咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 40 篇 期刊文献

馆藏范围

  • 106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 75 篇 工学
    • 54 篇 计算机科学与技术...
    • 33 篇 软件工程
    • 13 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 电气工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 控制科学与工程
    • 5 篇 交通运输工程
    • 5 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 核科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 15 篇 数学
    • 7 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 系统科学
    • 2 篇 化学
  • 14 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 医学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 scheduling
  • 3 篇 computer archite...
  • 3 篇 algorithm design...
  • 3 篇 scheduling algor...
  • 3 篇 hardware
  • 3 篇 training
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection
  • 2 篇 kinetic energy
  • 2 篇 generative adver...
  • 2 篇 fault tolerance
  • 2 篇 real time system...
  • 2 篇 logic gates
  • 2 篇 embedded systems
  • 2 篇 convergence
  • 2 篇 quality of servi...

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 13 篇 college of compu...
  • 11 篇 key laboratory f...
  • 4 篇 national collabo...
  • 4 篇 college of infor...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 embedded systems...
  • 3 篇 key laboratory o...
  • 3 篇 pku-hkust shenzh...
  • 2 篇 nanjing universi...
  • 2 篇 huawei technolog...
  • 2 篇 oath verizon com...
  • 2 篇 key laboratory o...
  • 2 篇 tsinghua univers...
  • 2 篇 nationalcollabor...
  • 2 篇 huawei technolog...

作者

  • 15 篇 renfa li
  • 14 篇 xie guoqi
  • 14 篇 li renfa
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 5 篇 junli wang
  • 5 篇 chungang yan
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 li zhiyong
  • 4 篇 li keqin
  • 4 篇 jiang bin
  • 4 篇 wei zhang
  • 3 篇 jiqing yao
  • 3 篇 chang wanli
  • 3 篇 yang kehua

语言

  • 105 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded Network Computing of Hunan Province"
106 条 记 录,以下是101-110 订阅
排序:
RELIABILITY-DRIVEN REAL-TIME TASK REPLICATION FOR FAULT TOLERANCE IN HIERARCHICAL SCHEDULING MULTIPROCESSOR SYSTEMS
RELIABILITY-DRIVEN REAL-TIME TASK REPLICATION FOR FAULT TOLE...
收藏 引用
2013IET International Conference on Information and Communication Technologies(IETICT2013)2013IET信息与通信技术国际会议
作者: Lin Liu Renfa Li Rui Li Yong Xie Qingguang Zeng Key Laboratory for Embedded and Network Computing of Hunan Province Hunan UniversityChangshaChina
The increasing complexity of systems poses a big challenge to design systems with fault-tolerant *** aim of this study was to establish fault-tolerant system for multiprocessor platform with the help of hierarchical s... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zeng, Juanli Wang, Yi Xu, Cheng Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence Information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论
A unified architecture for supporting operations of AES and ECC
A unified architecture for supporting operations of AES and ...
收藏 引用
2011 4th International Symposium on Parallel Architectures, Algorithms and Programming, PAAP 2011
作者: Wang, Yi Li, Renfa Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论
A Unified Architecture for Supporting Operations of AES and ECC
A Unified Architecture for Supporting Operations of AES and ...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Yi Wang Renfa Li Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论