咨询与建议

限定检索结果

文献类型

  • 2,076 篇 期刊文献
  • 1,296 篇 会议
  • 3 册 图书

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,198 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 987 篇 软件工程
    • 328 篇 信息与通信工程
    • 300 篇 电气工程
    • 292 篇 电子科学与技术(可...
    • 262 篇 控制科学与工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 178 篇 材料科学与工程(可...
    • 174 篇 光学工程
    • 142 篇 机械工程
    • 137 篇 生物医学工程(可授...
    • 109 篇 力学(可授工学、理...
    • 101 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 63 篇 交通运输工程
    • 54 篇 安全科学与工程
  • 1,751 篇 理学
    • 849 篇 物理学
    • 764 篇 数学
    • 243 篇 生物学
    • 229 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 94 篇 地球物理学
  • 393 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 95 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 52 篇 training
  • 50 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 26 篇 computational mo...
  • 24 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting

机构

  • 623 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 76 篇 school of physic...
  • 73 篇 national space s...
  • 71 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,791 篇 英文
  • 523 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3375 条 记 录,以下是2981-2990 订阅
排序:
Exploiting transmission lines on heterogeneous networks-on-chip to improve the adaptivity and efficiency of cache coherence  15
Exploiting transmission lines on heterogeneous networks-on-c...
收藏 引用
9th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2015
作者: Hu, Qi Liu, Peng Huang, Michael C. Xie, Xiang-Hui College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Dept. of Electrical and Computer Engineering University of Rochester RochesterNY14627 United States State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Emerging heterogeneous interconnects have shown lower latency and higher throughput, which can improve the efficiency of communication and create new opportunities for memory system designs. In this paper, transmissio... 详细信息
来源: 评论
A security routing model based on trust for medical sensor networks
A security routing model based on trust for medical sensor n...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Yan Gao Wenfen Liu Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of medical sensor networks, the security has becomes an important issue. In this paper, a security routing model based on trust is proposed for medical sensor networks. To measure the credibility ... 详细信息
来源: 评论
An IP geolocation method based on rich-connected sub-networks
An IP geolocation method based on rich-connected sub-network...
收藏 引用
International Conference on advanced Communication Technology (ICACT)
作者: Shichang Ding Xiangyang Luo Meijuan Yin Yan Liu Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute China
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques w... 详细信息
来源: 评论
Hidden System APIs Based Code Obfuscation
Hidden System APIs Based Code Obfuscation
收藏 引用
2015 International Conference on Mechanical,Electronic and Information Technology engineering
作者: Fei Xiang Fenlin Liu Bin Lu Daofu Gong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by c... 详细信息
来源: 评论
Real-time rendering for sea water based on height field model and light interaction
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第9期7卷 1975-1981页
作者: Xu, Jie Zhang, Yang Fu, Jinhua School of Software Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China College of Mathematics and Information Science Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China State Key-Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou450000 China School of Computer and Communication Engineering Zhengzhou University of Light Industry No. 5 Dongfeng Road Zhengzhou450002 China
Real-time simulation of liquids like sea water is an important task nowadays in the field of computer graphics. In this paper, combined with simulation of light interaction, rendering of sea water at interactive rates... 详细信息
来源: 评论
A multi-agent coordinated planning approach for deadline required emergency response tasks
收藏 引用
IET Control Theory and Applications 2015年 第3期9卷 447-455页
作者: Zhou, Chao Wang, Hongwei Zhuo, Hankz Hankui Key Laboratory of Image Processing and Intelligent Control of Education Ministry Institute of Systems Engineering Huazhong University of Science and Technology Wuhan430074 China School of Advanced Computing SunYat-sen University Guangzhou510006 China
This study investigates the emergency decision-making problem in a multi-agent system. Departments are modeled as agents to perform coordinated planning to obtain a global action plan with a short execution time const... 详细信息
来源: 评论
An automatic reassembly model and algorithm of log file fragments based on graph theory
An automatic reassembly model and algorithm of log file frag...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Shuai Yi Xueli Hu Hao Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
Automatic reassembly of log file fragments from a collection of mixed fragments is one of the most important process during log file carving. In this paper we propose a general process model and design an algorithm ba... 详细信息
来源: 评论
3D Ear Shape Matching Using Joint -Entropy
收藏 引用
Journal of Computer Science & Technology 2015年 第3期30卷 565-577页
作者: 孙晓鹏 李思慧 韩枫 魏小鹏 Institute of Computer Systems School of Computer and Information Technology Liaoning Normal University Dalian 116029 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China School of Mechanical and Engineering Dalian University of Technology Dalian 116024 China Key Laboratory of Advanced Design and Intelligent Computing Dalian University Dalian 116622 China
In this article, we investigate the use of joint a-entropy for 3D ear matching by incorporating the local shape feature of 3D ears into the joint a-entropy. First, we extract a sut^cient number of key points from the ... 详细信息
来源: 评论
Exploiting Pure Superword Level Parallelism for Array Indirections
Exploiting Pure Superword Level Parallelism for Array Indire...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Huihui Sun Rongcai Zhao Wei Gao Yi Gong Gang Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
SIMD (Single Instruction Multiple Data) extension units are ubiquitous in modern processors. Array indirections raise several challenges for SIMD vectorization including disjoint memory access, unknown alignment and d... 详细信息
来源: 评论
An Embedded FPGA Operating System Optimized for Vision computing (Abstract Only)  15
An Embedded FPGA Operating System Optimized for Vision Compu...
收藏 引用
Proceedings of the 2015 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
作者: Zhilei Chai Jin Yu Zhibin Wang Jie Zhang Haojie Zhou Jiangnan University Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Although FPGA's power and performance advantages were recognized widely, designing applications on FPGA-based systems is traditionally a task undertaken by hardware experts. It is significant to allow application-... 详细信息
来源: 评论