咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 75 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 25 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 安全科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 建筑学
    • 3 篇 生物医学工程(可授...
  • 55 篇 理学
    • 24 篇 数学
    • 16 篇 生物学
    • 15 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 化学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 algorithm design...
  • 4 篇 hardware
  • 3 篇 deep learning
  • 3 篇 fault tolerance
  • 3 篇 energy consumpti...
  • 3 篇 schedules
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 semantics
  • 3 篇 scheduling algor...
  • 3 篇 field programmab...
  • 3 篇 encryption
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...

机构

  • 20 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 college of infor...
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...
  • 4 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...

作者

  • 18 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 5 篇 yang zhan
  • 5 篇 yi wang
  • 5 篇 li keqin
  • 5 篇 wang yi
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi
  • 4 篇 kehua yang
  • 4 篇 zhao qi
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 li zhiyong

语言

  • 142 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha"
145 条 记 录,以下是111-120 订阅
排序:
RTISM: Real-Time Inter-VM Communication Based on Shared Memory for Mixed-Criticality Flows
RTISM: Real-Time Inter-VM Communication Based on Shared Memo...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Zonghong Li Guoqi Xie Wenhong Ma Xiongren Xiao Yong Xie Wei Ren Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University China Research Institute of Hunan University in Chongqing China Nanjing University of Posts and Telecommunications China Huawei Technologies China
Virtual machines (VMs) have been increasingly deployed in real-time systems to enhance heterogeneous resource sharing. Despite being isolated for security and prevention of failure propagation, VMs need to communicate...
来源: 评论
Stacking-Based Attention Temporal Convolutional network for Action Segmentation  48
Stacking-Based Attention Temporal Convolutional Network for ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Yang, Liu Jiang, Yu Hong, Junkun Wu, Zhenjie Yang, Zhan Long, Jun Central South University School of Computer Science and Engineering China Central South University Big Data Institute Central South University China Central South University Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
Action segmentation plays an important role in video understanding, which is implemented by frame-wise action classification. Recent works on action segmentation capture long-term dependencies by increasing temporal c... 详细信息
来源: 评论
Study on data de-duplication based on bloom filter in fault tolerant erasure codes
收藏 引用
Journal of Computational and Theoretical Nanoscience 2016年 第1期13卷 179-185页
作者: Yan, Xiai Zhang, Dafang Zhang, Boyun College of Computer Science and Elctronic Engineering Hunan University 410082 China Department of Information Technology Hunan Police Academy Changsha410138 China Key Laboratory of Network Crime Investigation Colleges of Hunan Province Changsha410138 China
Erasure codes have become a mainstream fault-tolerant method in the field of cloud storage fault tolerance. Erasure codes will be the data from the file level storage into a block level storage, there will be a lot of... 详细信息
来源: 评论
A delay-derivative-dependent approach to robust H ∞ filter design for uncertain systems with time-varying distributed delays
收藏 引用
Journal of the Franklin Institute 2011年 第2期348卷 179-200页
作者: Jiyao An Guilin Wen Nianfei Gan Renfa Li State Key Laboratory of Advanced Design and Manufacture for Vehicle Body the Key Laboratory of Advanced Design and Simulation Techniques for Special Equipment Ministry of Education Hunan University Changsha 410082 PR China School of Computer and Communication Institute of Embedded Systems and Network Hunan University Changsha 410082 PR China
This paper focuses on the problem of robust H ∞ filter design for uncertain systems with time-varying state and distributed delays. System uncertainties are considered as norm-bounded time-varying parametric uncertai...
来源: 评论
A Real-Time CAN-CAN Gateway with Tight Latency Analysis and Targeted Priority Assignment
A Real-Time CAN-CAN Gateway with Tight Latency Analysis and ...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Guoqi Xie Haijie Gong Yunbo Han Samarjit Chakraborty Wanli Chang College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China Future Network Lab CSIG Tencent China University of North Carolina at Chapel Hill USA University of York UK
There is a demand in the automotive industry to connect two CAN-based subsystems. The commercial CAN-CAN gateway supports basic message forwarding with no real-time behavior. To address this issue, a new gateway archi... 详细信息
来源: 评论
Privacy preserving for network coding in smart grid  15th
Privacy preserving for network coding in smart grid
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: He, Shiming Zeng, Weini Xie, Kun Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Hunan Province Engineering Research Center of Electric Transportation and Smart Distributed Network Changsha University of Science and Technology Changsha410114 China The 716th Research Institute China Shipbuilding Industry Corporation Lianyungang222061 China College of Computer Science and Electronics Engineering Hunan University Changsha410082 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York United States
In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain info... 详细信息
来源: 评论
Efficient group signature scheme without pairings
收藏 引用
International Journal of network Security 2020年 第3期22卷 504-515页
作者: Gu, Ke Liu, Dianxing Yin, Bo School of Computer and Communication Engineering Changsha University of Science and Technology Wangjiali Rd Tianxin district Changsha Hunan Province410114 China Key Laboratory of Network Crime Investigation of Hunan Provincial Colleges Hunan Police Academy Wangjiali Rd Tianxin district Changsha Hunan Province410114 China
Although currently many group signature schemes have been proposed, most of them are constructed on pair-ings. In this paper, we present an efficient group signature scheme without pairings under the model of verifier... 详细信息
来源: 评论
TS-ENAS:Two-Stage Evolution for Cell-based network Architecture Search
arXiv
收藏 引用
arXiv 2023年
作者: Zou, Juan Wu, Shenghong Xia, Yizhang Jiang, Weiwei Wu, Zeping Zheng, Jinhua Engineering Research Center of Hunan Province for Optimization and Security of Intelligent System Key Laboratory of Intelligent Computing and Information Processing Ministry of Education of China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Province Xiangtan411105 China The College of Aerospace Science and Engineering National University of Defense Technology Hunan Changsha410073 China
Neural network architecture search provides a solution to the automatic design of network structures. However, it is difficult to search the whole network architecture directly. Although using stacked cells to search ... 详细信息
来源: 评论
A deep hashing method based on attention module for image retrieval
A deep hashing method based on attention module for image re...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Jun Long Xiangxiang Wei Qianqian Qi Ye Wang The School of Computer Science and Engineering Central South University Changsha China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
Hashing retrieval technique has received widespread attention since its low storage consumption and fast retrieval speed. Image retrieval based on deep hashing method uses image features with high-level semantic infor... 详细信息
来源: 评论
Scholars influence evaluation based on time series heterogeneous network
Scholars influence evaluation based on time series heterogen...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation, ICMTMA
作者: Ye Wang Zhen Ding Xiang Xiang Wei Jun Long The School of Computer Science and Engineering Central South University Changsha China Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
In recent years, with the rapid development of network and data mining, multi-source heterogeneous data related to academics has also shown an exponential growth. As an important research field of academic big data, t... 详细信息
来源: 评论