咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是3271-3280 订阅
排序:
Modelling of the Electric Field Assisted Capillarity Effect used for the fabrication of hollow polymer microstructures
Modelling of the Electric Field Assisted Capillarity Effect ...
收藏 引用
Thermal, Mechanical and Multiphysics Simulation and Experiments in Micro-Electronics and Micro-Systems EuroSimE
作者: C. Tonry M. Patel C. Bailey M.P.Y. Desmuliez S. Cargill W. Yu Computational Mechanics and Reliability Group (CMRG) School of Computing and Mathematical Sciences University of Greenwich London UK Microsystems Engineering Centre (MISEC) School of Engineering & Physical Sciences Heriot-Watt University Edinburgh UK State Key Laboratory of Applied Optics Changchun Institute of Optics Fine mechanics and Physics Chinese Academy of Sciences Changchun Jilin China
Electric Field Assisted Capillarity (EFAC) is a novel process which has the potential for the single step fabrication of hollow polymer microstructures. The process has been shown to work experimentally on a microscal... 详细信息
来源: 评论
A comparison of binary number generators for wireless body sensor networks security
A comparison of binary number generators for wireless body s...
收藏 引用
IEEE EMBS International Conference on Information Technology Applications in Biomedicine (ITAB)
作者: G. H. Zhang Y.X. Zhang Y. T. Zhang Institute of Computing Technology CUHK Research Center for Biosensors and Medical Instruments (CBMJ) Institute of Biomedical and Health Engineering (IBHE) Shenzhen Institute of Advanced Technology (SIAT) Key Laboratory for Biomedical Informatics and H Chinese Academy of Sciences China CBMJ IBHE SIAT Laboratory for Biomedical Informatics and Health Engineering CAS China Research Centre for Biomedical Engineering Chinese University of Hong Kong Sha Tin New Territories Hong Kong China CBMJ IBHE SIAT Informatics and Health Engineering CAS China
Binary numbers (BNs) generation is crucial for wireless body sensor networks (WBSNs) security because they can be utilized for authentication or encryption of physiological data in WBSNs for healthcare applications. T... 详细信息
来源: 评论
Provably Secure Role-Based Encryption with Revocation Mechanism
收藏 引用
Journal of Computer Science & Technology 2011年 第4期26卷 697-710页
作者: 朱岩 胡宏新 Gail-Joon Ahn 王怀习 王善标 Institute of Computer Science and Technology Peking University Beijing Key Laboratory of Internet Security Technology Peking University School of Computing Informatics and Decision Systems EngineeringArizona State University School of Mathematical Sciences Peking University
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... 详细信息
来源: 评论
A rigid structure matching-based noise data processing approach for human motion capture
A rigid structure matching-based noise data processing appro...
收藏 引用
International Workshop on Digital Media and Digital Content Management, DMDCM 2011
作者: Wei, Xiaopeng Xiao, Boxiang Zhang, Qiang Liu, Rui Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian China School of Mechanical Engineering Dalian University of Technology Dalian China
A noise data processing algorithm based on rigid structure matching for human motion capture (MoCap) is presented in this paper. The noise model is related to parts of human body, but not to trajectories of markers as... 详细信息
来源: 评论
Multi-objective Optimization Conceptual Design of Product Structure Based on Variable Length Gene Expression
收藏 引用
Chinese Journal of Mechanical engineering 2011年 第1期24卷 42-49页
作者: WEI Xiaopeng ZHAO Tingting JU Zhenhe ZHANG Shi LI Xiaoxiao School of Management Dalian University of Technology Dalian 116023 China Key Laboratory of Advanced Design and Intelligent Computing of Ministry of Education Dalian University Dalian 116622 China New Energy Center Shenyang Institute of Engineering Shenyang 110136 China Liaoning Solar Energy R&D Co. Ltd. Shenyang 110136 China Institute of Systems Engineering Northeastern University Shenyang 110004 China
It is a complicated problem for the bottom-to-top adaptive conceptual design of complicated products between structure and function. Reliable theories demand to be found in order to determine whether the structure acc... 详细信息
来源: 评论
On the numerical simulation of a piston-type wavemaker
On the numerical simulation of a piston-type wavemaker
收藏 引用
作者: Gu, H.B. Causon, D.M. Mingham, C.G. Qian, L. Chen, Han-Bao Centre for Mathematical Modelling and Flow Analysis School of Computing Mathematics and Digital Technology Manchester Metropolitan University Manchester United Kingdom Tianjin Research Institute for Water Transportation Engineering Key Laboratory of Engineering Sediment of Ministry Communications Tianjin China
The piston-type wavemaker is a very popular and important piece of equipment in coastal and ocean engineering physical wave model experiments so in this paper we use a numerical model to simulate the characteristics o... 详细信息
来源: 评论
A Rigid Structure Matching-Based Noise Data Processing Approach for Human Motion Capture
A Rigid Structure Matching-Based Noise Data Processing Appro...
收藏 引用
Workshop on Digital Media and Digital Content Management (DMDCM)
作者: Xiaopeng Wei Boxiang Xiao Qiang Zhang Rui Liu Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China School of Mechanical Engineering Dalian University of Technology Dalian China
A noise data processing algorithm based on rigid structure matching for human motion capture (MoCap) is presented in this paper. The noise model is related to parts of human body, but not to trajectories of markers as... 详细信息
来源: 评论
Provably secure role-based encryption with revocation mechanism
Provably secure role-based encryption with revocation mechan...
收藏 引用
作者: Zhu, Yan Hu, Hong-Xin Ahn, Gail-Joon Wang, Huai-Xi Wang, Shan-Biao Institute of Computer Science and Technology Peking University Beijing 100871 China Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States 4School of Mathematical Sciences Peking University Beijing 100871 China
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ba... 详细信息
来源: 评论
Model Checking of Adaptive Programs with Mode-extended Linear Temporal Logic
Model Checking of Adaptive Programs with Mode-extended Linea...
收藏 引用
IEEE Workshop on engineering of Autonomic and Autonomous Systems (EASE)
作者: Yongwang Zhao Dianfu Ma Jing Li Zhuqing Li State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论
Towards Verifying Global Properties of Adaptive Software Based on Linear Temporal Logic
Towards Verifying Global Properties of Adaptive Software Bas...
收藏 引用
International Conference on advanced Information Networking and Applications (AINA)
作者: Yongwang Zhao Jing Li Dou Sun Dianfu Ma Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论