咨询与建议

限定检索结果

文献类型

  • 2,113 篇 期刊文献
  • 846 篇 会议
  • 50 册 图书

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,931 篇 理学
    • 999 篇 物理学
    • 879 篇 数学
    • 266 篇 统计学(可授理学、...
    • 179 篇 生物学
    • 164 篇 化学
    • 154 篇 系统科学
    • 125 篇 地球物理学
    • 109 篇 天文学
  • 1,756 篇 工学
    • 785 篇 计算机科学与技术...
    • 553 篇 软件工程
    • 292 篇 核科学与技术
    • 234 篇 电气工程
    • 218 篇 电子科学与技术(可...
    • 211 篇 信息与通信工程
    • 201 篇 控制科学与工程
    • 127 篇 生物工程
    • 123 篇 材料科学与工程(可...
    • 115 篇 光学工程
    • 114 篇 化学工程与技术
    • 110 篇 力学(可授工学、理...
    • 99 篇 仪器科学与技术
    • 97 篇 生物医学工程(可授...
    • 90 篇 动力工程及工程热...
    • 88 篇 机械工程
    • 60 篇 土木工程
  • 270 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 102 篇 工商管理
    • 86 篇 图书情报与档案管...
  • 101 篇 医学
    • 82 篇 临床医学
    • 69 篇 基础医学(可授医学...
  • 55 篇 法学
  • 43 篇 经济学
  • 24 篇 农学
  • 18 篇 教育学
  • 4 篇 文学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 61 篇 hadron colliders
  • 52 篇 machine learning
  • 50 篇 mathematics
  • 46 篇 computer science
  • 42 篇 higgs bosons
  • 41 篇 artificial intel...
  • 28 篇 deep learning
  • 27 篇 computational mo...
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 26 篇 cosmology
  • 24 篇 top quark
  • 23 篇 hadron-hadron sc...
  • 23 篇 bosons
  • 22 篇 w & z bosons
  • 22 篇 computational in...
  • 22 篇 particle product...
  • 22 篇 extensions of hi...
  • 21 篇 supersymmetry
  • 21 篇 accuracy

机构

  • 415 篇 department for p...
  • 410 篇 faculty of scien...
  • 405 篇 kirchhoff-instit...
  • 399 篇 department of ph...
  • 389 篇 department of ph...
  • 389 篇 institute of phy...
  • 387 篇 department of ph...
  • 376 篇 institute of phy...
  • 370 篇 fakultät für phy...
  • 358 篇 instituto de fís...
  • 310 篇 department of ph...
  • 300 篇 dipartimento di ...
  • 293 篇 department of ph...
  • 291 篇 nikhef national ...
  • 288 篇 graduate school ...
  • 281 篇 department of ph...
  • 277 篇 department of ph...
  • 272 篇 universidade fed...
  • 269 篇 ictp trieste
  • 265 篇 department of ph...

作者

  • 339 篇 c. alexa
  • 339 篇 g. bella
  • 339 篇 d. calvet
  • 339 篇 c. amelung
  • 337 篇 j. strandberg
  • 337 篇 g. spigo
  • 337 篇 f. siegert
  • 336 篇 j. m. izen
  • 328 篇 r. ströhmer
  • 328 篇 m. rijssenbeek
  • 328 篇 s. jin
  • 328 篇 g. gaudio
  • 328 篇 s. mohapatra
  • 319 篇 s. guindon
  • 315 篇 a. kaczmarska
  • 313 篇 j. schaarschmidt
  • 310 篇 y. tayalati
  • 303 篇 a. d. pilkington
  • 298 篇 m. klein
  • 298 篇 l. chevalier

语言

  • 2,663 篇 英文
  • 327 篇 其他
  • 14 篇 中文
  • 4 篇 日文
检索条件"机构=Apaji Institute of Mathematics and Applied Computer Technology"
3009 条 记 录,以下是2901-2910 订阅
排序:
On Measures of Non-Integrability of Pfaffian Systems
收藏 引用
IFAC Proceedings Volumes 1996年 第1期29卷 2132-2137页
作者: Andrzej Banaszuk John Hauser Willem M. Sluis Richard M. Murray Department of Mathematics University of California Davis CA 95616-8633 Department of Electrical and Computer Engineering University of Colorado Boulder CO 80309-0425 Control and Dynamical Systems 104-44 California Institute of Technology Pasadena CA 91125 Division of Engineering and Applied Science California Institute of Technology Pasadena CA 91125
Many problems in nonlinear control theory (like, for instance, feedback linearization problem) leed to examination of integrability of a Pfaffian system. In a generic case a Pfaffian system is not integrable. Therefor... 详细信息
来源: 评论
Effect of Nutrient Diffusion and Flow on Coral Morphology
收藏 引用
Physical Review Letters 1996年 第11期77卷 2328-2328页
作者: Jaap A. Kaandorp Christopher P. Lowe Daan Frenkel Peter M. A. Sloot Parallel Scientific Computing and Simulation Group Faculty of Mathematics Computer Science Physics & Astronomy University of Amsterdam Kruislaan 403 1098 SJ Amsterdam The Netherlands Computational Physics Faculty of Applied Physics Delft University of Technology Lorentzweg 1 2628 CJ Delft The Netherlands FOM Institute for Atomic and Molecular Physics Kruislaan 407 1098 SJ Amsterdam The Netherlands
We describe a method for modeling aggregation in a flowing fluid. In the model, aggregation proceeds by the accumulation of a “nutrient.” The nutrient is modeled using a lattice Boltzmann model of transport. The agg...
来源: 评论
An improvement of davies’ attack on DES
An improvement of davies’ attack on DES
收藏 引用
Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1994
作者: Biham, Eli Biryukovt, Alex Computer Science Department Technion - Israel Institute of Technology Haifa32000 Israel Applied Mathematics Department Technion- Israel Institute of Technology Haifa32000 Israel
In this paper we improve Davies’ attack [2] on DES to become capable of breaking the full 16-round DES faster than the exhaustive search. Our attack requires 250 complexity of the data collection and 250 the complexi... 详细信息
来源: 评论
An action system specification of the caltech asynchronous microprocessor  3rd
收藏 引用
3rd International Conference on mathematics of Program Construction, MPC '95
作者: Back, R.J.R. Martin, A.J. Sere, K. Åbo Akademi University Department of Computer Science TurkuFIN-20520 Finland California Institute of Technology Department of Computer Science PasadenaCA91125 United States University of Kuopio Department of Computer Science and Applied Mathematics KuopioFIN-70211 Finland
The action system framework for modelling parallel programs is used to formally specify a microprocessor. First the microprocessor is specified as a sequential program. The sequential specification is then decomposed ... 详细信息
来源: 评论
Information theory and noisy computation
Information theory and noisy computation
收藏 引用
IEEE International Symposium on Information Theory
作者: W.S. Evans L.J. Schulman Department of Computer Science University of British Columbia Canada Science College of Computing Technology Department of Applied Mathematics Georgia Institute of Technology USA
We report on two types of results. The first is a study of the rate of decay of information carried by a signal which is being propagated over a noisy channel. The second is a series of lower bounds on the depth, size... 详细信息
来源: 评论
Splitters and near-optimal derandomization
Splitters and near-optimal derandomization
收藏 引用
Annual IEEE Symposium on Foundations of computer Science
作者: M. Naor L.J. Schulman A. Srinivasan Department of Applied Mathematics and Computer Science Weizmann Institute of Science Israel Department of Apllied Mathematics and Computer Science Weizmann Institute of Science Israel Georgia Inst. Technology College of Computing Georgia Institute of Technology Atlanta GA USA Department of Information Systems & Computer Science National University of Singapore Singapore
We present a fairly general method for finding deterministic constructions obeying what we call k-restrictions; this yields structures of size not much larger than the probabilistic bound. The structures constructed b... 详细信息
来源: 评论
Linearity testing in characteristic two
Linearity testing in characteristic two
收藏 引用
Annual IEEE Symposium on Foundations of computer Science
作者: M. Bellare D. Coppersmith J. Hastad M. Kiwi M. Sudan Department of Computer Science & Engineering University of California San Diego La Jolla CA USA Research Division IBM Thomas J. Watson Research Center Yorktown Heights NY USA Department of Computer Science Royal Institute of Technology Stockholm Sweden Department of Applied Mathematics Massachusetts Institute of Technology Cambridge MA USA
Let Dist(f,g)=Pr/sub u/ [f(u)/spl ne/g(u)] denote the relative distance between functions f,g mapping from a group G to a group H, and let Dist(f) denote the minimum, over all linear functions (homomorphisms) g, of Di... 详细信息
来源: 评论
Forward error correction in ATM networks: an analysis of cell loss distribution in a block
Forward error correction in ATM networks: an analysis of cel...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: K. Kawahara K. Kumazoe T. Takine Y. Oie Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka Japan Department of Applied Mathematics and Physics Kyoto University Kyoto Japan
In almost all conventional transport protocols, ARQs (automatic repeat request) have been used to recover lost packets, in which receivers would request sources to retransmit lost packets. In these retransmission base... 详细信息
来源: 评论
Incremental cryptography: The case of hashing and signing  14th
Incremental cryptography: The case of hashing and signing
收藏 引用
14th Annual International Cryptology Conference, CRYPTO 1994
作者: Bellare, Mihir Goldreich, Oded Goldwasser, Shafi Advanced Networking Laboratory IBM T.J. Watson Research Center P.O. Box 704 Yorktown HeightsNY10598 United States Department of Applied Mathematics and Computer Science Weizmann Institute of Science Rehovot Israel MIT Laboratory for Computer Science 545 Technology Square CambridgeMA02139 United States
We initiate the investigation of a new kind of efficiency for cryptographic transformations. The idea is that having once applied the transformation to some document M, the time to update the result upon modification ... 详细信息
来源: 评论
HANDPRINTED CHINESE CHARACTER RECOGNITION USING THE PROBABILITY DISTRIBUTION FEATURE
收藏 引用
International Journal of Pattern Recognition and Artificial Intelligence 1994年 第5期8卷 1241-1258页
作者: TZE FEN LI SHIAW-SHIAN YU Department of Applied Mathematics Chung Hsing University Kuo-Kung Road Taichung (400) Taiwan ROC Advanced Technology Center Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung Hsinchu Taiwan ROC
A simplified Bayes rule is used to classify 5401 categories of handwritten Chinese characters. The main feature for the Bayes rule deals with the probability distribution of black pixels of a thinned character. Our id... 详细信息
来源: 评论