咨询与建议

限定检索结果

文献类型

  • 71 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 92 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 55 篇 工学
    • 48 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
  • 27 篇 理学
    • 12 篇 数学
    • 9 篇 生物学
    • 4 篇 化学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 教育学

主题

  • 5 篇 training
  • 4 篇 deep learning
  • 4 篇 blockchain
  • 4 篇 data models
  • 4 篇 web services
  • 3 篇 smart cities
  • 3 篇 computational mo...
  • 3 篇 predictive model...
  • 3 篇 feature extracti...
  • 3 篇 edge computing
  • 2 篇 surveys
  • 2 篇 reliability
  • 2 篇 object detection
  • 2 篇 task analysis
  • 2 篇 throughput
  • 2 篇 time factors
  • 2 篇 transformers
  • 2 篇 wireless communi...
  • 2 篇 drones
  • 2 篇 medical services

机构

  • 24 篇 school of comput...
  • 24 篇 hunan key labora...
  • 8 篇 hunan university...
  • 7 篇 hunan university...
  • 7 篇 school of comput...
  • 6 篇 hunan key labora...
  • 6 篇 state key labora...
  • 5 篇 school of inform...
  • 4 篇 changsha univers...
  • 4 篇 guangdong financ...
  • 4 篇 school of softwa...
  • 4 篇 school of comput...
  • 4 篇 college of compu...
  • 4 篇 hunan key labora...
  • 4 篇 hunan key labora...
  • 3 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 hunan university...
  • 3 篇 nanjing universi...
  • 2 篇 school of physic...

作者

  • 10 篇 liang wei
  • 9 篇 cao buqing
  • 9 篇 liu jianxun
  • 6 篇 huang weihong
  • 6 篇 wei liang
  • 5 篇 tang bing
  • 5 篇 cai jiahong
  • 5 篇 qing yang
  • 5 篇 bing tang
  • 5 篇 zhu hangyu
  • 4 篇 li kuanching
  • 4 篇 xiao yufeng
  • 4 篇 kang guosheng
  • 4 篇 wen yiping
  • 4 篇 li kuan-ching
  • 4 篇 yufeng xiao
  • 4 篇 gong yinyan
  • 4 篇 jiahong cai
  • 3 篇 yuzhen liu
  • 3 篇 li xiong

语言

  • 89 篇 英文
  • 3 篇 其他
检索条件"机构=Hunan Key Laboratory for Service Computing and Novel Software Technology"
92 条 记 录,以下是11-20 订阅
排序:
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars  24
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Nie, Hejing Wen, Yiping Li, Tiancai Ouyang, Sipeng Tian, Muyang School of Computer Science and Engineering Hunan University of Science and Technology China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology China
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
A Short Review of Truck and Drone Collaborative Delivery Problem  10
A Short Review of Truck and Drone Collaborative Delivery Pro...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Zhu, Yena Liu, Min Jin, Dongyao Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China
With the emergence of efficient logistics models and the development of drone technology, the last-mile delivery problem has become a focus of attention for scholars in various fields. The advantages of drones, such a... 详细信息
来源: 评论
Research on global register allocation for code containing array-unit dual-usage register names
Research on global register allocation for code containing a...
收藏 引用
作者: Hu, Yonghua Zhang, Xin Wang, Shuying Liang, Wei Li, Kuan-Ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China
Array-unit dual-usage register is a kind of register resource that can be read or written as a whole or individually. It is mainly configured in processors with SIMD processing units and provides register-level speed ... 详细信息
来源: 评论
Towards Using Local Process Mining to Analyse Learning Behavior Pattern  17th
Towards Using Local Process Mining to Analyse Learning Behav...
收藏 引用
17th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2022
作者: Ouyang, Sipeng Wen, Yiping Liu, Jianxun Qi, Lianyong Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Xiangtan411201 China Qufu Normal University Qufu273165 China
Learning behavior is the key factor to promote the occurrence of effective learning. Analyzing learning behavior pattern is helpful to understand the common learning behavior of different types of learners. This paper... 详细信息
来源: 评论
Application Deployment in Mobile Edge computing Environment Based on Microservice Chain  25
Application Deployment in Mobile Edge Computing Environment ...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Li, Haiyan Tang, Bing Xu, Wei Guo, Feiyan Zhang, Xiaoyuan Hunan University of Science and Technology School of Computer Science and Engineering Hunan Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China
Mobile edge computing (MEC) has become an extremely hot topic in recent years. Mobile edge cloud relies on storage and computing resources on network edge to provide users with delay-sensitive services. However, the t... 详细信息
来源: 评论
Cryptography of Blockchain  7th
Cryptography of Blockchain
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Long, Ying Gong, Yinyan Huang, Weihong Cai, Jiahong Xu, Nengxiang Li, Kuan-ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China
With the development of digital currencies and 5G technology, blockchain has gained widespread attention and is being used in areas such as healthcare, industry and smart vehicles. Many security issues have also been ... 详细信息
来源: 评论
Blockchain Scalability Technologies  7th
Blockchain Scalability Technologies
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Xu, Nengxiang Cai, Jiahong Gong, Yinyan Zhang, Huan Huang, Weihong Li, Kuan-ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China
As the underlying implementation technology of the current main-stream digital currency, blockchain can establish a trusted distributed system without relying on third-party trusted institutions or a privacy-protect s... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI  10
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Li, Yanlu Xiao, Yufeng Gong, Yinyan Zhang, Ronglin Huo, Yingzi Wu, Yanbing Hunan Key Laboratory for Service Computing Novel Software Technology Xiangtan411201 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论
Constraint-aware and multi-objective optimization for micro-service composition in mobile edge computing
Constraint-aware and multi-objective optimization for micro-...
收藏 引用
作者: Wu, Jintao Zhang, Jingyi Zhang, Yiwen Wen, Yiping School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Technology Anhui University Anhui China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Hunan China
As a new paradigm of distributed computing, mobile edge computing (MEC) has gained increasing attention due to its ability to expand the capabilities of centralized cloud computing. In MEC environments, a software app... 详细信息
来源: 评论
Meter Location System Base on Jetson NX  1
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Yang, Chengjun zhou, Ling Yang, Ce Hechi University Guangxi Hechi China School of Computer Science and Engineering Hunan University of Science and Technology Hunan Xiangtan China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan China
Analog meter is still widely used due to their mechanical stability and electromagnetic impedance. Relying on humans to read mechanical meters in some industrial scenarios is time-consuming or dangerous, it is difficu... 详细信息
来源: 评论