咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 40 篇 期刊文献

馆藏范围

  • 106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 75 篇 工学
    • 54 篇 计算机科学与技术...
    • 32 篇 软件工程
    • 13 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 机械工程
    • 9 篇 电气工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 控制科学与工程
    • 5 篇 交通运输工程
    • 5 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 核科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 15 篇 数学
    • 7 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 系统科学
    • 2 篇 化学
  • 14 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 医学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 scheduling
  • 3 篇 computer archite...
  • 3 篇 algorithm design...
  • 3 篇 scheduling algor...
  • 3 篇 hardware
  • 3 篇 training
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection
  • 2 篇 kinetic energy
  • 2 篇 generative adver...
  • 2 篇 fault tolerance
  • 2 篇 real time system...
  • 2 篇 logic gates
  • 2 篇 embedded systems
  • 2 篇 convergence
  • 2 篇 quality of servi...

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 13 篇 college of compu...
  • 11 篇 key laboratory f...
  • 4 篇 national collabo...
  • 4 篇 college of infor...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 embedded systems...
  • 3 篇 key laboratory o...
  • 3 篇 pku-hkust shenzh...
  • 2 篇 nanjing universi...
  • 2 篇 huawei technolog...
  • 2 篇 oath verizon com...
  • 2 篇 key laboratory o...
  • 2 篇 tsinghua univers...
  • 2 篇 nationalcollabor...
  • 2 篇 huawei technolog...

作者

  • 15 篇 renfa li
  • 14 篇 li renfa
  • 13 篇 xie guoqi
  • 13 篇 guoqi xie
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 5 篇 junli wang
  • 5 篇 chungang yan
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 li zhiyong
  • 4 篇 li keqin
  • 4 篇 jiang bin
  • 4 篇 wei zhang
  • 3 篇 jiqing yao
  • 3 篇 chang wanli
  • 3 篇 yang kehua

语言

  • 105 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory of Embedded and Network Computing of Hunan Province"
106 条 记 录,以下是71-80 订阅
排序:
Energy allocation for activity recognition in wearable devices with kinetic energy harvesting
Energy allocation for activity recognition in wearable devic...
收藏 引用
作者: Xiao, Ling Meng, Yu Tian, Xiaobing Luo, Haibo College of Computer Science and Electronic Engineering Hunan University Changsha China College of Computer Science Guangdong University of Science And Technology Dongguan China Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China College of Computer and Control Engineering Minjiang University Fujian China
Harvesting kinetic energy from body movement is regarded as a promising rechargeable energy source for wearable devices with low-power. Energy allocation is essential for motion-based rechargeable devices since the gr... 详细信息
来源: 评论
A scheduling algorithm in the randomly heterogeneous multi-core processor
A scheduling algorithm in the randomly heterogeneous multi-c...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yan Liu Yongwei Li Yihong Zhao Xiaoming Chen College of Computer Science and Electronic Engineering Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China
The increasing scale of multi-core processors are likely to be randomly heterogeneous by design or because of diversity and flaws. The latter type of heterogeneity introduced by some unforeseen variable factors such a... 详细信息
来源: 评论
Efficient differential fault analysis attacks to AES decryption for low cost sensors in IoTs
Efficient differential fault analysis attacks to AES decrypt...
收藏 引用
International Symposium on Circuits and Systems
作者: Limin Zhu Yi Wang Renfa Li Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China Institute for Infocomm Research A?STAR Singapore
Robust sensor system plays an important role in Internet of Things (IoTs). These intelligent sensors are required to be low cost and reliable, which provides confidentiality for private sensitive data. However, this p... 详细信息
来源: 评论
A recent survey on controllable text generation: A causal perspective
收藏 引用
Fundamental Research 2024年 第3期5卷 1194-1203页
作者: Wang, Junli Zhang, Chenyang Zhang, Dongyu Tong, Haibo Yan, Chungang Jiang, Changjun Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai 201804 China National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai 201804 China
As an important subject of natural language generation, Controllable Text Generation (CTG) focuses on integrating additional constraints and controls while generating texts and has attracted a lot of attention. Existi... 详细信息
来源: 评论
Design and implementation of a fall detection monitor system with a voice interaction function for smartphones
Design and implementation of a fall detection monitor system...
收藏 引用
IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin)
作者: Ying-Wen Bai Chia-Hao Yu Chun-Cheng Chan Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Changsha China Department of Computer Science The University of Texas at Dallas Richardson Texas
In this paper a smartphone fall detection system featuring a three-axis accelerometer sensor with a voice interaction function is presented. The value, measured by the three-axis accelerometer sensor, is sent to the p... 详细信息
来源: 评论
A Unified Architecture for Supporting Operations of AES and ECC
A Unified Architecture for Supporting Operations of AES and ...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Yi Wang Renfa Li Embedded Systems and Networking Laboratory Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha China
In the recent years, embedded systems began to be used in sensitive applications such as personal digital assistants and smart cards. Due to very strict cost and power constrains, the support for cryptography provided... 详细信息
来源: 评论
Infra-YOLO: Efficient Neural network Structure with Model Compression for Real-Time Infrared Small Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhonglin Geng, Anyu Jiang, Jianan Lu, Jiwu Wu, Di The College of Electrical and Information Engineering Hunan University Hunan Changsha410082 China The Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Hunan Changsha410082 China
Although convolutional neural networks have made outstanding achievements in visible light target detection, there are still many challenges in infrared small object detection because of the low signal-to-noise ratio,... 详细信息
来源: 评论
Software defined edge computing for distributed management and scalable control in IoT multinetworks
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Di Nie, Xiang Deng, Hanhui Qin, Zhijin Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University China School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom
Recently, edge computing has emerged as a promising paradigm to support mobile access in IoT multinetworks. However, coexistence of heterogeneous wireless communication schemes brings about new challenges to the mobil... 详细信息
来源: 评论
Fault Tolerance in Time-Sensitive networking with Mixed-Critical Traffic
Fault Tolerance in Time-Sensitive Networking with Mixed-Crit...
收藏 引用
Design Automation Conference
作者: Wenhong Ma Xiangzhen Xiao Guoqi Xie Nan Guan Yu Jiang Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University City University of Hong Kong Tsinghua University China
As an Ethernet-based communication protocol with timing determinism, TSN (time-sensitive networking) has become a well-recognized promising in-vehicle network solution for increasingly automated automobiles. To satisf...
来源: 评论
An improved masked S-box for AES and hardware implementation
收藏 引用
Journal of Convergence Information Technology 2012年 第10期7卷 338-344页
作者: Zeng, Juanli Xu, Cheng Embedded System and Network Laboratory Hunan Province Key Lab. of Network and Information Security College of Inf. Sci. and Engineering Hunan University Changsha 410082 China
Masking in gate level is popularly used to protect AES S-box against power analysis attacks. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. ... 详细信息
来源: 评论