咨询与建议

限定检索结果

文献类型

  • 411 篇 期刊文献
  • 120 篇 会议

馆藏范围

  • 531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 350 篇 理学
    • 193 篇 数学
    • 145 篇 物理学
    • 54 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 49 篇 地球物理学
    • 38 篇 化学
    • 29 篇 生物学
    • 8 篇 大气科学
  • 317 篇 工学
    • 118 篇 计算机科学与技术...
    • 97 篇 软件工程
    • 60 篇 控制科学与工程
    • 51 篇 电气工程
    • 41 篇 力学(可授工学、理...
    • 39 篇 电子科学与技术(可...
    • 37 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 22 篇 生物工程
    • 20 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 40 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 11 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 5 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 18 篇 lattice-boltzman...
  • 18 篇 cosmic rays
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 deep neural netw...
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow
  • 4 篇 deep learning

机构

  • 135 篇 school of mathem...
  • 131 篇 hubei key labora...
  • 71 篇 university of ch...
  • 65 篇 university of sc...
  • 64 篇 tianfu cosmic ra...
  • 64 篇 hebei normal uni...
  • 63 篇 state key labora...
  • 63 篇 yunnan observato...
  • 63 篇 school of physic...
  • 63 篇 center for astro...
  • 63 篇 national space s...
  • 63 篇 school of astron...
  • 62 篇 college of physi...
  • 61 篇 key laboratory f...
  • 61 篇 school of physic...
  • 61 篇 moscow institute...
  • 60 篇 institute of fro...
  • 59 篇 school of physic...
  • 56 篇 department of ph...
  • 56 篇 sun yat-sen univ...

作者

  • 62 篇 axikegu
  • 61 篇 danzengluobu
  • 54 篇 fang j.
  • 54 篇 feng c.f.
  • 54 篇 bastieri d.
  • 54 篇 jiang k.
  • 54 篇 kuleshov d.
  • 54 篇 liu d.
  • 54 篇 liu s.m.
  • 54 篇 huang d.h.
  • 54 篇 dai h.l.
  • 54 篇 guo y.q.
  • 54 篇 bao y.w.
  • 54 篇 hu h.b.
  • 54 篇 liu b.
  • 54 篇 liu h.d.
  • 54 篇 mao j.r.
  • 54 篇 fan y.z.
  • 54 篇 pattarakijwanich...
  • 53 篇 chen m.j.

语言

  • 499 篇 英文
  • 30 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
531 条 记 录,以下是301-310 订阅
排序:
A Phase-Field-Based Multiple-Relaxation-Time Lattice Boltzmann Method for Incompressible Multiphase Flows with Density and Viscosity Contrasts
SSRN
收藏 引用
SSRN 2022年
作者: Yuan, Xiaolei Wu, Yao Zhang, Chunhua Chai, Zhenhua Shi, Baochang College of Mathematics and Information Science Hebei University Baoding071002 China Institute of Interdisciplinary Research for Mathematics and Applied Science School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China Department of Mechanics and Aerospace Engineering Southern University of Science and Technology Guangdong Shenzhen518055 China
In this work, we present a unified framework of phase-field-based multiple-relaxation-time lattice Boltzmann (MRT-LB) method for incompressible multiphase flows with density and viscosity contrasts where a block-lower... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
OBSERVABILITY INEQUALITY, LOG-TYPE HAUSDORFF CONTENT AND HEAT EQUATIONS
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Shanlin Wang, Gengsheng Wang, Ming School of Mathematics and Statistics Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China Center for Applied Mathematics Tianjin University Tianjin300072 China School of Mathematics and Statistics HNP-LAMA Central South University Hunan Changsha410083 China
This paper studies observability inequalities for heat equations on both bounded domains and the whole space Rd. The observation sets are measured by log-type Hausdorff contents, which are induced by certain log-type ... 详细信息
来源: 评论
A Demands-Matching Multi-Criteria Decision-Making Method for Reverse Logistics
收藏 引用
Procedia CIRP 2018年 72卷 1398-1403页
作者: Han Wang Zhigang Jiang Yan Wang Ying Liu Fei Li Wei Yan Hua Zhang Hubei Key Laboratory of Mechanical Transmission and Manufacturing Engineering Wuhan University of Science & Technology Wuhan 430081 China Key Laboratory of Metallurgical Equipment and Control Technology Wuhan University of Science & Technology Wuhan 430081 China Department of Computing Engineering and Mathematics University of Brighton Brighton BN2 4GJ United Kingdom Institute of mechanical and manufacturing engineering School of Engineering Cardiff University Cardiff CF24 3AA
A demand matching oriented Multi-Criteria Decision-Making method is presented to identify the best collection mode for used components. In this method, the damage condition and remaining service life are incorporated ... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
A LOCALLY MASS-CONSERVATIVE ENRICHED PETROV-GALERKIN METHOD WITHOUT PENALTY FOR THE DARCY FLOW IN POROUS MEDIA
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Huangxin Dong, Piaopiao Sun, Shuyu Wang, Zixuan School of Mathematical Sciences Fujian Provincial Key Laboratory on Mathematical Modeling and High Performance Scientific Computing Xiamen University Fujian361005 China Computational Transport Phenomena Laboratory Division of Physical Science and Engineering King Abdullah University of Science and Technology Thuwal Saudi Arabia
In this work we present an enriched Petrov-Galerkin (EPG) method for the simulation of the Darcy flow in porous media. The new method enriches the approximation trial space of the conforming continuous Galerkin (CG) m... 详细信息
来源: 评论
Experimental and Theoretical Investigation on the Ductile Removal Mechanism in In-Situ Laser Assisted Diamond Cutting of Fused Silica
SSRN
收藏 引用
SSRN 2023年
作者: Lin, Chuangting He, Wenbin Chen, Xiao Zheng, Zhengding Huang, Kai Huang, Weiqi Zhang, Jianguo Xu, Jianfeng State Key Laboratory of Digital Manufacturing Equipment & Technology School of Mechanical Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computing National University of Singapore 13 Computing Drive Singapore117417 Singapore School of Mechanical Engineering Hubei University of Technology Wuhan430072 China
Laser assistance and using a diamond tool with negative rake angle are the promising methods for the machining of hard and brittle materials. Knowledge of material removal mechanism is crucial to the improvement of th... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论