咨询与建议

限定检索结果

文献类型

  • 2,237 篇 期刊文献
  • 1,642 篇 会议
  • 1 册 图书

馆藏范围

  • 3,880 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,596 篇 工学
    • 1,403 篇 计算机科学与技术...
    • 1,107 篇 软件工程
    • 519 篇 信息与通信工程
    • 393 篇 电气工程
    • 327 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 270 篇 化学工程与技术
    • 214 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 182 篇 机械工程
    • 180 篇 材料科学与工程(可...
    • 152 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 交通运输工程
    • 94 篇 土木工程
    • 85 篇 网络空间安全
    • 81 篇 建筑学
  • 1,659 篇 理学
    • 776 篇 数学
    • 561 篇 物理学
    • 329 篇 生物学
    • 254 篇 化学
    • 219 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 85 篇 地球物理学
  • 505 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 133 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 77 篇 农学
  • 54 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 78 篇 feature extracti...
  • 60 篇 training
  • 57 篇 deep learning
  • 53 篇 accuracy
  • 50 篇 computational mo...
  • 43 篇 neural networks
  • 42 篇 optimization
  • 40 篇 machine learning
  • 38 篇 object detection
  • 36 篇 image segmentati...
  • 35 篇 data mining
  • 32 篇 predictive model...
  • 30 篇 simulation
  • 29 篇 correlation
  • 29 篇 privacy
  • 28 篇 federated learni...
  • 28 篇 data models
  • 27 篇 cosmic rays
  • 27 篇 contrastive lear...

机构

  • 195 篇 key laboratory o...
  • 156 篇 school of comput...
  • 137 篇 key laboratory o...
  • 99 篇 university of sc...
  • 99 篇 university of ch...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 87 篇 school of physic...
  • 86 篇 department of ph...
  • 86 篇 key laboratory f...
  • 85 篇 center for astro...
  • 85 篇 college of physi...
  • 84 篇 institute of fro...
  • 84 篇 school of physic...
  • 83 篇 school of physic...
  • 81 篇 national space s...
  • 79 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 bastieri d.
  • 77 篇 jiang k.
  • 73 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 72 篇 liu d.
  • 71 篇 chen m.j.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li xin
  • 68 篇 li cheng
  • 68 篇 bao y.w.
  • 68 篇 liu b.
  • 67 篇 hu h.b.
  • 65 篇 min z.
  • 64 篇 zheng wei-shi

语言

  • 3,496 篇 英文
  • 310 篇 其他
  • 84 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3880 条 记 录,以下是3811-3820 订阅
排序:
Monitoring dynamic changes of cropland in Minqin from 1989 to 2008
Monitoring dynamic changes of cropland in Minqin from 1989 t...
收藏 引用
2nd International Conference on Earth Observation for Global Changes
作者: Liao, Jie Wang, Tao Li, Ding Yan, Changzhen Li, Na Key Laboratory of Desert and Desertification Cold and Arid Regions Environmental and Engineering Research Institute Chinese Academy of Sciences Lanzhou Gansu 730000 China Graduate School Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Western China's Environmental System Ministry of Education Lanzhou University Lanzhou Gansu 730000 China Scientific Information Center for Resources and Environment Chinese Academy of Sciences Lanzhou Gansu 730000 China
Land use/cover change (LUCC) is one of the most important fields of study in global environmental change research. Decades of dynamic change of cropland caused by human activities is an important topic in LUCC researc... 详细信息
来源: 评论
Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted computing Platform
Research and Implement of Secure Bootstrap for Virtual Machi...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Zhiqiang Zhu Mingdi Xu Huanguo Zhang School of Computer Wuhan University of China Wuhan China The Key Laboratory of AeroSpace Information Security and Trust Computing Ministry of Education Wuhan China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China
Secure bootstrap usually use integrity measurement scheme to verify code or data before they are loaded into memory. As to traditional PC (personal computer) architecture, this method is hard to protect security of sy... 详细信息
来源: 评论
3D imaging algorithm and implement for through-wall synthetic aperture radar
3D imaging algorithm and implement for through-wall syntheti...
收藏 引用
Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Jiabing Zhu Yi Hong Liang Tao East China Research Institute of Electronic East China Research Institute of Electronic Engineering Hefei China Education Ministry Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei China
Typical synthetic aperture radar (SAR) images are two-dimensional, providing range and azimuth information, but furnish few details with respect to elevation. First of all, one approach to extend SAR to three-dimensio... 详细信息
来源: 评论
Context-based bias removal of statistical models of wavelet coefficients for image denoising
Context-based bias removal of statistical models of wavelet ...
收藏 引用
IEEE International Conference on Image Processing
作者: Weisheng Dong Xiaolin Wu Guangming Shi Lei Zhang Key Laboratory of IPIU of Ministry of Education Xidian University Xi'an China Department of Electrical and Computer Engineering McMaster University Canada Department of Computing Hong Kong Polytechnic University Hong Kong China
Existing wavelet-based image denoising techniques all assume a probability model of wavelet coefficients that has zero mean, such as zero-mean Laplacian, Gaussian, or generalized Gaussian distributions. While such a z... 详细信息
来源: 评论
A Compression Algorithm for Multi-streams Based on GEP
A Compression Algorithm for Multi-streams Based on GEP
收藏 引用
International Conference on Genetic and Evolutionary computing (WGEC)
作者: Chao Ding Chang-an Yuan Xiao Qin Yu-zhong Peng Computer and Information Engineering College Guangxi Teachers Education University Nanning China Key Laboratory of Scientific Computing & Intelligent Information processing University of Guangxi Nanning Guangxi China Computer and Information Engineering College University of Guangxi Nanning China
This paper applied the Methods which based on GEP in compress multi-streams. The contributions of this paper include: 1) giving an introduction to data function finding based on GEP(DFF-GEP), defining the main concept... 详细信息
来源: 评论
Security Analysis of OIAP Implementation Based on BAN Logic
Security Analysis of OIAP Implementation Based on BAN Logic
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Xu Shiwei Zhang Huanguo Yan Fei Xu Mingdi Li Zhide School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Key Laboratory of AeroSpace Information Security and Trust Computing Ministry of Education Wuhan University of China Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are... 详细信息
来源: 评论
Three-dimensional stochastic seepage field for embankment engineering
收藏 引用
Water Science and engineering 2009年 第1期2卷 58-73页
作者: Ya-jun WANG Wo-hua ZHANG Chang-yu WU Da-chun REN Key Laboratory of Soft Soils and Geoenvironmental Engineering Ministry of Education Zhejiang University Hangzhou 310027 P. R. China College of Civil Engineering and Architecture Zhejiang University Hangzhou 310027 P. R. China Yangtze River Scientific Research Institute Wuhan 430010 P. R. China
Owing to the complexity of geo-engineering seepage problems influenced by different random factors, three-dimensional simulation and analysis of the stochastic seepage field plays an important role in engineering appl... 详细信息
来源: 评论
A Model-Based Fuzz Framework to the Security Testing of TCG Software Stack Implementations
A Model-Based Fuzz Framework to the Security Testing of TCG ...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Yang Yang Huanguo Zhang Mi Pan Jian Yang Fan He Zhide Li School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz ... 详细信息
来源: 评论
FEM simulation of bimodal and trimodal thermally conductive adhesives
FEM simulation of bimodal and trimodal thermally conductive ...
收藏 引用
IEEE Conference on Nanotechnology
作者: Nabi Nabiollahi Johan Liu Zhu Hilli Yan Zhang Yue Cong Zhaonian Cheng Masahiro Inoue Bio Nano science laboratory Department of Microtechnology and Nanoscience Chalmers University of Technology Gothenburg Sweden Key Laboratory of Advanced Display and System Applications School of Mechatronics Engineering and Automation Ministry of Education and SMIT Center Shanghai University Shanghai China The Institute of Scientific and Industrial Research Osaka University Osaka Japan
A simulation with combination of a finite element analysis of Thermally Conductive Adhesive and contact resistance modeling has been presented. Using ANSYS and MATLAB software thermal conductivity and electrical resis... 详细信息
来源: 评论
Influences of filler geometry and content on effective thermal conductivity of thermal conductive adhesive
Influences of filler geometry and content on effective therm...
收藏 引用
Electronic Components and Technology Conference (ECTC)
作者: Cong Yue Yan Zhang Johan Liu Masahiro Inoue Sijia Jiang Zhaonian Cheng Key Laboratory of Advanced Display and System Applications Ministry of Education and SMIT Center School of Mechatronics Engineering and Automation Shanghai University Shanghai China SMIT Center Department of Microtechnology and Nanoscience Chalmers University of Technology Gothenburg Sweden The Institute of Scientific and Industrial Research Osaka University Osaka Japan
Thermal interface materials (TIMs), including thermal conductive adhesives (TCAs), grease, phase change materials (PCMs) and thermal pads, are widely used in thermal management for electronics system. In this work, a ... 详细信息
来源: 评论