咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 64 篇 期刊文献

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 75 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 25 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 电气工程
    • 11 篇 动力工程及工程热...
    • 9 篇 机械工程
    • 8 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 安全科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 建筑学
    • 3 篇 生物医学工程(可授...
  • 55 篇 理学
    • 24 篇 数学
    • 16 篇 生物学
    • 15 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 4 篇 化学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 algorithm design...
  • 4 篇 hardware
  • 3 篇 deep learning
  • 3 篇 fault tolerance
  • 3 篇 energy consumpti...
  • 3 篇 schedules
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 semantics
  • 3 篇 scheduling algor...
  • 3 篇 field programmab...
  • 3 篇 encryption
  • 3 篇 edge computing
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...

机构

  • 20 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 college of infor...
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...
  • 4 篇 hunan university...
  • 3 篇 school of comput...
  • 3 篇 the key laborato...

作者

  • 18 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 5 篇 yang zhan
  • 5 篇 yi wang
  • 5 篇 li keqin
  • 5 篇 wang yi
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi
  • 4 篇 kehua yang
  • 4 篇 zhao qi
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 li zhiyong

语言

  • 142 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha"
145 条 记 录,以下是21-30 订阅
排序:
keyphrase Generation Based on Self-Attention Mechanism
收藏 引用
Computers, Materials & Continua 2019年 第8期61卷 569-581页
作者: Kehua Yang Yaodong Wang Wei Zhang Jiqing Yao Yuquan Le College of Computer Science and Electronic Engineering and Key Laboratory for Embedded and Network Computing of Hunan Province Hunan UniversityChangsha410082China Oath Verizon Company ManhattanNew York10007USA
keyphrase greatly provides summarized and valuable *** information can help us not only understand text semantics,but also organize and retrieve text content *** task of automatically generating it has received consid... 详细信息
来源: 评论
FPGA based unified architecture for public key and private key cryptosystems
收藏 引用
Frontiers of Computer Science 2013年 第3期7卷 307-316页
作者: Yi WANG Renfa LI Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in... 详细信息
来源: 评论
An offline scheduling algorithm for certifiable mixed-critical embedded system
An offline scheduling algorithm for certifiable mixed-critic...
收藏 引用
26th International Conference on Parallel Computational Fluid Dynamics, ParCFD 2013
作者: Wu, Chengtao Li, Renfa Key Laboratory for Embedded and Network Computing of Hunan Province Changsha 410086 China
In modern embedded platforms, safety-critical functionalities that must be certified correctly to high level of assurance co-exist with less critical software that are not subjected to certification requirements. Thes... 详细信息
来源: 评论
The implementation of MapReduce scheduling algorithm based on priority
The implementation of MapReduce scheduling algorithm based o...
收藏 引用
26th International Conference on Parallel Computational Fluid Dynamics, ParCFD 2013
作者: Gu, Lianjun Tang, Zhuo Xie, Guoqi Key Laboratory for Embedded and Network Computing of Hunan Province Changsha 410082 China
Nowadays cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large scale resources and equipments of computation, storage, information and knowledge for scient... 详细信息
来源: 评论
Delay-derivative-dependent Stability Conditions for Uncertain T-S Fuzzy Systems with Interval Time-varying Delay
Delay-derivative-dependent Stability Conditions for Uncertai...
收藏 引用
第三十二届中国控制会议
作者: AN Ji-yao XIA Xian-zhong LI Ren-fa College of Information Science and Engineering Hunan University Key Laboratory of Embedded and Network Computing of Hunan Province Hunan University
This paper considers the problem of stability analysis of uncertain T-S fuzzy systems with interval time-varying delay. The system uncertainties are assumed to be time-varying and *** new delay-derivative-dependent st... 详细信息
来源: 评论
Dynamic slack reclamation with EDL scheduling for periodic multimode real-time task
Dynamic slack reclamation with EDL scheduling for periodic m...
收藏 引用
26th International Conference on Parallel Computational Fluid Dynamics, ParCFD 2013
作者: Hu, Huan Li, Renfa Key Laboratory for Embedded and Network Computing of Hunan Province Changsha 410086 China
The multiframe task has been considered in dynamic real-time scheduling, its different execution mode optional feature can handle the resource waste caused by pessimistic estimation of the execution requirement. But i... 详细信息
来源: 评论
A long lifetime,low error rate RRAM design with self-repair module
收藏 引用
Journal of Semiconductors 2016年 第11期37卷 94-98页
作者: 尤志强 胡飞 黄黎明 刘鹏 邝继顺 李实英 Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic EngineeringHunan University
Resistive random access memory (RRAM) is one of the promising candidates for future universal memory. However, it suffers from serious error rate and endurance problems. Therefore, exploring a technical solution is ... 详细信息
来源: 评论
An Evidence Combination Method based on DBSCAN Clustering
收藏 引用
Computers, Materials & Continua 2018年 第11期57卷 269-281页
作者: Kehua Yang Tian Tan Wei Zhang College of Computer Science and Electronic Engineering and Key Laboratory for Embedded and Network Computing of Hunan ProvinceHunan UniversityChangshaHunan410082China Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State UniversityVirginiaBlacksburg24060USA
Dempster-Shafer(D-S)evidence theory is a key technology for integrating uncertain information from multiple ***,the combination rules can be paradoxical when the evidence seriously conflict with each *** the paper,we ... 详细信息
来源: 评论
Object-oriented program tailoring based on model  4
Object-oriented program tailoring based on model
收藏 引用
4th International Conference on Computer-Aided Design, Manufacturing, Modeling and Simulation, CDMMS2014
作者: Jin, Qing Kai Li, Jun Yi Zhang, Yan College of Information Science and Engineering Hunan University ChangshaHunan China Key Laboratory for Embedded and Network Computing of Hunan Province ChangshaHunan China
For the redundant codes caused by software reuse and rapid development in object-oriented program, the paper proposes a cutting model and designs a cutting scheme based on this model. Firstly, a cutting model is estab... 详细信息
来源: 评论
A novel combination method for conflicting evidence in open frame of discernment  17
A novel combination method for conflicting evidence in open ...
收藏 引用
2017 International Conference on Data Mining, Communications and Information Technology, DMCIT 2017
作者: Yang, Kehua Liu, Youfang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronics Hunan University Changsha China
Dempster-Shafer theory is a useful method in data fusion. To avoid counter-intuitive result of classical Dempster-Shafer's combination rule dealing with highly conflict evidences, many improved combination methods... 详细信息
来源: 评论