咨询与建议

限定检索结果

文献类型

  • 71 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 90 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 45 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 13 篇 信息与通信工程
    • 10 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 控制科学与工程
    • 5 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
  • 27 篇 理学
    • 12 篇 数学
    • 9 篇 生物学
    • 4 篇 化学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 blockchain
  • 4 篇 data models
  • 4 篇 web services
  • 3 篇 smart cities
  • 3 篇 computational mo...
  • 3 篇 predictive model...
  • 3 篇 feature extracti...
  • 3 篇 edge computing
  • 2 篇 surveys
  • 2 篇 reliability
  • 2 篇 object detection
  • 2 篇 task analysis
  • 2 篇 throughput
  • 2 篇 time factors
  • 2 篇 transformers
  • 2 篇 wireless communi...
  • 2 篇 medical services
  • 2 篇 quality of servi...

机构

  • 23 篇 school of comput...
  • 22 篇 hunan key labora...
  • 7 篇 hunan university...
  • 7 篇 hunan university...
  • 7 篇 school of comput...
  • 6 篇 state key labora...
  • 5 篇 hunan key labora...
  • 5 篇 school of inform...
  • 4 篇 changsha univers...
  • 4 篇 guangdong financ...
  • 4 篇 school of softwa...
  • 4 篇 school of comput...
  • 4 篇 college of compu...
  • 4 篇 hunan key labora...
  • 4 篇 hunan key labora...
  • 3 篇 school of comput...
  • 3 篇 hunan university...
  • 3 篇 nanjing universi...
  • 2 篇 school of physic...
  • 2 篇 the bilingual ex...

作者

  • 9 篇 cao buqing
  • 9 篇 liu jianxun
  • 8 篇 liang wei
  • 6 篇 huang weihong
  • 6 篇 wei liang
  • 5 篇 tang bing
  • 5 篇 cai jiahong
  • 5 篇 qing yang
  • 5 篇 bing tang
  • 5 篇 zhu hangyu
  • 4 篇 xiao yufeng
  • 4 篇 kang guosheng
  • 4 篇 wen yiping
  • 4 篇 li kuan-ching
  • 4 篇 yufeng xiao
  • 4 篇 jiahong cai
  • 3 篇 yuzhen liu
  • 3 篇 xie songyou
  • 3 篇 yang ce
  • 3 篇 xiang chen

语言

  • 86 篇 英文
  • 4 篇 其他
检索条件"机构=Hunan Key Laboratory for Service Computing and Novel Software Technology"
90 条 记 录,以下是11-20 订阅
排序:
Enrich Code Search Query Semantics with Raw Descriptions  19th
Enrich Code Search Query Semantics with Raw Descriptions
收藏 引用
19th EAI International Conference on Collaborative computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Liu, Xiangzheng Liu, Jianxun Hu, Haize Liu, Yi School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology Hunan University of Science and Technology Hunan Xiangtan China
Code search can recommend relevant source code according to the development intention (query statement) of the demander, thereby improving the efficiency of software development. In the research of deep code search mo... 详细信息
来源: 评论
Cryptography of Blockchain  7th
Cryptography of Blockchain
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Long, Ying Gong, Yinyan Huang, Weihong Cai, Jiahong Xu, Nengxiang Li, Kuan-ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China
With the development of digital currencies and 5G technology, blockchain has gained widespread attention and is being used in areas such as healthcare, industry and smart vehicles. Many security issues have also been ... 详细信息
来源: 评论
Blockchain Scalability Technologies  7th
Blockchain Scalability Technologies
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Xu, Nengxiang Cai, Jiahong Gong, Yinyan Zhang, Huan Huang, Weihong Li, Kuan-ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China
As the underlying implementation technology of the current main-stream digital currency, blockchain can establish a trusted distributed system without relying on third-party trusted institutions or a privacy-protect s... 详细信息
来源: 评论
Meter Location System Base on Jetson NX  1
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Yang, Chengjun zhou, Ling Yang, Ce Hechi University Guangxi Hechi China School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China
Analog meter is still widely used due to their mechanical stability and electromagnetic impedance. Relying on humans to read mechanical meters in some industrial scenarios is time-consuming or dangerous, it is difficu... 详细信息
来源: 评论
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks  10
A Heuristic-based Dynamic Scheduling and Routing Method for ...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Chen, Honglong Liu, Mindong Huang, Jing Zheng, Zhiling Huang, Weihong Xiao, Yufeng Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Hunan Industry Polytechnic Information Center Changsha410125 China
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve suc... 详细信息
来源: 评论
A Survey on Task Partitioning and Scheduling for Vehicular Edge computing  10
A Survey on Task Partitioning and Scheduling for Vehicular E...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Huang, Jing Wu, Wenyu Huang, Weihong Xiao, Yufeng Lisi, Li Sun, Jinxi Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China The Bilingual Experimental School HNSDFZ Changsha410006 China
Vehicle edge computing (VEC) has become an important research field in recent years. In VEC, computation offloading moves computationally intensive tasks from resource-constrained devices to the network edge, it provi... 详细信息
来源: 评论
Energy-saving Processors Two-phases Frequency Reduction Algorithm on Heterogeneous Embedded Systems  10
Energy-saving Processors Two-phases Frequency Reduction Algo...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Huang, Weihong Jiang, Kuan Huang, Jing Lisi, Li Xiao, Yufeng Deng, Zihao Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China The Bilingual Experimental School HNSDFZ Changsha410006 China
Energy saving has become a key issue for heterogeneous embedded systems. Previous energy-saving methods attempt to minimize the energy consumption of applications in heterogeneous embedded systems subject to deadline ... 详细信息
来源: 评论
Emergency Transportation and Structural Prediction and Optimization of Goods Based on ARIMA and Multi-objective E-commerce Logistics Network Model  1
Emergency Transportation and Structural Prediction and Optim...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable computing, ICAISC 2023
作者: Nie, Yiyang Chen, Xiang Wu, Xuanli Deng, Zihao Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Hunan University of Science and Technology Shcool of Mathematics and Computational Science Xiangtan China
With the development of the internet, online shopping has gradually become a popular way of shopping among the general public, which in turn poses a greater challenge to the e-commerce logistics network. Predicting th... 详细信息
来源: 评论
A real-time privacy-preserving scheme based on grouping queries for continuous location-based services
A real-time privacy-preserving scheme based on grouping quer...
收藏 引用
作者: Liu, Haoyu Zhang, Shiwen Li, Mengling Liang, Wei Arthur Sandor, Voundi Koe School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan Xiangtan China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Guangzhou China
With the advancement of global positioning systems and communication technologies, location-based services (LBS) have become widely used. However, user location privacy is vulnerable during service exchange, and locat... 详细信息
来源: 评论
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System  10
An Efficient Authentication Protocol for Brand Cosmetics Ant...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Meng, Xiangwei Yu, Qingchun Lang, Wei Liang, Yufeng Xu, Zisang Li, Kuanching Nanjing University of Aeronautics and Astronautics Nanjing China Hunan University of Science and Technology Xiangtan China Hunan University of Science and Technology Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China Changsha University of Science and Technology Changsha China
The counterfeit brand cosmetics made available on the market have always been a widespread concern. Traditional anti-counterfeiting schemes usually focus on the authenticity of brand cosmetics. However, verifying the ... 详细信息
来源: 评论