咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 75 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 47 篇 理学
    • 27 篇 数学
    • 13 篇 统计学(可授理学、...
    • 11 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 13 篇 xie guoqi
  • 13 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 151 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan University"
152 条 记 录,以下是91-100 订阅
排序:
Fault Tolerance in Time-Sensitive networking with Mixed-Critical Traffic
Fault Tolerance in Time-Sensitive Networking with Mixed-Crit...
收藏 引用
Design Automation Conference
作者: Wenhong Ma Xiangzhen Xiao Guoqi Xie Nan Guan Yu Jiang Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University City University of Hong Kong Tsinghua University China
As an Ethernet-based communication protocol with timing determinism, TSN (time-sensitive networking) has become a well-recognized promising in-vehicle network solution for increasingly automated automobiles. To satisf...
来源: 评论
A Unified Architecture for Supporting Operations of AES and ECC
A Unified Architecture for Supporting Operations of AES and ...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Yi Wang Renfa Li Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
International Symposium on Integrated Circuits (ISIC)
作者: Yi Wang Zheng Yuan Zhican Li Renfa Li Embedded Systems & Networking Laboratory Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
Software defined edge computing for distributed management and scalable control in IoT multinetworks
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Di Nie, Xiang Deng, Hanhui Qin, Zhijin Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom
Recently, edge computing has emerged as a promising paradigm to support mobile access in IoT multinetworks. However, coexistence of heterogeneous wireless communication schemes brings about new challenges to the mobil... 详细信息
来源: 评论
Intrusion detection using mobile agent in ad-hoc networks
Intrusion detection using mobile agent in ad-hoc networks
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yan Xia Ren-Fa Li Ken-Li Li Key Laboratory of Embedded System and Computing College of Computer and Communication Hunan University Changsha China
Security has become an important issue for mobile ad hoc networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, intrusion detection system ha... 详细信息
来源: 评论
A key frame extraction algorithm oriented for video copy detection based on PCC and the histogram of video frames
收藏 引用
Journal of Computational Information Systems 2014年 第16期10卷 6999-7006页
作者: Peng, Fei Qian, Qin Long, Min College of Computer Science and Electronics Engineering Hunan University Changsha China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha China
Aim to improve the accuracy and the robustness of the video copy detection, a novel key frame extraction algorithm is proposed. The shot segmentation is accomplished by evaluating the Pearsons correlation coefficients... 详细信息
来源: 评论
Dynamic negotiation strategy based parallel-offer in cloud computing
收藏 引用
Journal of Computational Information Systems 2015年 第10期11卷 3691-3699页
作者: Hu, Jun Xu, Ru Xiao, Deyu College of Computer Science and Electronics Engineering Hunan University Changsha China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
Cloud computing can dynamically provide service based on service level agreements that between cloud services and consumers. Establish a viable and efficient dynamic negotiation strategy is one of hot research in clou... 详细信息
来源: 评论
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence Information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论
Minimizing Schedule Length of Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems
Minimizing Schedule Length of Energy Consumption Constrained...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xiongren Xiao Guoqi Xie Renfa Li Keqin Li College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China Department of Computer Science State University of New York USA
Energy consumption is one of the primary design constraints in heterogeneous parallel and distributed systems ranging from small embedded devices to large-scale data centers. The problem of minimizing schedule length ... 详细信息
来源: 评论
Cyber-Physical Systems Design in An Uncertain Environment with Time Uncertainty Concern
Cyber-Physical Systems Design in An Uncertain Environment wi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Si Chen Lida Huang Xiongren Xiao Yan Liu Guoqi Xie Renfa Li College of Computer Science and Electronic Engineering Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China Center for Convergence of Automobile and Cyberspace Research Institute of Hunan University in Chongqing Chongqing China
Multiple processors system on chip (MPSoC) has been the trend in cyber-physical systems (CPSs), and reasonable partitioning for MPSoC resources is a critical step in CPSs design. The uncertainties of environment and t...
来源: 评论