咨询与建议

限定检索结果

文献类型

  • 418 篇 期刊文献
  • 120 篇 会议

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 353 篇 理学
    • 215 篇 数学
    • 147 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 49 篇 地球物理学
    • 39 篇 化学
    • 29 篇 生物学
    • 9 篇 大气科学
  • 345 篇 工学
    • 121 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 61 篇 控制科学与工程
    • 55 篇 电气工程
    • 43 篇 材料科学与工程(可...
    • 42 篇 力学(可授工学、理...
    • 40 篇 电子科学与技术(可...
    • 36 篇 动力工程及工程热...
    • 32 篇 信息与通信工程
    • 29 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 22 篇 生物工程
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 网络空间安全
    • 7 篇 核科学与技术
  • 42 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
  • 6 篇 经济学
  • 5 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 18 篇 lattice-boltzman...
  • 18 篇 cosmic rays
  • 14 篇 navier stokes eq...
  • 12 篇 gamma rays
  • 10 篇 stochastic syste...
  • 9 篇 finite differenc...
  • 8 篇 feature extracti...
  • 7 篇 semantics
  • 6 篇 computational mo...
  • 5 篇 multiphase flows
  • 5 篇 dynamical system...
  • 5 篇 deep neural netw...
  • 5 篇 cosmology
  • 5 篇 differential equ...
  • 5 篇 matrix algebra
  • 5 篇 machine learning
  • 5 篇 laplace transfor...
  • 5 篇 training
  • 4 篇 two phase flow
  • 4 篇 deep learning

机构

  • 135 篇 school of mathem...
  • 131 篇 hubei key labora...
  • 71 篇 university of ch...
  • 65 篇 university of sc...
  • 64 篇 tianfu cosmic ra...
  • 64 篇 hebei normal uni...
  • 63 篇 state key labora...
  • 63 篇 yunnan observato...
  • 63 篇 center for astro...
  • 63 篇 national space s...
  • 63 篇 school of astron...
  • 62 篇 school of physic...
  • 62 篇 college of physi...
  • 61 篇 school of physic...
  • 61 篇 moscow institute...
  • 60 篇 key laboratory f...
  • 60 篇 institute of fro...
  • 59 篇 school of physic...
  • 56 篇 department of ph...
  • 56 篇 sun yat-sen univ...

作者

  • 61 篇 axikegu
  • 60 篇 danzengluobu
  • 54 篇 fang j.
  • 54 篇 feng c.f.
  • 54 篇 bastieri d.
  • 54 篇 jiang k.
  • 54 篇 kuleshov d.
  • 53 篇 liu d.
  • 53 篇 liu s.m.
  • 53 篇 huang d.h.
  • 53 篇 dai h.l.
  • 53 篇 guo y.q.
  • 53 篇 bao y.w.
  • 53 篇 hu h.b.
  • 53 篇 liu b.
  • 53 篇 liu h.d.
  • 53 篇 mao j.r.
  • 53 篇 fan y.z.
  • 53 篇 pattarakijwanich...
  • 52 篇 chen m.j.

语言

  • 505 篇 英文
  • 31 篇 其他
  • 2 篇 中文
检索条件"机构=Hubei Key Laboratory of Engineering Modeling and Science Computing"
538 条 记 录,以下是51-60 订阅
排序:
SHARP POINTWISE-IN-TIME ERROR ESTIMATE OF L1 SCHEME FOR NONLINEAR SUBDIFFUSION EQUATIONS
收藏 引用
Journal of Computational Mathematics 2024年 第3期42卷 662-678页
作者: Dongfang Li Hongyu Qin Jiwei Zhang School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China School of Mathematics and Statistics Wuhan UniversityWuhan 430072China
An essential feature of the subdiffusion equations with theα-order time fractional derivative is the weak singularity at the initial *** weak regularity of the solution is usually characterized by a regularity parame... 详细信息
来源: 评论
Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 944-952页
作者: LI Pengwei FU Jianming XU Chao CHENG Binlin ZHANG Huanguo School of Information Engineering Nanjing Audit University School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University College of Computer Science and Technology Hubei Normal University
Security-sensitive operations in Android applications(apps for short) can either be benign or malicious. In this work, we introduce an approach of static program analysis that extracts "second-step behavior featu... 详细信息
来源: 评论
A bipartite model for load balancing in grid computing environments
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 503-523页
作者: Wenchao JIANG Matthias BAUMGARTEN Yanhong ZHOU Hai JIN School of Computer Science and Technology Hubei bioinformatics and molecular imaging key laboratoryHuazhong University of Science and TechnologyWuhan 430074China Information Engineering College of Faculty of Computing and Engineering University of UlsterShore RoadNewtownabbey BT37 0QBUK School of Computer Science and Technology Hubei bioinformatics and molecular imaging key laboratoryHuazhong University of Science and TechnologyWuhan 430074China
In this paper,a bipartite model for load balanchag (LB) in grid computing environments,called Transverse viewpoint-based Bi-Tier model (TBT),is *** can efficiently eliminate topology mismatching between overlay-and ph... 详细信息
来源: 评论
Numerical Investigations of a Class of Biological Models on Unbounded Domain
收藏 引用
Numerical Mathematics(Theory,Methods and Applications) 2019年 第1期12卷 169-186页
作者: Qiumei Huang Dongfang Li Jiwei Zhang Beijing Institute for Scientific and Engineering Computing Beijing University of TechnologyBeijing 100124China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratoryof Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China Beijing Computational Science Research Center Beijing1000193China
This paper is concerned with numerical computations of a class of biologi-cal models on unbounded spatial *** overcome the unboundedness of spatial domain,we first construct efficient local absorbing boundary conditio... 详细信息
来源: 评论
Electronic band energy of a bent ZnO piezoelectric semiconductor nanowire
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2020年 第6期41卷 833-844页
作者: Wanli YANG Yuantai HU E.N.PAN Department of Mechanics Hubei Key Laboratory of Engineering Structural Analysis and Safety AssessmentHuazhong University of Science and TechnologyWuhan 430074China Computer Modeling and Simulation Group College of EngineeringUniversity of AkronAkronOhio 44325U.S.A.
The electric band energy variation in a bent piezoelectric semiconductor(PSC) nanowire of circular cross-section induced by the mechanical force is analyzed based on a six-band k · p method. The electric-mechanic... 详细信息
来源: 评论
TVIDS: Trusted Virtual IDS With SGX
收藏 引用
China Communications 2019年 第10期16卷 133-150页
作者: Juan Wang Shirong Hao Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang Key Laboratory of Aerospace Information Security and Trust Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072HubeiChina School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Science and Technology on Information Assurance Laboratory Beijing 100072China
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Cluster and Grid Computing Lab Services Computing Technology and System Lab Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Semi-Supervised Nuclei Instance Segmentation with Category-Adaptive Sampling and Region-Adaptive Attention
收藏 引用
Applied sciences (Switzerland) 2025年 第9期15卷
作者: Li, Xunci Luo, Die Wei, Zimei Long, Junan Ye, Zhiwei School of Computer Science Hubei University of Technology Wuhan430068 China Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network Hubei University of Technology Wuhan430068 China Faculty of Engineering Sciences University College London LondonWC1E 6BT United Kingdom
Cell nuclei instance segmentation plays a critical role in pathological image analysis. In recent years, fully supervised methods for cell nuclei instance segmentation have achieved significant results. However, in pr... 详细信息
来源: 评论
REQUIRED NUMBER OF ITERATIONS FOR SPARSE SIGNAL RECOVERY VIA ORTHOGONAL LEAST SQUARES
收藏 引用
Journal of Computational Mathematics 2023年 第1期41卷 1-17页
作者: Haifeng Li Jing Zhang Jinming Wen Dongfang Li Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control College of Mathematics and Information ScienceHenan Normal UniversityXinxiang 453007China College of Information Science and Technology Jinan UniversityGuangzhou 510632China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China
In countless applications,we need to reconstruct a K-sparse signal x∈R n from noisy measurements y=Φx+v,whereΦ∈R^(m×n)is a sensing matrix and v∈R m is a noise *** least squares(OLS),which selects at each ste... 详细信息
来源: 评论
Recognizing Malicious Behaviors of Chrome Extensions through Direct JavaScript Execution
收藏 引用
Wuhan University Journal of Natural sciences 2021年 第1期26卷 89-101页
作者: FU Jianming HE Jia XE Mengfei MEI Xufen School of Cyber Science and Engineering Wuhan UniversityWuhan 430072HubeiChina Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan UniversityWuhan 430072HubeiChina
There are a large number of extensions with many users in Google Chrome,which greatly enriches the functionalities of ***,due to inadequate security auditing,vulnerable updating mechanisms and time-delayed maintenance... 详细信息
来源: 评论