CSpace

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Applying Knowledge Inference on Event-Conjunction for Automatic Control in Smart Building 期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 3, 页码: 17
作者:  Ge, Hangli;  Peng, Xiaohui;  Koshizuka, Noboru
收藏  |  浏览/下载:40/0  |  提交时间:2021/12/01
smart building  Internet of Things (IoT)  Markov Chain Monte Carlo (MCMC)  ontology  graph model  
A virtualized data center energy-saving mechanism based on switching operating mode of physical servers and reserving virtual machines 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 页码: 13
作者:  Yin, Chunxia;  Liu, Jian;  Jin, Shunfu
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
cost function  energy-saving mechanism  Markov chain  virtualized data center  
MPDMAC-SIC: Priority-based distributed low delay MAC with successive interference cancellation for multi-hop industrial wireless networks 期刊论文
COMPUTER COMMUNICATIONS, 2020, 卷号: 154, 页码: 48-57
作者:  Xu Yida;  Wang Qi;  Xu Yongjun;  Liu Jianmin;  He Chentao
收藏  |  浏览/下载:109/0  |  提交时间:2020/12/10
Medium access control  Successive interference cancellation  Medium access priority  Access delay  Markov chain  
An electricity consumption model for synthesizing scalable electricity load curves 期刊论文
ENERGY, 2019, 卷号: 169, 页码: 674-683
作者:  Huang, Yunyou;  Zhan, Jianfeng;  Luo, Chunjie;  Wang, Lei;  Wang, Nana;  Zheng, Daoyi;  Fan, Fanda;  Ren, Rui
收藏  |  浏览/下载:227/0  |  提交时间:2019/08/16
Data acquisition  Data models  Veracity-preserving model  Data synthesis  High-order Markov chain  Scalable electricity load curves  
Intrusion detection based on system calls and homogeneous Markov chains 期刊论文
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 卷号: 19, 期号: 3, 页码: 598-605
作者:  Tian Xinguang;  Duan Miyi;  Sun Chunlai;  Li Wenfa
收藏  |  浏览/下载:42/0  |  提交时间:2019/12/16
intrusion detection  Markov chain  anomaly detection  system call  
Anomaly detection of user behavior based on shell commands and homogeneous Markov chains 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2008, 卷号: 17, 期号: 2, 页码: 231-236
作者:  Xinguang, Tian;  Miyi, Duan;  Wenfa, Li;  Chunlai, Sun
收藏  |  浏览/下载:180/0  |  提交时间:2019/12/16
intrusion detection  anomaly detection  shell command  Markov chain