咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是3151-3160 订阅
排序:
Test wrapper optimization technique using BDF and GA for 3D IP cores  5
Test wrapper optimization technique using BDF and GA for 3D ...
收藏 引用
5th International Conference on computing Communication and Networking Technologies, ICCCNT 2014
作者: Liu, Jun Qian, Qingqing Wu, Xi Ren, Fuji Wang, Wei Chen, Tian School of Computer and Information Hefei University of Technology Hefei230009 China AnHui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine Hefei University of Technology Hefei230009 China Department of Information Science and Intelligent Systems Faculty of Engineering University of Tokushima Tokushima7708502 Japan
To reduce pre-bond and post-bond test cost for 3D IP (Three Dimensional Intellectual Property) cores, this paper proposed a test wrapper optimization technique using BFD(Best Fit Decreasing) and GA (Genetic Algorithm)... 详细信息
来源: 评论
A novel and fast chaotic cryptosystem for image encryption
收藏 引用
Journal of Computational and Theoretical Nanoscience 2014年 第3期11卷 731-738页
作者: Wang, Bin Wei, Xiaopeng Zhang, Qiang School of Mechanical and Engineering Dalian University of Technology Dalian 116024 China Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian 116622 China
In recent years, there has been growing interesting in image encryption based on chaotic systems. In order to improve the effect of encryption, a large amount of operations are implemented in the most chaos-based cryp... 详细信息
来源: 评论
Laplacian normalization and random walk on heterogeneous networks for disease-gene prioritization
收藏 引用
Computational biology and chemistry 2015年 57卷 21-8页
作者: Zhi-Qin Zhao Guo-Sheng Han Zu-Guo Yu Jinyan Li Hunan Key Laboratory for Computation and Simulation in Science and Engineering and Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China. Hunan Key Laboratory for Computation and Simulation in Science and Engineering and Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Mathematical Sciences Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia. Electronic address: yuzg1970@***. Advanced Analytics Institute & Centre for Health Technologies University of Technology Sydney Broadway NSW 2007 Australia. Electronic address: jinyan.li@uts.edu.au.
Random walk on heterogeneous networks is a recently emerging approach to effective disease gene prioritization. Laplacian normalization is a technique capable of normalizing the weight of edges in a network. We use th... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 198-203页
作者: Jiao Luyao Li Yifa Qiao Shuaiting Department of Information Science Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... 详细信息
来源: 评论
Identification of global histogram equalization by modeling gray-level cumulative distribution
Identification of global histogram equalization by modeling ...
收藏 引用
2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013
作者: Yuan, Hai-Dong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing China
Previous studies have shown how to 'fingerprint' certain image processing operation. In this paper, we model the gray-level cumulative distribution of histogram-equalized image as discrete identity function, w... 详细信息
来源: 评论
Topological properties and fractal analysis of a recurrence network constructed from fractional Brownian motions
收藏 引用
Physical Review E 2014年 第3期89卷 032814-032814页
作者: Jin-Long Liu Zu-Guo Yu Vo Anh Hunan Key Laboratory for Computation and Simulation in Science and Engineering and Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China School of Mathematical Sciences Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia
Many studies have shown that we can gain additional information on time series by investigating their accompanying complex networks. In this work, we investigate the fundamental topological and fractal properties of r... 详细信息
来源: 评论
Research on deep neural network's hidden layers in phoneme recognition
Research on deep neural network's hidden layers in phoneme r...
收藏 引用
International Symposium on Chinese Spoken Language Processing
作者: Yuan Ma Jianwu Dang Weifeng Li Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University School of Information Science Japan Advanced Institute of Science and Technology Department of Electronic Engineering Tsinghua University
In spite of the great success of the deep neural network (DNN) in speech processing, it is still unclear what kind of underlying mechanisms are involved in this achievement. This preliminary study attempts to find an ... 详细信息
来源: 评论
Multifractal analysis of weighted networks by a modified sandbox algorithm
收藏 引用
Scientific reports 2015年 第1期5卷 17628页
作者: Yu-Qin Song Jin-Long Liu Zu-Guo Yu Bao-Gen Li Hunan Key Laboratory for Computation and Simulation in Science and Engineering and Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China. College of Science Hunan University of technology Zhuzhou Hunan 412007 China. School of Mathematical Sciences Queensland University of Technology Brisbane Q4001 Australia.
Complex networks have attracted growing attention in many fields. As a generalization of fractal analysis, multifractal analysis (MFA) is a useful way to systematically describe the spatial heterogeneity of both theor...
来源: 评论
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 377-384页
作者: WANG Xiaorui WANG Qingxian GUO Yudong LU Jianping Fourth Department PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Communication Command Chongqing Communication Institute
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... 详细信息
来源: 评论