咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 75 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 25 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 安全科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 建筑学
    • 3 篇 生物医学工程(可授...
  • 55 篇 理学
    • 24 篇 数学
    • 16 篇 生物学
    • 15 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 化学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 algorithm design...
  • 4 篇 hardware
  • 3 篇 deep learning
  • 3 篇 fault tolerance
  • 3 篇 energy consumpti...
  • 3 篇 schedules
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 semantics
  • 3 篇 scheduling algor...
  • 3 篇 field programmab...
  • 3 篇 encryption
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...

机构

  • 20 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 college of infor...
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...
  • 4 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...

作者

  • 18 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 5 篇 yang zhan
  • 5 篇 yi wang
  • 5 篇 li keqin
  • 5 篇 wang yi
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi
  • 4 篇 kehua yang
  • 4 篇 zhao qi
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 li zhiyong

语言

  • 142 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha"
145 条 记 录,以下是1-10 订阅
排序:
VmPTP: Precise Time Protocol for Inter-VM Communication in embedded Virtualized Systems
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 897-910页
作者: Zhao, Sirong Xie, Guoqi Ma, Wenhong Ren, Wei Li, Kenli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan Changsha410082 China Huawei Technology Co. Ltd. Central Software Institute Guangdong Shenzhen518129 China
System virtualization techniques are gradually applied to embedded systems with the performance improvement of embedded devices;however, there is a large time offset (i.e., deviation) of hundreds of ms between virtual... 详细信息
来源: 评论
DTS: Dynamic Traffic Scrubbing Against Link Flooding Attacks with Programmable Data Plane
DTS: Dynamic Traffic Scrubbing Against Link Flooding Attacks...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhao, Zheng Liu, Fang Meng, Zhaoran Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
Link flood attacks (LFA) represent a significant cybersecurity threat due to their ability to cause extensive network disruptions. Traditional traffic scrubbing methods, relying on static rules, often struggle to coun... 详细信息
来源: 评论
QSM: A Quick Shuffling Method for Defending Against Low-Rate Denial of Service Attacks in Microservice Systems
QSM: A Quick Shuffling Method for Defending Against Low-Rate...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhao, Zheng Fan, Qiqi Zhao, Chunchang Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
Microservice architecture, renowned for its flexible scalability and loose coupling, has seen widespread adoption. However, this architecture has also become a prime target for network attackers, with low-rate denial ... 详细信息
来源: 评论
ASTGNN: Adaptive Spatio-Temporal Graph Neural network for Motor Imagery Recognition
ASTGNN: Adaptive Spatio-Temporal Graph Neural Network for Mo...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhao, Zheng Xue, Haixiao Huang, Yuwen Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
Motor imagery electroencephalogram recognition is a key area in brain-computer interfaces, with applications in human-computer interaction, rehabilitation, and virtual reality. Traditional methods often overlook the b... 详细信息
来源: 评论
Location Data Publishing Mechanism in Semi-Trusted Vehicle networks based on Differential Privacy
Location Data Publishing Mechanism in Semi-Trusted Vehicle N...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhao, Zheng Zhang, Tianhao Mao, Qian Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Liaoning University Shenyang China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
Vehicular ad-hoc networks (VANETs) are essential in mobile ad-hoc network applications, utilizing vehicle location data. However, safeguarding the privacy and security of this data is challenging, especially with untr... 详细信息
来源: 评论
Holistic WCRT Analysis for Global Fixed-Priority Preemptive Multiprocessor Scheduling  23
Holistic WCRT Analysis for Global Fixed-Priority Preemptive ...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Guoqi Xie Chenglai Xiong Wei Wu Renfa Li Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University China.
Many embedded applications demand both resource efficiency and timing guarantee. However, resource sharing naturally complicates the analysis that extracts the worst-case scenario out of contention. Global Fixed-Prior...
来源: 评论
LIDS: A Lightweight Intrusion Detection System for Controller Area network
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Yu, Zhangwei Liu, Yan Li, Renfa Chang, Wanli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Changsha410082 China Research Institute of Hunan University in Chongqing Research and Innovation Center for Convergence of Automobile and Cyberspace Chongqing401120 China
Controller Area network (CAN) is widely adopted in automobiles and susceptible to cyber attacks with the development of intelligent connected vehicles. While neural networks have demonstrated high accuracy in detectio... 详细信息
来源: 评论
Zram Instance Pool Framework for Adaptive Memory Compression in Resource-Sensitive embedded Operating Systems
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Deng, Yin Xie, Guoqi Xiong, Chenglai Zhao, Sirong Ren, Wei Li, Kenli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan Changsha410082 China Huawei Technology Co. Ltd. Central Software Institute Guangdong Shenzhen518129 China
Memory compression can reduce the size of the inactive data in the random access memory (RAM), thereby freeing up unused space and allowing more programs to run;however, current mainstream memory compression framework... 详细信息
来源: 评论
Fault Tolerance in Time-Sensitive networking with Mixed-Critical Traffic  23
Fault Tolerance in Time-Sensitive Networking with Mixed-Crit...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Wenhong Ma Xiangzhen Xiao Guoqi Xie Nan Guan Yu Jiang Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University City University of Hong Kong Tsinghua University China
As an Ethernet-based communication protocol with timing determinism, TSN (time-sensitive networking) has become a well-recognized promising in-vehicle network solution for increasingly automated automobiles. To satisf...
来源: 评论
Schedulability analysis for messages of FlexRay/CAN networks interconnected by a gateway
收藏 引用
Journal of Computational Information Systems 2015年 第15期11卷 5531-5543页
作者: Li, Rui Du, Changjie Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China
Schedulability analysis and scheduling strategies are very important for the in-vehicle network system consisting of CAN bus and FlexRay bus interconnected via a gateway. The aim of this study is to investigate the ti... 详细信息
来源: 评论