咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 151 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
152 条 记 录,以下是131-140 订阅
排序:
Neighbor Diversification-Based Collaborative Filtering for Improving Recommendation Lists
Neighbor Diversification-Based Collaborative Filtering for I...
收藏 引用
International Workshop on Intelligent Communication and Social networks
作者: Chao Yang Cong Cong Ai Renfa Li Key Laboratory for Embedded and Network Computing of Hunan University
Recommendation systems are popular information filtering tools that help people find what they want. Accuracy is the most widely used metric for evaluating recommendation systems. Recently, many research works have fo... 详细信息
来源: 评论
Discriminative hough-voting for object detection with parts
Discriminative hough-voting for object detection with parts
收藏 引用
International Conference on Mechatronic Science, Electric Engineering and Computer
作者: Yaodong Chen Renfa Li Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
Many detection models rely on sliding-window methods to search all possible candidates and then localize true instances by linear classifiers. Such exhaustive search involves massive computation. Hough voting scheme p... 详细信息
来源: 评论
A Power Model Combined of Architectural Level and Gate Level for Multicore Processors
A Power Model Combined of Architectural Level and Gate Level...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Manman Peng Yan Hu Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China
Low power consumption is becoming a critical factor for multicore processors. As the multicore processor design complexity increases, power estimation for multicore processors has gained more importance. This paper pr... 详细信息
来源: 评论
An intrusion detection system for cluster based wireless sensor networks
收藏 引用
Information Technology Journal 2013年 第9期12卷 1764-1771页
作者: Deng, Xue Wu, Renyong Wang, Wenru Bu, Renfei Key Laboratory for Embedded and Network Computing of Hunan Province Changsha Hunan 410082 China School of Information Science and Engineering Hunan University Changsha 410082 China
With the rapid development of wireless communication technology, wireless sensor networks (WSNs) have been widely used in many fields. Therefore, the security become an important issue in WSNs. Compared with the wired... 详细信息
来源: 评论
A K-NN and Sparse Representation Based Method for Gesture Recognition
A K-NN and Sparse Representation Based Method for Gesture Re...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Meifang Zeng Ling Xiao Renfa Li Key Laboratory of Embedded and Network Hunan University Changsha China
Sparse representation classification is widely used in pattern recognition. In this paper, a k-nn and sparse represent based method for gesture recognition (KSRC) is proposed. In order to reduce the computational comp... 详细信息
来源: 评论
Disease-related gene expression analysis using an ensemble statistical test method
Disease-related gene expression analysis using an ensemble s...
收藏 引用
9th International Conference on Intelligent computing, ICIC 2013
作者: Wang, Bing Ji, Zhiwei Advanced Research Institute of Intelligent Sensing Network Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China School of Electronics and Information Engineering Tongji University Shanghai 201804 China
The development of novel high-throughput experimental techniques makes it possible to comprehensively analyze biological data in health and disease. However, a large amount of data generated results in dramatic data-a... 详细信息
来源: 评论
RELIABILITY-DRIVEN REAL-TIME TASK REPLICATION FOR FAULT TOLERANCE IN HIERARCHICAL SCHEDULING MULTIPROCESSOR SYSTEMS
RELIABILITY-DRIVEN REAL-TIME TASK REPLICATION FOR FAULT TOLE...
收藏 引用
2013IET International Conference on Information and Communication Technologies(IETICT2013)2013IET信息与通信技术国际会议
作者: Lin Liu Renfa Li Rui Li Yong Xie Qingguang Zeng Key Laboratory for Embedded and Network Computing of Hunan Province Hunan UniversityChangshaChina
The increasing complexity of systems poses a big challenge to design systems with fault-tolerant *** aim of this study was to establish fault-tolerant system for multiprocessor platform with the help of hierarchical s... 详细信息
来源: 评论
Compressed sensing based on best wavelet packet basis for image processing
收藏 引用
Journal of Computers (Finland) 2013年 第8期8卷 1947-1950页
作者: Li, Zhe Tao Xie, Jing Xiong Yu, Zu Guo Tu, Deng Biao Choi, Young June The College of Information Engineering Xiangtan University Hunan 411105 China School of Computer National University of Defense Technology Hunan 410073 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China School of Mathematics and Computational Science Xiangtan University Hunan 411105 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ... 详细信息
来源: 评论
A cross layer collaborating cache scheme to improve performance of HTTP clients in MANETs
收藏 引用
International Journal of u- and e- Service, Science and Technology 2013年 第6期6卷 51-57页
作者: Liu, Jin Ren, Hongmin Wang, Jin Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Shipping Institute Shanghai Maritime University Shanghai China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Shanghai Maritime University Shanghai China
This paper proposes a novel cross layer collaborating cache scheme for HTTP clients. It is designed to accelerate the process that an HTTP client retrieves Web content in mobile ad hoc network environment. Unlike othe... 详细信息
来源: 评论
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论