咨询与建议

限定检索结果

文献类型

  • 57 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 理学
    • 29 篇 数学
    • 6 篇 系统科学
    • 5 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 27 篇 工学
    • 12 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 测绘科学与技术
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 林业工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 4 篇 管理学
    • 4 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 algebra
  • 4 篇 waveguides
  • 3 篇 graphic methods
  • 3 篇 backstepping
  • 3 篇 nonlinear equati...
  • 3 篇 autocorrelation
  • 3 篇 numerical method...
  • 2 篇 stability analys...
  • 2 篇 lyapunov methods
  • 2 篇 numerical simula...
  • 2 篇 graph theory
  • 2 篇 binary sequences
  • 2 篇 mathematical mod...
  • 1 篇 toy manufacturin...
  • 1 篇 daily rainfall t...
  • 1 篇 time varying con...
  • 1 篇 euclidean distan...
  • 1 篇 learning systems
  • 1 篇 resource theorie...
  • 1 篇 support vector m...

机构

  • 15 篇 school of mathem...
  • 10 篇 school of mathem...
  • 8 篇 miit key laborat...
  • 7 篇 department of ma...
  • 6 篇 department of ma...
  • 6 篇 school of mathem...
  • 5 篇 department of ma...
  • 5 篇 state key labora...
  • 4 篇 department of ma...
  • 4 篇 institute of mat...
  • 3 篇 key laboratory o...
  • 3 篇 miit key laborat...
  • 2 篇 school of mathem...
  • 2 篇 research center ...
  • 2 篇 school of mathem...
  • 2 篇 beijing institut...
  • 2 篇 department of ps...
  • 2 篇 shunde innovatio...
  • 2 篇 academy of mathe...
  • 2 篇 miit key laborat...

作者

  • 12 篇 zhao zehua
  • 9 篇 wang david g.l.
  • 9 篇 li qingna
  • 8 篇 hu jun
  • 5 篇 yu xueying
  • 4 篇 yang minghui
  • 4 篇 wen kang
  • 4 篇 yue haitian
  • 4 篇 jing xiaoyan
  • 4 篇 feng keqin
  • 4 篇 fan chenjie
  • 3 篇 jing zhang
  • 3 篇 lin huang
  • 3 篇 wang jun-min
  • 3 篇 wang monica m.y.
  • 3 篇 sun yujiao
  • 3 篇 su wen
  • 2 篇 kang wen
  • 2 篇 tang davion q.b.
  • 2 篇 sui zhiyuan

语言

  • 60 篇 英文
  • 8 篇 其他
检索条件"机构=Key Laboratory of Mathematical Theory and Computation in Information Security"
68 条 记 录,以下是11-20 订阅
排序:
Exploiting the Degeneracy of Euclidean Distance Matrix Completion Problem
Exploiting the Degeneracy of Euclidean Distance Matrix Compl...
收藏 引用
Computer information Science and Application Technology (CISAT), International Conference on
作者: Ting Ouyang Qingna Li School of Mathematics and Statistics Beijing Institute of Technology Beijing China School of Mathematics and Statistics Beijing Institute of Technology Key Laboratory of Mathematical Theory and Computation in Information Security Beijing China
The Euclidean distance matrix (EDM) completion problem has been widely used in molecular conformation, protein structure determination and localization. This problem can be troublesome for many off-the-shelf algorithm... 详细信息
来源: 评论
A Fast Smoothing Newton Method for Bilevel Hyperparameter Optimization for SVC with Logistic Loss
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yixin Li, Qingna School of Mathematics and Statistics Beijing Institute of Technology Beijing China Beijing Key Laboratory on MCAACI Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing China
Support Vector Classification with logistic loss has excellent theoretical properties in classification problems where the label values are not continuous. In this paper, we reformulate the hyperparameter selection fo... 详细信息
来源: 评论
A COMPOSITION METHOD FOR NEAT FORMULAS OF CHROMATIC SYMMETRIC FUNCTIONS
arXiv
收藏 引用
arXiv 2024年
作者: Wang, David G.L. Zhou, James Z.F. School of Mathematics and Statistics MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing102400 China School of Mathematics and Statistics Beijing Institute of Technology Beijing102400 China
We develop a composition method to unearth positive eI-expansions of chromatic symmetric functions XG, where the subscript I stands for compositions rather than integer partitions. Using this method, we derive positiv... 详细信息
来源: 评论
CHROMATIC SYMMETRIC FUNCTIONS OF CONJOINED GRAPHS
arXiv
收藏 引用
arXiv 2024年
作者: Qi, E.Y.J. Tang, D.Q.B. Wang, D.G.L. School of Mathematics and Statistics Beijing Institute of Technology Beijing102400 China School of Mathematics and Statistics MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing102400 China
We introduce path-conjoined graphs defined for two rooted graphs by joining their roots with a path, and investigate the chromatic symmetric functions of its two generalizations: spider-conjoined graphs and chain-conj... 详细信息
来源: 评论
Global relaxation-based LP–Newton method for multiple hyperparameter selection in support vector classification with feature selection
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qingna Qian, Yaru Zemkoho, Alain School of Mathematics and Statistics Beijing Key Laboratory on MCAACI Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing100081 China School of Mathematical Sciences University of Southampton SouthamptonSO17 1BJ United Kingdom
Support vector classification (SVC) is an effective tool for classification tasks in machine learning. Its performance relies on the selection of appropriate hyperparameters. In this paper, our focus is on identifying... 详细信息
来源: 评论
Improved security of a Data Truthfulness and Privacy Preservation Scheme in Data Markets
SSRN
收藏 引用
SSRN 2024年
作者: Duan, Meijiao Sun, Yujiao Sui, Zhiyuan Qin, Haimiao School of Information Central University of Finance and Economics Beijing China Department of Engineering Research Center of State Financial Security Ministry of Education Central University of Finance and Economics Beijing China MIIT Key Laboratory of Mathematical Theory and Computation in Information Security School of Mathematics and Statistics Beijing Institute of Technology Beijing China
Data Market, which has emerged in recent years, can carry out efficient data trading and further enhance the utility of data. However, there are many potential security risks in Data Market, and scholars have conducte... 详细信息
来源: 评论
DISPERSIVE DECAY FOR THE MASS-CRITICAL NONLINEAR SCHRÖDINGER EQUATION
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Chenjie Killip, Rowan Visan, Monica Zhao, Zehua Academy of Mathematics and Systems Science Hua Loo-Keng Key Laboratory of Mathematics Chinese Academy of Sciences Beijing China Department of Mathematics UCLA Los Angeles United States Department of Mathematics and Statistics Beijing Institute of Technology MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing China
We prove dispersive decay, pointwise in time, for solutions to the mass-critical nonlinear Schrödinger equation in spatial dimensions d = 1, 2, 3. Copyright © 2024, The Authors. All rights reserved.
来源: 评论
ON HECKE ALGEBRAS AND Z-GRADED TWISTING, SHUFFLING AND ZUCKERMAN FUNCTORS
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Ming Hu, Jun Sun, Yujiao Academy of Mathematics and Systems Science Chinese Academy of Sciences School of Mathematical Sciences University of Chinese Academy of Sciences 100190 Beijing100049 China Key Laboratory of Algebraic Lie Theory and Analysis of Ministry of Education School of Mathematics and Statistics Beijing Institute of Technology Beijing100081 China Key Laboratory of Mathematical Theory and Computation in Information Security School of Mathematics and Statistics Beijing Institute of Technology Beijing100081 China
Let g be a complex semisimple Lie algebra with Weyl group W. Let H(W) be the Iwahori-Hecke algebra associated to W. For each w ∈ W, let Tw and Cw be the corresponding Z-graded twisting functor and Z-graded shuffling ... 详细信息
来源: 评论
Input-to-state stabilization for a 2 × 2 hyperbolic system cascaded with an ODE  37
Input-to-state stabilization for a 2 × 2 hyperbolic system ...
收藏 引用
37th Youth Academic Annual Conference of Chinese Association of Automation, YAC 2022
作者: Zhang, Han-Wen Wang, Jun-Min Wang, Jing Shanxi University School of Automation and Software Engineering Shanxi Taiyuan030006 China Theory and Computation in Information Security Beijing Institute of Technology School of Mathematics and Statistics Key Laboratory of Mathematical Beijing100081 China Delft Institute of Applied Mathematics Delft University of Technology Mekelweg 4 Delft2628 CD Netherlands
The paper deals with the input-to-state stabilization for the 2×2 system of first-order hyperbolic equations, which convect in opposite directions cascaded with an unstable ODE equation. First, an inverse backste... 详细信息
来源: 评论
ON the CENTER CONJECTURE for the CYCLOTOMIC KLR ALGEBRAS
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Jun Lin, Huang MIIT Key Laboratory of Mathematical Theory and Computation in Information Security School of Mathematical and Statistics Beijing Institute of Technology Beijing100081 China School of Mathematical Sciences Zhejiang University Hangzhou310027 China
The center conjecture for the cyclotomic KLR algebras RβΛasserts that the center of RβΛconsists of symmetric elements in its KLR x and e(ν) gen-erators. In this paper we show that this conjecture is equivalent to...
来源: 评论