咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 110 篇 工学
    • 75 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 13 篇 xie guoqi
  • 13 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 152 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
153 条 记 录,以下是131-140 订阅
排序:
Microservice Auto-Scaling Algorithm Based on Workload Prediction in Cloud-Edge Collaboration Environment
Microservice Auto-Scaling Algorithm Based on Workload Predic...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Zijun Peng Bing Tang Wei Xu Qing Yang Ehsanullah Hussaini Yuqiang Xiao Haiyan Li School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Center of Network and Education Technology Guangzhou Maritime University Guangzhou China
Cloud computing centrally consolidates hardware and computing resources, offering efficient and cost-effective services. However, as cloud computing centers are predominantly built and operated in a fully centralized ...
来源: 评论
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
An Improved Convolutional Neural network Algorithm for Multi-Label Classification
An Improved Convolutional Neural Network Algorithm for Multi...
收藏 引用
International Conference on Audio, Language and Image Processing, ICALIP
作者: Xinsheng Wang Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Shanghai China Research Center of Big Data and Network Security Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
Security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论
Related families-based attribute reduction of dynamic covering information systems with variations of object sets
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Department of Computer Science and Technology Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China College of Mathematics and Econometrics Hunan University Changsha Hunan410004 China
In practice, there are many dynamic covering decision information systems, and knowledge reduction of dynamic covering decision information systems is a significant challenge of covering-based rough sets. In this pape... 详细信息
来源: 评论
Related family-based attribute reduction of covering information systems when varying attribute sets
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Department of Computer Science and Technology Tongji University Shanghai201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China College of Mathematics and Econometrics Hunan University Changsha Hunan410004 China
In practical situations, there are many dynamic covering information systems with variations of attributes, but there are few studies on related family-based attribute reduction of dynamic covering information systems... 详细信息
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
Conflict Analysis for Pythagorean Fuzzy Information Systems with Group Decision Making
arXiv
收藏 引用
arXiv 2017年
作者: Lang, Guangming Department of Computer Science and Technology Tongji University Shanghai201804 China School of Mathematics and Statistics Changsha University of Science and Technology Changsha Hunan410114 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China
Pythagorean fuzzy sets provide stronger ability than intuitionistic fuzzy sets to model uncertainty information and knowledge, but little effort has been paid to conflict analysis of Pythagorean fuzzy information syst... 详细信息
来源: 评论
Cell-Free Massive MIMO-OFDM for High-Speed Train Communications
arXiv
收藏 引用
arXiv 2022年
作者: Zheng, Jiakang Zhang, Jiayi Björnson, Emil Li, Zhetao Ai, Bo The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Department of Computer Science KTH Royal Institute of Technology Kista Sweden The Hunan International Scientific and Technological Cooperation Base of Intelligent Network Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Hunan411105 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China
Cell-free (CF) massive multiple-input multiple-output (MIMO) systems show great potentials in low-mobility scenarios, due to cell boundary disappearance and strong macro diversity. However, the great Doppler frequency... 详细信息
来源: 评论