咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 75 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 25 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 安全科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 建筑学
    • 3 篇 生物医学工程(可授...
  • 55 篇 理学
    • 24 篇 数学
    • 16 篇 生物学
    • 15 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 化学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 algorithm design...
  • 4 篇 hardware
  • 3 篇 deep learning
  • 3 篇 fault tolerance
  • 3 篇 energy consumpti...
  • 3 篇 schedules
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 semantics
  • 3 篇 scheduling algor...
  • 3 篇 field programmab...
  • 3 篇 encryption
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...

机构

  • 20 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 college of infor...
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...
  • 4 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...

作者

  • 18 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 5 篇 yang zhan
  • 5 篇 yi wang
  • 5 篇 li keqin
  • 5 篇 wang yi
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi
  • 4 篇 kehua yang
  • 4 篇 zhao qi
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 li zhiyong

语言

  • 142 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha"
145 条 记 录,以下是91-100 订阅
排序:
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence Information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论
STURE: Spatial-Temporal Mutual Representation Learning for Robust Data Association in Online Multi-Object Tracking
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Haidong Li, Zhiyong Li, Yaping Nai, Ke Wen, Ming College of Computer Science Electronic Engineering of Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province Hunan Province Changsha410082 China State Grid Hunan Electric Power Company Limited Economical Technical Research Institute Hunan Key Laboratory of Energy Internet Supply-demand and Operation Hunan Province Changsha410000 China
Online multi-object tracking (MOT) is a longstanding task for computer vision and intelligent vehicle platform. At present, the main paradigm is tracking-by-detection, and the main difficulty of this paradigm is how t... 详细信息
来源: 评论
Non-cooperative game approach for task offloading in edge clouds
arXiv
收藏 引用
arXiv 2018年
作者: Yang, Bo. Li, Zhiyong Liu, Wenbin College of Information and Management Hunan University of Finance and Economics Changsha410205 China College of Computer Science and Electronic Engineering of Hunan University National Supercomputing Center in Changsha Key Laboratory for Embedded and Network Computing of Hunan Province Changsha410082 China
—Task offloading provides a promising way to enhance the capability of the mobile terminal (also called terminal user) that is distributed on network edge and communicates edge clouds with wireless. Generally, there ... 详细信息
来源: 评论
Dynamic negotiation strategy based parallel-offer in cloud computing
收藏 引用
Journal of Computational Information Systems 2015年 第10期11卷 3691-3699页
作者: Hu, Jun Xu, Ru Xiao, Deyu College of Computer Science and Electronics Engineering Hunan University Changsha China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
Cloud computing can dynamically provide service based on service level agreements that between cloud services and consumers. Establish a viable and efficient dynamic negotiation strategy is one of hot research in clou... 详细信息
来源: 评论
Cyber-Physical Systems Design in An Uncertain Environment with Time Uncertainty Concern
Cyber-Physical Systems Design in An Uncertain Environment wi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Si Chen Lida Huang Xiongren Xiao Yan Liu Guoqi Xie Renfa Li College of Computer Science and Electronic Engineering Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China Center for Convergence of Automobile and Cyberspace Research Institute of Hunan University in Chongqing Chongqing China
Multiple processors system on chip (MPSoC) has been the trend in cyber-physical systems (CPSs), and reasonable partitioning for MPSoC resources is a critical step in CPSs design. The uncertainties of environment and t...
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
International Symposium on Integrated Circuits (ISIC)
作者: Yi Wang Zheng Yuan Zhican Li Renfa Li Embedded Systems & Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
CityGPT: Towards Urban IoT Learning, Analysis and Interaction with Multi-Agent System
arXiv
收藏 引用
arXiv 2024年
作者: Guan, Qinghua Ouyang, Jinhui Wu, Di Yu, Weiren Zhu, Yi Yuan, Xiang The Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Hunan Changsha410082 China The Department of Computer Science University of Warwick CoventryCV4 7AL United Kingdom
The spatiotemporal data generated by massive sensors in the Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, and stab... 详细信息
来源: 评论
EBCRO: Hybrid chemical reaction with employed bee operator
EBCRO: Hybrid chemical reaction with employed bee operator
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Zhiyong Li Tingkun Yuan Bo Yang Shilong Jiang Yanmei Xie College of Computer Science and Electronic Engineering of Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China PKU-HKUST Shenzhen-Hongkong Institution Shenzhen China Hunan Vocational College of Modern Logistics Changsha China
His article proposes a new hybrid algorithm EBCRO, which combines the local search operator of chemical reaction optimization algorithm (CRO) with modified employed bee operator (EB) main part of artificial bee colony... 详细信息
来源: 评论
Fault Tolerance in Time-Sensitive networking with Mixed-Critical Traffic
Fault Tolerance in Time-Sensitive Networking with Mixed-Crit...
收藏 引用
Design Automation Conference
作者: Wenhong Ma Xiangzhen Xiao Guoqi Xie Nan Guan Yu Jiang Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University City University of Hong Kong Tsinghua University China
As an Ethernet-based communication protocol with timing determinism, TSN (time-sensitive networking) has become a well-recognized promising in-vehicle network solution for increasingly automated automobiles. To satisf...
来源: 评论
Software defined edge computing for distributed management and scalable control in IoT multinetworks
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Di Nie, Xiang Deng, Hanhui Qin, Zhijin Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom
Recently, edge computing has emerged as a promising paradigm to support mobile access in IoT multinetworks. However, coexistence of heterogeneous wireless communication schemes brings about new challenges to the mobil... 详细信息
来源: 评论