咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 98 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 32 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 电气工程
    • 17 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
  • 63 篇 理学
    • 27 篇 数学
    • 19 篇 生物学
    • 17 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 26 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 6 篇 deep learning
  • 6 篇 energy consumpti...
  • 6 篇 hardware
  • 5 篇 semantics
  • 5 篇 algorithm design...
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 convolution
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 feature extracti...
  • 4 篇 field programmab...
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 4 篇 scheduling
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 fault tolerance

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of infor...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 national collabo...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 baidu inc.
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...

作者

  • 20 篇 renfa li
  • 18 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 yi wang
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 6 篇 wang yi
  • 5 篇 li zhetao
  • 5 篇 yang zhan
  • 5 篇 tian shujuan
  • 5 篇 junli wang
  • 5 篇 shujuan tian
  • 5 篇 li keqin
  • 5 篇 chungang yan
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi

语言

  • 191 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University"
195 条 记 录,以下是111-120 订阅
排序:
Software-Defined Edge computing: A New Architecture Paradigm to Support IoT Data Analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Di Xie, Xiaofeng Nie, Xiang Fu, Bin Deng, Hanhui Zeng, Haibo Qin, Zhijin Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China Department of Electrical and Computer Engineering Virginia Tech United States EECS Queen Mary University of London United Kingdom
—The rapid deployment of Internet of Things (IoT) applications leads to massive data that need to be processed. These IoT applications have specific communication requirements on latency and bandwidth, and present ne... 详细信息
来源: 评论
RTISM: Real-Time Inter-VM Communication Based on Shared Memory for Mixed-Criticality Flows
RTISM: Real-Time Inter-VM Communication Based on Shared Memo...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Zonghong Li Guoqi Xie Wenhong Ma Xiongren Xiao Yong Xie Wei Ren Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University China Research Institute of Hunan University in Chongqing China Nanjing University of Posts and Telecommunications China Huawei Technologies China
Virtual machines (VMs) have been increasingly deployed in real-time systems to enhance heterogeneous resource sharing. Despite being isolated for security and prevention of failure propagation, VMs need to communicate...
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
International Symposium on Integrated Circuits (ISIC)
作者: Yi Wang Zheng Yuan Zhican Li Renfa Li Embedded Systems & Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
A deep hashing method based on attention module for image retrieval  13
A deep hashing method based on attention module for image re...
收藏 引用
13th International Conference on Intelligent Computation Technology and Automation, ICICTA 2020
作者: Long, Jun Wei, Xiangxiang Qi, Qianqian Wang, Ye School of Computer Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha410083 China
Hashing retrieval technique has received widespread attention since its low storage consumption and fast retrieval speed. Image retrieval based on deep hashing method uses image features with high-level semantic infor... 详细信息
来源: 评论
Dynamic negotiation strategy based parallel-offer in cloud computing
收藏 引用
Journal of Computational Information Systems 2015年 第10期11卷 3691-3699页
作者: Hu, Jun Xu, Ru Xiao, Deyu College of Computer Science and Electronics Engineering Hunan University Changsha China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
Cloud computing can dynamically provide service based on service level agreements that between cloud services and consumers. Establish a viable and efficient dynamic negotiation strategy is one of hot research in clou... 详细信息
来源: 评论
Non-cooperative game approach for task offloading in edge clouds
arXiv
收藏 引用
arXiv 2018年
作者: Yang, Bo. Li, Zhiyong Liu, Wenbin College of Information and Management Hunan University of Finance and Economics Changsha410205 China College of Computer Science and Electronic Engineering of Hunan University National Supercomputing Center in Changsha Key Laboratory for Embedded and Network Computing of Hunan Province Changsha410082 China
—Task offloading provides a promising way to enhance the capability of the mobile terminal (also called terminal user) that is distributed on network edge and communicates edge clouds with wireless. Generally, there ... 详细信息
来源: 评论
EBCRO: Hybrid chemical reaction with employed bee operator
EBCRO: Hybrid chemical reaction with employed bee operator
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Zhiyong Li Tingkun Yuan Bo Yang Shilong Jiang Yanmei Xie College of Computer Science and Electronic Engineering of Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China PKU-HKUST Shenzhen-Hongkong Institution Shenzhen China Hunan Vocational College of Modern Logistics Changsha China
His article proposes a new hybrid algorithm EBCRO, which combines the local search operator of chemical reaction optimization algorithm (CRO) with modified employed bee operator (EB) main part of artificial bee colony... 详细信息
来源: 评论
A Real-Time CAN-CAN Gateway with Tight Latency Analysis and Targeted Priority Assignment
A Real-Time CAN-CAN Gateway with Tight Latency Analysis and ...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Guoqi Xie Haijie Gong Yunbo Han Samarjit Chakraborty Wanli Chang College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China Future Network Lab CSIG Tencent China University of North Carolina at Chapel Hill USA University of York UK
There is a demand in the automotive industry to connect two CAN-based subsystems. The commercial CAN-CAN gateway supports basic message forwarding with no real-time behavior. To address this issue, a new gateway archi... 详细信息
来源: 评论
WkNER: Enhancing Named Entity Recognition with Word Segmentation Constraints and kNN Retrieval  30
WkNER: Enhancing Named Entity Recognition with Word Segmenta...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Li, Yanchun Deng, Senlin Shen, Dongsu Tian, Shujuan Long, Saiqin School of Computer Science School of Cyberspace Science Xiangtan University China Hunan International Scientific and Technological Cooperation Base of Intelligent Network China Key Laboratory of Hunan Province for Internet of Things and Information Security China College of Information Science and Technology Jinan University China
Fine-tuning Pre-trained Language Models (PLMs) is a popular Natural Language Processing (NLP) paradigm for addressing Named Entity Recognition (NER) tasks. However, neural network models often demonstrate poor general... 详细信息
来源: 评论
System-Level Energy-Aware Design Methodology Towards End-To-End Response Time Optimization
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2019年
作者: Xie, Guoqi Huang, Jing Li, Yan Liu Renfa Li, Keqin Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha Hunan 410082 China. College of Computer Science and Electronic Engineering Hunan University China 410082 China and also is with the Department of Computer Science State University of New York New Paltz New York 12561 USA.
Energy provision is known and limited for battery-constrained/powered systems (e.g., mobile phones, electric cars, robots, and wireless sensor networks). System-level energy-aware design methodologies have been propos... 详细信息
来源: 评论