咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 65 篇 期刊文献

馆藏范围

  • 151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 74 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 47 篇 理学
    • 27 篇 数学
    • 13 篇 统计学(可授理学、...
    • 11 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 150 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan University"
151 条 记 录,以下是41-50 订阅
排序:
An Energy-efficient Traffic Scheduling Method based on Slime Mould Algorithm for SDN
An Energy-efficient Traffic Scheduling Method based on Slime...
收藏 引用
International Conference on Information Systems and Computer networks (ISCON)
作者: Zheyuan Wang Junli Wang Chungang Yan Ministry of Education Key Laboratory of Embedded System and Service Computing (Tongji University) Shanghai China National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Software defined network (SDN) enables efficient and green traffic management by separating the control and data planes. However, the existing itemized scheduling approach is prone to waste of network resources and en... 详细信息
来源: 评论
Microservice Auto-Scaling Algorithm Based on Workload Prediction in Cloud-Edge Collaboration Environment
Microservice Auto-Scaling Algorithm Based on Workload Predic...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Zijun Peng Bing Tang Wei Xu Qing Yang Ehsanullah Hussaini Yuqiang Xiao Haiyan Li School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China Center of Network and Education Technology Guangzhou Maritime University Guangzhou China
Cloud computing centrally consolidates hardware and computing resources, offering efficient and cost-effective services. However, as cloud computing centers are predominantly built and operated in a fully centralized ...
来源: 评论
E2DAS: An Efficient Equivariant Dynamic Aggregation Saliency Model for Omnidirectional Images  27th
E2DAS: An Efficient Equivariant Dynamic Aggregation Saliency...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhang, Nana Liu, Qian Zhu, Dandan Zhu, Kun Zhai, Guangtao Yang, Xiaokang School of Computer Science and Technology Donghua University No.2999 Renmin North Road Songjiang District Shanghai201620 China Institute of AI Education Shanghai East China Normal University No.3663 Zhongshan North Road Putuo District Shanghai200333 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University No.4800 Cao’an Highway Jiading District Shanghai201804 China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University No. 800 Dongchuan Road Minhang District Shanghai200240 China
Recent years have witnessed rapid progress of convolutional neural networks (CNNs) and their successful application in the task of saliency prediction for omnidirectional images (ODIs). Albeit achieving tremendous per... 详细信息
来源: 评论
Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
收藏 引用
Security and Safety 2022年 第1期1卷 121-141页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua University Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai Network Financial Security Collaborative Innovation Center Tongji University
Nowadays, large numbers of smart sensors(e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services(DDoS) attack storms in intelligent transportation systems. DDoS... 详细信息
来源: 评论
Joint Partial Offloading and Resource Allocation for Distributed Multi-access Edge computing Enabled Vehicular network
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Ma, Guifu Hu, Manjiang Wang, Xiaowei Wu, Di Li, Haoran Bian, Yougang Zhu, Konglin The State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body The College of Mechanical and Vehicle Engineering Hunan University Changsha410082 China Hunan University Wuxi214072 China The College of Design Hunan University Changsha410082 China The Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha410082 China The College of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
In the foreseeable Intelligent Transportation System (ITS), Intelligent Connected Vehicles (ICVs) will play an important role in improving travel efficiency and safety. However, it is challenging for ICVs to support t... 详细信息
来源: 评论
Software defined edge computing for distributed management and scalable control in IoT multinetworks
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Di Nie, Xiang Deng, Hanhui Qin, Zhijin Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom
Recently, edge computing has emerged as a promising paradigm to support mobile access in IoT multinetworks. However, coexistence of heterogeneous wireless communication schemes brings about new challenges to the mobil... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论
Implicit privacy preservation:a framework based on data generation
收藏 引用
Security and Safety 2022年 第1期1卷 166-183页
作者: Qing Yang Cheng Wang Teng Hu Xue Chen Changjun Jiang Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai 201804China National(Province-Ministry Joint)Collaborative Innovation Center for Financial Network Security Tongji UniversityShanghai 201804China
This paper addresses a special and imperceptible class of privacy,called implicit *** contrast to traditional(explicit)privacy,implicit privacy has two essential properties:(1)It is not initially de ned as a privacy a... 详细信息
来源: 评论
Routing Strategy for SDN Large Flow Based on Deep Reinforcement Learning
Routing Strategy for SDN Large Flow Based on Deep Reinforcem...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yu Ke Junli Wang Chungang Yan Jiamin Yao Key Laboratory of Embedded System and Service Computing Collaborative Innovation Center for Financial Network Security (Tongji University) Ministry of Education National (Province-Ministry Joint) Tongji University Shanghai China
With the expansion of network scale, traditional routing strategies in Software-Defined networking (SDN) have difficulty adapting to fast traffic variability. The large flow in the network occupies 80% of the network ... 详细信息
来源: 评论
A Dual-stage Attention Based SDN Traffic Prediction Method
A Dual-stage Attention Based SDN Traffic Prediction Method
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Chenjing Gao Junli Wang Chungang Yan Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China
Traffic matrix is the main research object of traffic prediction in software-defined networking. Accurate and timely traffic matrix prediction plays an important role in avoiding network congestion. While various meth... 详细信息
来源: 评论