for file systems, which is evident by recent development of a number of NVM file systems (NVMFS). However, a key approach to measur... 详细信息
来源: 评论
NUMA-aware graph-structured analytics  2015
NUMA-aware graph-structured analytics
收藏 引用
20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP 2015
作者: Zhang, Kaiyuan Chen, Rong Chen, Haibo Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China
Graph-structured analytics has been widely adopted in a number of big data applications such as social computation, web-search and recommendation systems. Though much prior research focuses on scaling graph-analytics ... 详细信息
来源: 评论
Powerlyra: Differentiated graph computation and partitioning on skewed graphs  15
Powerlyra: Differentiated graph computation and partitioning...
收藏 引用
10th European Conference on Computer systems, EuroSys 2015
作者: Chen, Rong Shi, Jiaxin Chen, Yanzhe Chen, Haibo Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China
Natural graphs with skewed distribution raise unique challenges to graph computation and partitioning. Existing graph-parallel systems usually use a "one size fits all" design that uniformly processes all ve... 详细信息
来源: 评论
Wavelet neural networks optimized by QPSO for network anomaly detection
收藏 引用
Journal of Computational Information systems 2011年 第7期7卷 2452-2460页
作者: Liu, Yuan Ma, Ruhui School of Digital Media Jiangnan University Wuxi 214122 China Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer science and Engineering Shanghai Jiaotong University Shanghai 200240 China
In this paper, a novel hybrid algorithm based wavelet neural network (WNN) is proposed for network anomaly detection. This new evolutionary algorithm, which is based on a hybrid of Quantum-Behaved Particle Swarm Optim... 详细信息
来源: 评论
DICFaaS: Parallel and scalable Data Integrity Computation for Serverless systems  30
DICFaaS: Parallel and Scalable Data Integrity Computation fo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed systems, ICPADS 2024
作者: Xiong, Tianchen Peng, Bo Shanghai Jiao Tong University School of Software Shanghai China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Serverless computing is extensively employed in distributed storage computing scenarios owing to its dynamic responsiveness and on-demand allocation capabilities. Within distributed storage computing, data integrity c... 详细信息
来源: 评论
VASP: Virtualization assisted security monitor for cross-platform protection  11
VASP: Virtualization assisted security monitor for cross-pla...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied computing
作者: Zhu, Min Yu, Miao Xia, Mingyuan Li, Bingyu Yu, Peijie Gao, Shang Qi, Zhengwei Liu, Liang Chen, Ying Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China IBM Research China China
Numerous operating systems have been designed to manage and control system resources with large and complicated features, so they need high security protection. However, previous security applications can not provide ... 详细信息
来源: 评论
Manhattan hashing for large-scale image retrieval  12
Manhattan hashing for large-scale image retrieval
收藏 引用
35th Annual ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2012
作者: Kong, Weihao Li, Wu-Jun Guo, Minyi Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
Hashing is used to learn binary-code representation for data with expectation of preserving the neighborhood structure in the original feature space. Due to its fast query speed and reduced storage cost, hashing has b... 详细信息
来源: 评论
Energy efficient allocation of virtual machines in cloud computing environments based on demand forecast
Energy efficient allocation of virtual machines in cloud com...
收藏 引用
7th International Conference on Advances in Grid and Pervasive computing, GPC 2012
作者: Cao, Jian Wu, Yihua Li, Minglu Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
In cloud computing environments, demands from different users are often handled on virtual machines (VMs) which are deployed over plenty of hosts. Huge amount of electrical power is consumed by these hosts and auxilia... 详细信息
来源: 评论