咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 151 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
152 条 记 录,以下是61-70 订阅
排序:
TrafficGPT: Towards Multi-Scale Traffic Analysis and Generation with Spatial-Temporal Agent Framework
arXiv
收藏 引用
arXiv 2024年
作者: Ouyang, Jinhui Zhu, Yijie Yuan, Xiang Wu, Di Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha Hunan410082 China
The precise prediction of multi-scale traffic is a ubiquitous challenge in the urbanization process for car owners, road administrators, and governments. In the case of complex road networks, current and past traffic ... 详细信息
来源: 评论
Sensor data fusion based on an improved dempaster-shafer evidence theory in vehicular cyber-physical systems
Sensor data fusion based on an improved dempaster-shafer evi...
收藏 引用
IEEE International Symposium on Intelligent Control (ISIC)
作者: Mengmeng Ma Jiyao An Zhong Huang Zhangbao Cao Key Laboratory of Embedded and Network Computing of Hunan Province Hunan University Changsha PR China
In Vehicular Cyber-Physical Systems (VCPS), the collected sensor data are always uncertain and conflicting. Dempster-Shafer (DS) evidence theory can effectively deal with uncertain information, but the Dempster's ... 详细信息
来源: 评论
Schedule length minimization of parallel applications with energy consumption constraints using heuristics on heterogeneous distributed systems
Schedule length minimization of parallel applications with e...
收藏 引用
作者: Xie, Guoqi Xiao, Xiongren Li, Renfa Li, Keqin College of Computer Science and Electronic Engineering Hunan University Changsha China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China Department of Computer Science State University of New York AlbanyNY United States
Energy consumption is one of the primary design constraints in heterogeneous parallel and distributed systems ranging from small embedded devices to large-scale data centers. The problem of minimizing the schedule len... 详细信息
来源: 评论
Online object tracking based on local sparse representation in a Bayesian inference framewo
收藏 引用
Journal of Computational Information Systems 2015年 第11期11卷 3919-3928页
作者: Liu, Zekun Xu, Cheng Key Laboratory for Embedded Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha China
Significant research has been devoted to object tracking. Most existing algorithms can track the object well in the controlled environment. However, they may fail in the presence of drastic appearance changes or compl... 详细信息
来源: 评论
On Efficient Feature Ranking Methods for High-Throughput Data Analysis
On Efficient Feature Ranking Methods for High-Throughput Dat...
收藏 引用
作者: Liao, Bo Jiang, Yan Liang, Wei Peng, Lihong Peng, Li Hanyurwimfura, Damien Li, Zejun Chen, Min Key Laboratory for Embedded and Network Computing of Hunan Province College of Information Science and Engineering Hunan University Changsha Hunan410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Department of Computer Science and Engineering Changsha Medical University Changsha Hunan410219 China
Efficient mining of high-throughput data has become one of the popular themes in the big data era. Existing biology-related feature ranking methods mainly focus on statistical and annotation information. In this study... 详细信息
来源: 评论
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zeng, Juanli Wang, Yi Xu, Cheng Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
The Impact of Word Segmentation on CCG-based Arabic-English SMT
The Impact of Word Segmentation on CCG-based Arabic-English ...
收藏 引用
2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017)
作者: Hamdi Ahmed Rajeh Zhi-yong LI Al-Ghaili Mohammed College of Computer Science and Electronic Engineering Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province
This paper presents a comparative study of two approaches to statistical machine translation(SMT).We present a study on Factored Machine Translation for the Arabic–English pair of *** illustrate pre-processing step f... 详细信息
来源: 评论
Activity-specific caloric expenditure estimation from kinetic energy harvesting in wearable devices
收藏 引用
Pervasive and Mobile computing 2020年 67卷 101185-101185页
作者: Xiao, Ling Wu, Kai Tian, Xiaobing Luo, Juan College of Computer Science and Electronic Engineering Hunan University Changsha0731 China Key Laboratory for Embedded and Network Computing of Hunan Province China
Accurate and efficient estimation of caloric expenditure during daily activities is desirable in tracking personal activity and health. Kinetic energy harvesting (KEH) has created an opportunity for wearable devices w... 详细信息
来源: 评论
Brief Industry Paper: Response Time Evaluation of Cross-Domain Communication in CAN-FD and TSN
Brief Industry Paper: Response Time Evaluation of Cross-Doma...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Wenhong Ma Xiaoyi Huang Dongsheng Wei Renfa Li Yunfei Zhang Guoqi Xie Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China Tencent Future Network Lab Tencent Corporation China
With the advancement of intelligence and networked automotive, the domain-centralized architecture, which employs time sensitive networking (TSN) as the inter-domain backbone network and control area network with flex...
来源: 评论