咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 69 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 理学
    • 29 篇 数学
    • 6 篇 系统科学
    • 5 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 28 篇 工学
    • 13 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 6 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 测绘科学与技术
    • 2 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 林业工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 5 篇 管理学
    • 5 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 5 篇 algebra
  • 4 篇 waveguides
  • 3 篇 graphic methods
  • 3 篇 backstepping
  • 3 篇 nonlinear equati...
  • 3 篇 autocorrelation
  • 3 篇 numerical method...
  • 2 篇 stability analys...
  • 2 篇 lyapunov methods
  • 2 篇 numerical simula...
  • 2 篇 graph theory
  • 2 篇 binary sequences
  • 2 篇 mathematical mod...
  • 1 篇 toy manufacturin...
  • 1 篇 daily rainfall t...
  • 1 篇 euclidean distan...
  • 1 篇 learning systems
  • 1 篇 resource theorie...
  • 1 篇 support vector m...
  • 1 篇 approximation al...

机构

  • 15 篇 school of mathem...
  • 10 篇 school of mathem...
  • 8 篇 miit key laborat...
  • 7 篇 department of ma...
  • 6 篇 department of ma...
  • 6 篇 school of mathem...
  • 5 篇 department of ma...
  • 5 篇 state key labora...
  • 4 篇 department of ma...
  • 4 篇 institute of mat...
  • 3 篇 key laboratory o...
  • 3 篇 miit key laborat...
  • 2 篇 school of mathem...
  • 2 篇 research center ...
  • 2 篇 school of mathem...
  • 2 篇 beijing institut...
  • 2 篇 department of ps...
  • 2 篇 shunde innovatio...
  • 2 篇 academy of mathe...
  • 2 篇 miit key laborat...

作者

  • 12 篇 zhao zehua
  • 9 篇 wang david g.l.
  • 9 篇 li qingna
  • 8 篇 hu jun
  • 5 篇 yu xueying
  • 4 篇 yang minghui
  • 4 篇 wen kang
  • 4 篇 yue haitian
  • 4 篇 jing xiaoyan
  • 4 篇 feng keqin
  • 4 篇 fan chenjie
  • 3 篇 jing zhang
  • 3 篇 lin huang
  • 3 篇 wang jun-min
  • 3 篇 wang monica m.y.
  • 3 篇 sun yujiao
  • 3 篇 su wen
  • 2 篇 kang wen
  • 2 篇 tang davion q.b.
  • 2 篇 sui zhiyuan

语言

  • 61 篇 英文
  • 8 篇 其他
检索条件"机构=Key Laboratory of Mathematical Theory and Computation in Information Security"
69 条 记 录,以下是21-30 订阅
排序:
On the acceleration of gradient methods: the triangle steepest descent method
arXiv
收藏 引用
arXiv 2025年
作者: Shen, Ya Li, Qing-Na Dai, Yu-Hong School of Mathematics and Statistics Beijing Institute of Technology Beijing100081 China School of Mathematics and Statistics Beijing Key Laboratory on MCAACI/Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing100081 China LSEC ICMSEC AMSS Chinese Academy of Sciences Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
The gradient type of methods has been a competitive choice in solving large scale problems arising from various applications such as machine learning. However, there is still space to accelerate the gradient methods. ... 详细信息
来源: 评论
TRACE FORMS ON THE CYCLOTOMIC HECKE ALGEBRAS AND COCENTERS OF THE CYCLOTMIC SCHUR ALGEBRAS
arXiv
收藏 引用
arXiv 2022年
作者: He, Zhekun Hu, Jun Lin, Huang School of Mathematical and Statistics Beijing Institute of Technology Beijing100081 China MIIT Key Laboratory of Mathematical Theory and Computation in Information Security School of Mathematical and Statistics Beijing Institute of Technology Beijing100081 China
We define a unified trace form τ on the cyclotomic Hecke algebras Hn,K of type A, which generalize both Malle-Mathas’ trace form on the non-degenerate version (with Hecke parameter ξ 6= 1) and Brundan-Kleshchev’s ... 详细信息
来源: 评论
On the seminormal bases and dual seminormal bases of the cyclotomic Hecke algebras of type G(, 1, n)
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Jun Wang, Shixuan MIIT Key Laboratory of Mathematical Theory & Computation In Information Security School of Mathematical & Statistics Beijing Institute of Technology Beijing100081 China School of Mathematical & Statistics Beijing Institute of Technology Beijing100081 China
This paper studies the seminormal bases {fst}, {fst}, and the dual seminormal bases {gst}, {gst} of the non-degenerate and the degenerate cyclotomic Hecke algebras H,nof type G(, 1, n). We present some explicit formul...
来源: 评论
THE SPIDERS S(4m + 2, 2m, 1) ARE e-POSITIVE
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Davion Q.B. Wang, David G.L. Wang, Monica M.Y. School of Mathematics and Statistics Beijing Institute of Technology Beijing102400 China School of Mathematics and Statistics Beijing Key Laboratory on MCAACI Beijing Institute of Technology MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing102400 China School of Basic Education Beijing Institute of Graphic Communication Beijing102600 China School of Mathematical Sciences Capital Normal University Beijing100089 China
By using the composition method, we establish the e-positivity of spider graphs of the form S(4m + 2, 2m, 1), which was conjectured by Aliniaeifard, Wang and van Willigenburg. We expand chromatic symmetric functions i...
来源: 评论
A NOTE ON DECAY PROPERTY OF NONLINEAR SCHRÖDINGER EQUATIONS
arXiv
收藏 引用
arXiv 2022年
作者: Fan, Chenjie Zhao, Zehua Academy of Mathematics and Systems Science CAS China Department of Mathematics and Statistics Beijing Institute of Technology MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing China
In this note, we show the existence of a special solution u to defocusing cubic NLS in 3d, which lives in Hs for all s > 0, but scatters to a linear solution in a very slow way. We prove for this u, for all ǫ > ... 详细信息
来源: 评论
Event-Triggered Stabilization of Parabolic PDEs by Switching
Event-Triggered Stabilization of Parabolic PDEs by Switching
收藏 引用
IEEE Conference on Decision and Control
作者: Wen Kang Emilia Fridman Jing Zhang Chuan-Xin Liu School of Mathematics and Statistics MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology China School of Electrical Engineering Tel Aviv University Israel School of Automation and Electrical Engineering University of Science and Technology Beijing China
Although switching-based stabilization of 1D parabolic systems was investigated by employing one actuator moving in spatial domain in our recent paper [18], this method increases the system cost since actuator and sen...
来源: 评论
CLOCKS ARE e-POSITIVE
arXiv
收藏 引用
arXiv 2024年
作者: Chen, L. He, Y.T. Wang, David G.L. Department of Mathematics Southern University of Science and Technology Guangdong Shenzhen518055 China School of Mathematics and Statistics Xi’an Jiaotong University Shaanxi Xi’an710049 China School of Mathematics and Statistics MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing102400 China
Along with his confirmation of the e-positivity of all cycle-chord graphs θab1, the third author conjectured the e-positivity of all theta graphs θabc. In this paper, we establish the e-positivity of all clock grap... 详细信息
来源: 评论
An Efficient Method for Sample Adversarial Perturbations against Nonlinear Support Vector Machines
arXiv
收藏 引用
arXiv 2022年
作者: Su, Wen Li, Qingna School of Mathematics and Statistics Beijing Institute of Technology Beijing China School of Mathematics and Statistics Beijing Key Laboratory on MCAACI Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing China
Adversarial perturbations have drawn great attentions in various machine learning models. In this paper, we investigate the sample adversarial perturbations for nonlinear support vector machines (SVMs). Due to the imp... 详细信息
来源: 评论
Boundary Observer for an unstable cascaded heat-heat system with different reaction coefficients
Boundary Observer for an unstable cascaded heat-heat system ...
收藏 引用
Chinese Control Conference (CCC)
作者: Jia-Qi Tang Jun-Min Wang Wen Kang School of Mathematics and Statistics MIIT Key Laboratory of Mathematical Theory and Computation in Information Security Beijing Institute of Technology Beijing P. R. China Shunde Innovation School University of Science and Technology Beijing Foshan P. R. China
The present paper constructs a finite-dimensional observer subject to boundary measurement for a cascaded heat-heat system with different reaction coefficients. The observer design is proposed via the modal decomposit...
来源: 评论
QCSAS: A Quasi-Constant and Synchronized Aggregate Signature Scheme for AMI Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Sun, Yujiao Sui, Zhiyuan Wang, Huaqun de Meer, Hermann Beijing Institute of Technology MIIT Key Laboratory of Mathematical Theory and Computation in Information Security School of Mathematics and Statistics Beijing China Central University of Finance and Economics Information School Beijing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China University of Passau Faculty of Computer Science and Mathematics Passau Germany
Smart grids must safeguard their critical infrastructures against both physical and cyber attacks. Therefore, real-time operation and cybersecurity are two fundamental requirements for smart grid systems. AMI (Advance... 详细信息
来源: 评论