咨询与建议

限定检索结果

文献类型

  • 76 篇 期刊文献
  • 52 篇 会议
  • 2 册 图书

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 59 篇 计算机科学与技术...
    • 52 篇 电气工程
    • 19 篇 信息与通信工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 软件工程
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 机械工程
    • 3 篇 地质资源与地质工...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 核科学与技术
    • 2 篇 环境科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
  • 26 篇 理学
    • 10 篇 数学
    • 8 篇 生物学
    • 6 篇 物理学
    • 4 篇 地球物理学
    • 2 篇 地质学
    • 1 篇 化学
  • 15 篇 管理学
    • 14 篇 管理科学与工程(可...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 2 篇 临床医学
  • 1 篇 军事学

主题

  • 130 篇 compression algo...
  • 15 篇 data compression
  • 6 篇 internet of thin...
  • 5 篇 data storage
  • 5 篇 bayesian network
  • 5 篇 fpga
  • 4 篇 compression algo...
  • 4 篇 reverse time mig...
  • 4 篇 image coding
  • 4 篇 compression
  • 4 篇 compression rati...
  • 4 篇 lossless compres...
  • 4 篇 nyquist theorem
  • 3 篇 pre-copy
  • 3 篇 neural interface...
  • 3 篇 random access me...
  • 3 篇 huffman code
  • 3 篇 wireless sensor ...
  • 3 篇 brain-machine in...
  • 3 篇 live migration

机构

  • 3 篇 univ jyvaskyla f...
  • 3 篇 natl univ def te...
  • 3 篇 stanford univ de...
  • 2 篇 natl univ def te...
  • 2 篇 hengyang normal ...
  • 2 篇 ryazan state rad...
  • 2 篇 chinese acad mil...
  • 2 篇 jamk univ appl s...
  • 2 篇 stanford univ de...
  • 2 篇 chinese acad mil...
  • 1 篇 key laboratory o...
  • 1 篇 fudan univ sch c...
  • 1 篇 south china norm...
  • 1 篇 chinese acad sci...
  • 1 篇 univ texas austi...
  • 1 篇 petrochina south...
  • 1 篇 dipartimento fis...
  • 1 篇 hengyang normal ...
  • 1 篇 yuan ze univ dep...
  • 1 篇 soochow univ sch...

作者

  • 5 篇 yao wen
  • 5 篇 zheng xiaohu
  • 4 篇 xu yingchun
  • 3 篇 chichilnisky e. ...
  • 3 篇 vaananen olli
  • 3 篇 murmann boris
  • 3 篇 tandon pulkit
  • 3 篇 chen xiaoqian
  • 3 篇 hamalainen timo
  • 2 篇 zhao huihuang
  • 2 篇 manzocchi tom
  • 2 篇 chen xianqi
  • 2 篇 liu zhen
  • 2 篇 xiong hua
  • 2 篇 lai shin-chi
  • 2 篇 mitra subhasish
  • 2 篇 li zhe
  • 2 篇 chen wenhui
  • 2 篇 lee js
  • 2 篇 wootters mary

语言

  • 118 篇 英文
  • 11 篇 其他
检索条件"主题词=Compression Algorithm"
130 条 记 录,以下是61-70 订阅
排序:
Objective and subjective evaluation of High Dynamic Range video compression
收藏 引用
SIGNAL PROCESSING-IMAGE COMMUNICATION 2016年 47卷 426-437页
作者: Mukherjee, R. Debattista, K. Bashford-Rogers, T. Vangorp, P. Mantiuk, R. Bessa, M. Waterfield, B. Chalmers, A. Univ Warwick WMG Coventry CV4 7AL W Midlands England Bangor Univ Bangor Gwynedd Wales Univ Cambridge Cambridge CB2 1TN England UTAD Vila Real Portugal Jaguar Land Rover Automot PLC Coventry W Midlands England
A number of High Dynamic Range (HDR) video compression algorithms proposed to date have either been developed in isolation or only-partially compared with each other. Previous evaluations were conducted using quality ... 详细信息
来源: 评论
Murmur-adaptive compression technique for phonocardiogram signals
收藏 引用
ELECTRONICS LETTERS 2016年 第3期52卷 183-184页
作者: Kim, Sunjung Hwang, Dosik Yonsei Univ Sch Elect & Elect Engn Seoul 120749 South Korea
As mobile and wearable health technologies have evolved, constant monitoring of bio-signals from patients has become important for accurate diagnosis using mobile and remote health services. As the need for constant m... 详细信息
来源: 评论
A Comparison of Road-Network-Constrained Trajectory compression Methods  22
A Comparison of Road-Network-Constrained Trajectory Compress...
收藏 引用
22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji, Yudian Liu, Hao Liu, Xiaoying Ding, Ye Luo, Wuman Hong Kong Univ Sci & Technol Hong Kong Hong Kong Peoples R China Univ Macau Zhuhai Peoples R China
The popularity of location-acquisition devices has led to a rapid increase in the amount of trajectory data collected. The large volume of trajectory data causes the difficulties of storing and processing the data. Va... 详细信息
来源: 评论
Comparison of compression algorithms on Vehicle Communications System
Comparison of Compression Algorithms on Vehicle Communicatio...
收藏 引用
IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Shuai, Chunyan Li, Siqi Liu, Hongrui Kunming Univ Sci & Technol Fac Elect Power Engn Kunming Peoples R China
in order to improve the compression ratio, most of improved compression methods require more memory and CPU time. But these improvements are not suitable for embedded system with limited-resource, especially for vehic... 详细信息
来源: 评论
Recording and replaying of battle simulation situation data based on serialization and compression algorithm
Recording and replaying of battle simulation situation data ...
收藏 引用
2011 International Conference on System Science, Engineering Design and Manufacturing Informatization, ICSEM 2011
作者: Liu, Shuo Li, Zenghua Yang, Xuehui Battle Simulation Center Academy of Armored Forces Engineering 21st Mail Box Dujiakan Beijing 100072 China Department of Equipment Command and Administration Academy of Armored Forces Engineering 21st Mail Box Dujiakan Beijing 100072 China
Recording and replaying of situation data is critical in the battle simulation system, which is the foundation of the subsequent analysis and evaluation. First of all, the demand for recording and replaying of situati... 详细信息
来源: 评论
Fast Multilevel Computation of Low-Rank Representation of H-Matrix Blocks
收藏 引用
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION 2016年 第12期64卷 5326-5334页
作者: Brick, Yaniv Yilmaz, Ali E. Univ Texas Austin Austin TX 78712 USA
A physics-based algorithm for accelerating the computation of method of moments matrix blocks' low-rank approximation is presented. The algorithm relies on efficient sampling of phase-and amplitude-compensated int... 详细信息
来源: 评论
A provably secure non-iterative hash function resisting birthday attack
收藏 引用
THEORETICAL COMPUTER SCIENCE 2016年 654卷 128-142页
作者: Su, Shenghui Xie, Tao Lu, Shuwang Natl Univ Def Technol Sch Comp Changsha 410073 Hunan Peoples R China Beijing Univ Technol Lab Trusted Comp Beijing 100124 Peoples R China Univ Chinese Acad Sci Sch Comp Beijing 100039 Peoples R China BFID Corp Lab Computat Complex Beijing 100098 Peoples R China
To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non -iterative hash function called JUNA that is based on a multivariate permutation problem and an an... 详细信息
来源: 评论
7.1:Invited Paper:How to Quantify Vision-for-Recognition and Vision-for-Action for Distinct Display Form Factors
收藏 引用
SID Symposium Digest of Technical Papers 2018年 第S1期49卷
作者: Shun-nan Yang Vision Performance Institute Pacific University College of Optometry Forest Grove OR
Human vision is roughly composed of two distinct but integrated functional pathways: vision-for-recognition and vision-for-action. Likewise, display form factors can be categorized as passive viewing (e.g., office wor... 详细信息
来源: 评论
A Secure Virtual Machine Migration Using Memory Space Prediction for Cloud Computing
A Secure Virtual Machine Migration Using Memory Space Predic...
收藏 引用
IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Jeincy, G. Jarlin Shaji, R. S. Jayan, J. P. Noorul Islam Univ Comp Sci Kumaracoil Tamil Nadu India Noorul Islam Univ Kumaracoil Tamil Nadu India
A cost effective, easy to manage, elastic and powerful resources over the internet is provided to the users by cloud environment. The resource pooling allows the use of same pool by multiple users through multi tenanc... 详细信息
来源: 评论
Dec :: Tech Reports :: Src-Tn-2000-005
收藏 引用
2016年
Dec :: Tech Reports :: Src-Tn-2000-005 by published by
来源: 评论