咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 98 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 32 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 电气工程
    • 17 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
  • 63 篇 理学
    • 27 篇 数学
    • 19 篇 生物学
    • 17 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 26 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 6 篇 deep learning
  • 6 篇 energy consumpti...
  • 6 篇 hardware
  • 5 篇 semantics
  • 5 篇 algorithm design...
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 convolution
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 feature extracti...
  • 4 篇 field programmab...
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 4 篇 scheduling
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 fault tolerance

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of infor...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 national collabo...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 baidu inc.
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...

作者

  • 20 篇 renfa li
  • 18 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 yi wang
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 6 篇 wang yi
  • 5 篇 li zhetao
  • 5 篇 yang zhan
  • 5 篇 tian shujuan
  • 5 篇 junli wang
  • 5 篇 shujuan tian
  • 5 篇 li keqin
  • 5 篇 chungang yan
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi

语言

  • 191 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University"
195 条 记 录,以下是151-160 订阅
排序:
Asymmetric deep semantic quantization for image retrieval
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Zhan Raymond, Osolo Ian Sun, WuQing Long, Jun School of Computer Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
Due to its fast retrieval and storage efficiency capabilities, hashing has been widely used in nearest neighbor retrieval tasks. By using deep learning based techniques, hashing can outperform non-learning based hashi... 详细信息
来源: 评论
Asymmetric residual neural network for accurate human activity recognition
arXiv
收藏 引用
arXiv 2019年
作者: Long, Jun Sun, WuQing Raymond, Osolo Ian Yang, Zhan School of Information Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
Human Activity Recognition (HAR) using deep neural network has become a hot topic in human-computer interaction. Machine can effectively identify human naturalistic activities by learning from a large collection of se... 详细信息
来源: 评论
Deep attention-guided Hashing
arXiv
收藏 引用
arXiv 2018年
作者: Yang, Zhan Raymond, Osolo Ian Sun, WuQing Long, Jun School of Information Science and Engineering Central South University Changsha410083 China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province
With the rapid growth of multimedia data (e.g., image, audio and video etc.) on the web, learning-based hashing techniques such as Deep Supervised Hashing (DSH) have proven to be very efficient for large-scale multime... 详细信息
来源: 评论
Secrecy and covert communications against UAV surveillance via multi-hop networks
arXiv
收藏 引用
arXiv 2019年
作者: Wang, Hui-Ming Zhang, Yan Zhang, Xu Li, Zhetao School of Electronic and Information Engineering Xi'an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Key Laboratory of Hunan Province for Internet of Things and Information Security College of Information Engineering Xiangtan University Hunan China
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security and covert communic... 详细信息
来源: 评论
A deep hashing method based on attention module for image retrieval
A deep hashing method based on attention module for image re...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Jun Long Xiangxiang Wei Qianqian Qi Ye Wang The School of Computer Science and Engineering Central South University Changsha China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
Hashing retrieval technique has received widespread attention since its low storage consumption and fast retrieval speed. Image retrieval based on deep hashing method uses image features with high-level semantic infor... 详细信息
来源: 评论
Scholars influence evaluation based on time series heterogeneous network
Scholars influence evaluation based on time series heterogen...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation, ICMTMA
作者: Ye Wang Zhen Ding Xiang Xiang Wei Jun Long The School of Computer Science and Engineering Central South University Changsha China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
In recent years, with the rapid development of network and data mining, multi-source heterogeneous data related to academics has also shown an exponential growth. As an important research field of academic big data, t... 详细信息
来源: 评论
Microservice Auto-Scaling Algorithm Based on Workload Prediction in Cloud-Edge Collaboration Environment
Microservice Auto-Scaling Algorithm Based on Workload Predic...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Zijun Peng Bing Tang Wei Xu Qing Yang Ehsanullah Hussaini Yuqiang Xiao Haiyan Li School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Center of Network and Education Technology Guangzhou Maritime University Guangzhou China
Cloud computing centrally consolidates hardware and computing resources, offering efficient and cost-effective services. However, as cloud computing centers are predominantly built and operated in a fully centralized ...
来源: 评论
Routing Strategy for SDN Large Flow Based on Deep Reinforcement Learning
Routing Strategy for SDN Large Flow Based on Deep Reinforcem...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yu Ke Junli Wang Chungang Yan Jiamin Yao Key Laboratory of Embedded System and Service Computing Collaborative Innovation Center for Financial Network Security (Tongji University) Ministry of Education National (Province-Ministry Joint) Tongji University Shanghai China
With the expansion of network scale, traditional routing strategies in Software-Defined networking (SDN) have difficulty adapting to fast traffic variability. The large flow in the network occupies 80% of the network ... 详细信息
来源: 评论
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach
Accurate Recovery of Internet Traffic Data: A Sequential Ten...
收藏 引用
作者: Xie, Kun Wang, Lele Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Guangxing Cao, Jiannong Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University Changsha410006 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony BrookNY11794 United States Network Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100864 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as capacity planning and anomaly detection. Previous stu... 详细信息
来源: 评论
A Dual-stage Attention Based SDN Traffic Prediction Method
A Dual-stage Attention Based SDN Traffic Prediction Method
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Chenjing Gao Junli Wang Chungang Yan Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Traffic matrix is the main research object of traffic prediction in software-defined networking. Accurate and timely traffic matrix prediction plays an important role in avoiding network congestion. While various meth... 详细信息
来源: 评论