CSpace

浏览/检索结果: 共7条,第1-7条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
无权访问的条目 期刊论文
作者:  付斌章;  韩银和;  李华伟;  李晓维
Adobe PDF(437Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2011/12/31
Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2011, 卷号: 54, 期号: 8, 页码: 1562-1571
作者:  Hu Yue;  Gao QingShi;  Guo Li;  Wang PeiFeng
收藏  |  浏览/下载:67/0  |  提交时间:2019/12/16
multiple string matching  U-uncertain-strings  V-uncertain-strings  U-V-uncertain-strings  complete automaton  
A Loss Inference Algorithm for Wireless Sensor Networks to Improve Data Reliability of Digital Ecosystems 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 卷号: 58, 期号: 6, 页码: 2126-2137
作者:  Yang, Yu;  Xu, Yongjun;  Li, Xiaowei;  Chen, Canfeng
收藏  |  浏览/下载:69/0  |  提交时间:2019/12/16
Cyber-physical ecosystems (CPEs)  data aggregation  digital ecosystems (DEs)  network performance measurement  network tomography  wireless sensor networks (WSNs)  
MicroFix: Using Timing Interpolation and Delay Sensors for Power Reduction 期刊论文
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2011, 卷号: 16, 期号: 2, 页码: 21
作者:  Yan, Guihai;  Han, Yinhe;  Liu, Hui;  Liang, Xiaoyao;  Li, Xiaowei
收藏  |  浏览/下载:65/0  |  提交时间:2019/12/16
Design  Performance  Reliability  Power reduction  fine-grained adaptability  DVFS  timing interpolation  delay sensor  
AN EFFICIENT SNAPSHOT INDEXING METHOD FOR BLOCK-LEVEL BACKUP DATA IN REPLICATION SYSTEM 期刊论文
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 卷号: 7, 期号: 2, 页码: 915-925
作者:  Wu, Guangjun;  Fang, Binxing;  Yu, Xiangzhan;  Yun, Xiaochun;  Wang, Shupeng
收藏  |  浏览/下载:66/0  |  提交时间:2019/12/16
Snapshot  Indexing  Version management  Block-level  Storage  
OWARE: OPERAND WIDTH AWARE REDUNDANT EXECUTION FOR WHOLE-PROCESSOR ERROR DETECTION 期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 卷号: 17, 期号: 6, 页码: 771-780
作者:  Hu, Yu;  Chen, Zhongliang;  Li, Xiaowei
收藏  |  浏览/下载:68/0  |  提交时间:2019/12/16
narrow-width value  sphere of replication  data-level redundancy  instruction-level redundancy  
A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY 期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 卷号: 17, 期号: 6, 页码: 815-825
作者:  Zhou, Jun;  Xu, Yongjun;  Li, Xiaowei
收藏  |  浏览/下载:66/0  |  提交时间:2019/12/16
RFID  physical methods  security protocols  proxy  BAN logic