咨询与建议

限定检索结果

文献类型

  • 2,779 篇 期刊文献
  • 610 篇 会议
  • 1 册 图书

馆藏范围

  • 3,390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,481 篇 理学
    • 2,080 篇 物理学
    • 359 篇 数学
    • 308 篇 化学
    • 201 篇 天文学
    • 164 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 93 篇 地球物理学
  • 1,868 篇 工学
    • 530 篇 核科学与技术
    • 438 篇 计算机科学与技术...
    • 365 篇 软件工程
    • 332 篇 电子科学与技术(可...
    • 259 篇 电气工程
    • 235 篇 化学工程与技术
    • 219 篇 材料科学与工程(可...
    • 182 篇 光学工程
    • 122 篇 信息与通信工程
    • 116 篇 仪器科学与技术
    • 105 篇 力学(可授工学、理...
    • 104 篇 控制科学与工程
    • 103 篇 冶金工程
    • 90 篇 动力工程及工程热...
    • 85 篇 机械工程
    • 78 篇 生物工程
    • 63 篇 生物医学工程(可授...
  • 172 篇 管理学
    • 123 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 46 篇 医学
    • 42 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 18 篇 法学
  • 15 篇 经济学
  • 10 篇 农学
  • 10 篇 军事学
  • 4 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 227 篇 hadron colliders
  • 132 篇 bosons
  • 103 篇 hadrons
  • 76 篇 branching fracti...
  • 76 篇 hadronic decays
  • 74 篇 particle decays
  • 68 篇 bottom mesons
  • 66 篇 higgs bosons
  • 56 篇 w & z bosons
  • 56 篇 leptonic, semile...
  • 52 篇 relativistic hea...
  • 47 篇 particle product...
  • 47 篇 photons
  • 46 篇 flavor changing ...
  • 45 篇 supersymmetry
  • 44 篇 bottom quark
  • 43 篇 tellurium compou...
  • 42 篇 rare decays
  • 41 篇 electroweak inte...
  • 40 篇 quark model

机构

  • 1,216 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 985 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 724 篇 infn laboratori ...
  • 688 篇 infn sezione di ...
  • 668 篇 infn sezione di ...
  • 662 篇 infn sezione di ...
  • 640 篇 university of ch...
  • 621 篇 fakultät physik ...
  • 563 篇 horia hulubei na...
  • 553 篇 school of physic...
  • 540 篇 iccub universita...
  • 535 篇 h.h. wills physi...
  • 532 篇 school of physic...
  • 507 篇 department of ph...
  • 505 篇 imperial college...
  • 504 篇 nikhef national ...
  • 500 篇 stfc rutherford ...
  • 498 篇 infn sezione di ...

作者

  • 278 篇 barter w.
  • 248 篇 beiter a.
  • 248 篇 a. gomes
  • 247 篇 blake t.
  • 241 篇 j. m. izen
  • 241 篇 bellee v.
  • 239 篇 c. alexa
  • 232 篇 g. bella
  • 232 篇 c. amelung
  • 232 篇 bowcock t.j.v.
  • 232 篇 betancourt c.
  • 231 篇 j. strandberg
  • 231 篇 d. calvet
  • 231 篇 brundu d.
  • 231 篇 borsato m.
  • 231 篇 amato s.
  • 227 篇 g. spigo
  • 224 篇 f. siegert
  • 224 篇 boettcher t.
  • 224 篇 s. chen

语言

  • 3,005 篇 英文
  • 310 篇 其他
  • 72 篇 中文
检索条件"机构=Institute of Computer Application Technology China Academy of Engineering Physics"
3390 条 记 录,以下是121-130 订阅
排序:
Design of Data lineage Analysis Framework Based on Multivariate Attribute Fusion
Design of Data lineage Analysis Framework Based on Multivari...
收藏 引用
Information technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Rui Wan Xiaohan Sun Jiaqi Zhang Yan Liang Institute of Computer Application China Academy of Engineering Physics Mianyang China
With the advent of the digital age, it has become a consensus that data is an important asset, and it has become a common means to use data platform to manage and analyze data. However, in the process of enterprise da... 详细信息
来源: 评论
Research and Implementation of Log-Based Anomaly Detection Platform Based on ELK+Kafka  10
Research and Implementation of Log-Based Anomaly Detection P...
收藏 引用
10th International Conference on computer and Communications, ICCC 2024
作者: Xu, Shuai Meng, Ziyang Wang, Han China Academy of Engineering Physics Institute of Computer Application Mianyang China
Anomaly detection is vitally essential to modern large-scale distributed systems. Over the years,many log-based anomaly detection methods have been proposed. Logs record the real-time running information of processes ... 详细信息
来源: 评论
QVT-Based SysML v2 Model Version Difference Transformation
QVT-Based SysML v2 Model Version Difference Transformation
收藏 引用
Chinese Automation Congress (CAC)
作者: Chen Zhou Ling Li Qiang Ren Zixin Mu Bing Yu Baoran An Institute of Computer Application China Academy of Engineering Physics Mianyang China
In order to address the issue of model version incompatibility in supporting the implementation of Model-Based Systems engineering (MBSE) with SysML v2, this paper first elucidates a feasible engineering modelling met... 详细信息
来源: 评论
A Coverage-Oriented Fuzzing Test Method for Embedded Firmware
A Coverage-Oriented Fuzzing Test Method for Embedded Firmwar...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Wansheng Yang Hairu Luo Chi Hu Fengjiao He Institute of Computer Application China Academy of Engineering Physics Mianyang China
When it comes to firmware vulnerability detection in embedded systems, traditional static analysis approaches struggle to capture deep-level program execution logic, resulting in unsatisfactory effectiveness. Based on... 详细信息
来源: 评论
Permission Governance Method Based on Separation of Responsibilities
Permission Governance Method Based on Separation of Responsi...
收藏 引用
IEEE Information technology, Networking, Electronic and Automation Control Conference
作者: Xiaohan Sun Institute of Computer Application China Academy of Engineering Physics Mianyang China
In complex management information systems, there are a large number of business entities, complex permission relationships, and diverse access requirements. A set of permission governance methods is needed to solve th... 详细信息
来源: 评论
Design of Simulation and Evaluation System for Safety Operation in High Energy Radiation Scene Based on SysML
Design of Simulation and Evaluation System for Safety Operat...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Huai Wu Baoran An Weijian Huang Xuedong Zhang Sifeng Zeng Institute of Computer Application China Academy of Engineering Physics Mianyang China
With the emergence and wide application of new energy sources and technologies, various high-energy radiation devices have become indispensable core facilities and play an important role. At present, there are not onl... 详细信息
来源: 评论
Software Defect Classification and Analysis Study
Software Defect Classification and Analysis Study
收藏 引用
Information Science, Parallel and Distributed Systems (ISPDS), International Conference on
作者: Liyuan Zheng Yang Xie Boyuan Hou Xin Xie Institute of Computer Application China Academy of Engineering Physics Mianyang China
This study proposes a set of improved defect categorization criteria and analysis strategies based on a synthesis of a variety of commonly used software defect categorization methods, combined with the actual software... 详细信息
来源: 评论
A Data Constraint Analysis Method for Full-Digital Simulation Test
A Data Constraint Analysis Method for Full-Digital Simulatio...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Shasha Wu Shiyong Li Yanhong Peng Siyou Ma Fei Deng Institute of Computer Application China Academy of Engineering Physics Mianyang China
At present, software testing is an effective approach to ensure and improve software quality. However, there is a lack of data dependency analysis methods for constructing full-digital test data scripts, which results... 详细信息
来源: 评论
Research and Implementation of Log-Based Anomaly Detection Platform Based on ELK+Kafka
Research and Implementation of Log-Based Anomaly Detection P...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Shuai Xu Ziyang Meng Han Wang Institute of Computer Application China Academy of Engineering Physics Mianyang China
Anomaly detection is vitally essential to modern large-scale distributed systems. Over the years,many log-based anomaly detection methods have been proposed. Logs record the real-time running information of processes ... 详细信息
来源: 评论
A Fuzzing Method for Embedded Bus Based on Dynamic Mutation of Message Sequences
A Fuzzing Method for Embedded Bus Based on Dynamic Mutation ...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Fengjiao He Chi Hu Wansheng Yang Hao Zhang Fei Deng Institute of Computer Application China Academy of Engineering Physics Mianyang China
As an important support for the communication link of embedded systems, the bus protocol faces many security threats while meeting diverse business needs, and how to ensure the security of the bus link of embedded sys... 详细信息
来源: 评论