咨询与建议

限定检索结果

文献类型

  • 2,787 篇 期刊文献
  • 615 篇 会议
  • 1 册 图书

馆藏范围

  • 3,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,493 篇 理学
    • 2,087 篇 物理学
    • 362 篇 数学
    • 308 篇 化学
    • 164 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 104 篇 天文学
    • 94 篇 地球物理学
  • 1,672 篇 工学
    • 441 篇 计算机科学与技术...
    • 366 篇 软件工程
    • 329 篇 核科学与技术
    • 328 篇 电子科学与技术(可...
    • 257 篇 电气工程
    • 236 篇 化学工程与技术
    • 210 篇 材料科学与工程(可...
    • 186 篇 光学工程
    • 124 篇 信息与通信工程
    • 117 篇 仪器科学与技术
    • 105 篇 力学(可授工学、理...
    • 105 篇 控制科学与工程
    • 103 篇 冶金工程
    • 92 篇 动力工程及工程热...
    • 86 篇 机械工程
    • 78 篇 生物工程
    • 63 篇 生物医学工程(可授...
  • 173 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 48 篇 医学
    • 43 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 18 篇 法学
  • 15 篇 经济学
  • 10 篇 农学
  • 10 篇 军事学
  • 4 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 hadron colliders
  • 117 篇 bosons
  • 104 篇 hadrons
  • 88 篇 particle decays
  • 83 篇 higgs bosons
  • 77 篇 branching fracti...
  • 76 篇 hadronic decays
  • 68 篇 bottom mesons
  • 68 篇 proton-proton in...
  • 56 篇 w & z bosons
  • 56 篇 leptonic, semile...
  • 52 篇 relativistic hea...
  • 49 篇 photons
  • 47 篇 large hadron col...
  • 47 篇 quantum chromody...
  • 47 篇 particle product...
  • 46 篇 standard model (...
  • 46 篇 flavor changing ...
  • 45 篇 bottom quark
  • 42 篇 supersymmetry

机构

  • 1,216 篇 cavendish labora...
  • 1,023 篇 department of ph...
  • 986 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 729 篇 infn laboratori ...
  • 690 篇 infn sezione di ...
  • 673 篇 infn sezione di ...
  • 664 篇 infn sezione di ...
  • 640 篇 university of ch...
  • 621 篇 fakultät physik ...
  • 563 篇 horia hulubei na...
  • 553 篇 school of physic...
  • 540 篇 iccub universita...
  • 535 篇 h.h. wills physi...
  • 532 篇 school of physic...
  • 507 篇 department of ph...
  • 505 篇 imperial college...
  • 504 篇 nikhef national ...
  • 500 篇 stfc rutherford ...
  • 499 篇 infn sezione di ...

作者

  • 278 篇 barter w.
  • 248 篇 a. gomes
  • 247 篇 blake t.
  • 244 篇 beiter a.
  • 241 篇 j. m. izen
  • 241 篇 bellee v.
  • 239 篇 c. alexa
  • 232 篇 g. bella
  • 232 篇 c. amelung
  • 232 篇 bowcock t.j.v.
  • 232 篇 betancourt c.
  • 231 篇 j. strandberg
  • 231 篇 d. calvet
  • 231 篇 brundu d.
  • 231 篇 borsato m.
  • 231 篇 amato s.
  • 227 篇 g. spigo
  • 224 篇 f. siegert
  • 224 篇 boettcher t.
  • 224 篇 s. chen

语言

  • 2,928 篇 英文
  • 406 篇 其他
  • 72 篇 中文
检索条件"机构=Institute of Computer Application Technology China Academy of Engineering Physics"
3403 条 记 录,以下是131-140 订阅
排序:
Software Defect Classification and Analysis Study
Software Defect Classification and Analysis Study
收藏 引用
Information Science, Parallel and Distributed Systems (ISPDS), International Conference on
作者: Liyuan Zheng Yang Xie Boyuan Hou Xin Xie Institute of Computer Application China Academy of Engineering Physics Mianyang China
This study proposes a set of improved defect categorization criteria and analysis strategies based on a synthesis of a variety of commonly used software defect categorization methods, combined with the actual software... 详细信息
来源: 评论
A Fuzzing Method for Embedded Bus Based on Dynamic Mutation of Message Sequences
A Fuzzing Method for Embedded Bus Based on Dynamic Mutation ...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Fengjiao He Chi Hu Wansheng Yang Hao Zhang Fei Deng Institute of Computer Application China Academy of Engineering Physics Mianyang China
As an important support for the communication link of embedded systems, the bus protocol faces many security threats while meeting diverse business needs, and how to ensure the security of the bus link of embedded sys... 详细信息
来源: 评论
Research and Implementation of Log-Based Anomaly Detection Platform Based on ELK+Kafka
Research and Implementation of Log-Based Anomaly Detection P...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Shuai Xu Ziyang Meng Han Wang Institute of Computer Application China Academy of Engineering Physics Mianyang China
Anomaly detection is vitally essential to modern large-scale distributed systems. Over the years,many log-based anomaly detection methods have been proposed. Logs record the real-time running information of processes ... 详细信息
来源: 评论
Robust LiDAR-Camera Alignment over Point Cloud Density Variation
Robust LiDAR-Camera Alignment over Point Cloud Density Varia...
收藏 引用
Chinese Automation Congress (CAC)
作者: Angfan Zhu Tao Ma Institute of Computer Application China Academy of Engineering Physics Sichuan China
For the first time, we raise and address the research problem of robust LiDAR-Camera alignment (LCA) over point cloud density variation, which is essentially important to the applications like autonomous driving and r... 详细信息
来源: 评论
Management of Multiple Microgrids Considering Soft Loads Based on Federated Reinforcement Learning
Management of Multiple Microgrids Considering Soft Loads Bas...
收藏 引用
Electrical engineering and Automation (IFEEA), International Forum on
作者: Zixin Mu Lei Tang Chen Zhou Ling Li Yang Long Dong Li Institute of Computer Application China Academy of Engineering Physics Mianyang China
As the energy transition advances, multi-microgrid systems are being widely applied due to their advantages in effectively accommodating clean energy and achieving zero-carbon power supply within certain areas. Howeve... 详细信息
来源: 评论
Networked Vehicle Practices Based on Networked Firing Ranges
Networked Vehicle Practices Based on Networked Firing Ranges
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Wenqi Zheng Hao Ren Siqi Yang Zhi Chen Jiajun Xie Wenqiang Pan Institute of Computer Application China Academy of Engineering Physics Mianyang China
In recent years, with the rapid development of network and computer technologies, the Governments of the United States, Japan, the United Kingdom and the European Union, as well as influential organizations, have succ... 详细信息
来源: 评论
Whispering Packets: Hiding Messages in VoIP Traffic
Whispering Packets: Hiding Messages in VoIP Traffic
收藏 引用
International Conference on computer engineering and applications (ICCEA)
作者: Hao Ren Wenqiang Pan Siqi Yang Wenqi Zheng Institute of Computer Application China Academy of Engineering Physics Mianyang China
This paper takes the popular applications WeChat and Enterprise WeChat as examples and investigates the embedding of information in VoIP traffic for data transmission. Exploring the alterations in VoIP traffic charact... 详细信息
来源: 评论
DLD: Defending Against Backdoors Using Differential Logits
DLD: Defending Against Backdoors Using Differential Logits
收藏 引用
IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Ming Yi Yulong Wang Kai Deng Mingyong Yin Fanzhi Meng Yubing Duan Institute of Computer Application China Academy of Engineering Physics Mianyang China
The existing research has shown that deep learning models are vulnerable to backdoor attacks, in which malicious actors can manipulate the model’s predictions by embedding backdoors. As the stealthiness of these back... 详细信息
来源: 评论
A Few-Shot Semantic Segmentation Network with Mixed Prototypes and Base Learner
A Few-Shot Semantic Segmentation Network with Mixed Prototyp...
收藏 引用
IEEE Advanced Information technology, Electronic and Automation Control Conference (IAEAC)
作者: Han Wang Ziyang Meng Yakun Zhang Institute of Computer Application China Academy of Engineering Physics Sichuan China
Few-shot semantic segmentation methods aim to segment new object categories with limited labeled samples. Existing approaches struggle to extract comprehensive semantic matching information from target regions and mit...
来源: 评论
Research on the Software Scale Evaluation Method of "Intelligent and Expert Collaboration"
Research on the Software Scale Evaluation Method of "Intelli...
收藏 引用
computer technology and Information Science (ISCTIS), International Symposium on
作者: Sen Sun Yizheng Tao China Academy of Engineering Physics Institute of Computer Application Mianyang China
In software engineering practice, accurate and efficient system scale evaluation is crucial for ensuring the accuracy of project management and fund allocation. Traditional software system scale assessment methods, su... 详细信息
来源: 评论