咨询与建议

限定检索结果

文献类型

  • 1,748 篇 期刊文献
  • 909 篇 会议
  • 35 册 图书

馆藏范围

  • 2,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,646 篇 理学
    • 842 篇 物理学
    • 649 篇 数学
    • 227 篇 生物学
    • 190 篇 统计学(可授理学、...
    • 132 篇 化学
    • 121 篇 系统科学
    • 84 篇 地球物理学
  • 1,449 篇 工学
    • 727 篇 计算机科学与技术...
    • 561 篇 软件工程
    • 231 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 184 篇 生物工程
    • 181 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 131 篇 光学工程
    • 122 篇 核科学与技术
    • 114 篇 机械工程
    • 114 篇 生物医学工程(可授...
    • 102 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 82 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 68 篇 力学(可授工学、理...
    • 49 篇 航空宇航科学与技...
  • 273 篇 管理学
    • 178 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 113 篇 医学
    • 91 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 64 篇 法学
    • 57 篇 社会学
  • 34 篇 经济学
  • 30 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 4 篇 军事学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 70 篇 hadron colliders
  • 63 篇 deep learning
  • 62 篇 higgs bosons
  • 53 篇 machine learning
  • 47 篇 proton-proton in...
  • 38 篇 computer science
  • 37 篇 mathematics
  • 36 篇 standard model (...
  • 35 篇 large hadron col...
  • 33 篇 wearable sensors
  • 32 篇 computational mo...
  • 32 篇 accuracy
  • 31 篇 artificial intel...
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 25 篇 control systems
  • 25 篇 feature extracti...
  • 24 篇 neural networks

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 407 篇 kirchhoff-instit...
  • 397 篇 department of ph...
  • 394 篇 institute of phy...
  • 388 篇 department of ph...
  • 386 篇 department of ph...
  • 376 篇 institute of phy...
  • 375 篇 fakultät für phy...
  • 369 篇 instituto de fís...
  • 312 篇 dipartimento di ...
  • 307 篇 department of ph...
  • 304 篇 nikhef national ...
  • 303 篇 department of ph...
  • 292 篇 department of ph...
  • 288 篇 graduate school ...
  • 281 篇 department of ph...
  • 274 篇 department of ph...
  • 270 篇 universidade fed...
  • 269 篇 department of ph...

作者

  • 334 篇 c. alexa
  • 334 篇 g. bella
  • 334 篇 d. calvet
  • 334 篇 c. amelung
  • 333 篇 g. spigo
  • 332 篇 j. m. izen
  • 332 篇 j. strandberg
  • 331 篇 f. siegert
  • 322 篇 r. ströhmer
  • 322 篇 m. rijssenbeek
  • 322 篇 s. jin
  • 322 篇 g. gaudio
  • 322 篇 s. mohapatra
  • 315 篇 s. guindon
  • 313 篇 a. kaczmarska
  • 310 篇 j. schaarschmidt
  • 306 篇 y. tayalati
  • 298 篇 a. d. pilkington
  • 297 篇 l. chevalier
  • 290 篇 m. klein

语言

  • 2,491 篇 英文
  • 183 篇 其他
  • 15 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Applied Mathematics"
2692 条 记 录,以下是2441-2450 订阅
排序:
Design of synchronization controller for delayed chaotic systems with parameter mismatch
收藏 引用
Journal of Computational Information Systems 2009年 第5期5卷 1409-1417页
作者: Liu, Zixin Lv, Shu Zhong, Shouming Ye, Mao School of Applied Mathematics University of Electronic Science and Technology of China Chengdu 610054 China School of Mathematics and Statistics Guizhou College of Finance and Economics Guiyang 550004 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
In this paper, the synchronization controller design problem for a class of chaotic delayed systems with parameter mismatch is investigated. Based on linear matrix inequality (LMI) technique and Lyapunov method, one n... 详细信息
来源: 评论
Advanced Gronwall-Bellman-Type integral inequalities and their applications
International Journal of Computational and Mathematical Scie...
收藏 引用
International Journal of Computational and Mathematical Sciences 2009年 第2期3卷 74-79页
作者: Liu, Zixin Lü, Shu Zhong, Shouming Ye, Mao School of Applied Mathematics University of Electronic Science and Technology of China Chengdu 610054 China School of Mathematics and Statistics Guizhou College of Finance and Economics Guiyang 550004 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
In this paper, some new nonlinear generalized Gronwall-Bellman-Type integral inequalities with mixed time delays are established. These inequalities can be used as handy tools to research stability problems of delayed... 详细信息
来源: 评论
Advanced Gronwall-Bellman-Type integral inequalities and their applications
收藏 引用
World Academy of Science, engineering and Technology 2009年 35卷 1046-1051页
作者: Liu, Zixin Lü, Shu Zhong, Shouming Ye, Mao School of Applied Mathematics University of Electronic Science and Technology of China Chengdu 610054 China School of Mathematics and Statistics Guizhou College of Finance and Economics Guiyang 550004 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
In this paper, some new nonlinear generalized Gronwall-Bellman-Type integral inequalities with mixed time delays are established. These inequalities can be used as handy tools to research stability problems of delayed... 详细信息
来源: 评论
A New Low Cost One Time ID and Password Authentication Protocol Using Popular Removable Storage Devices
A New Low Cost One Time ID and Password Authentication Proto...
收藏 引用
International Workshop on Intelligent Networks and Intelligent Systems (ICINIS)
作者: TongLiang Li ZhiGang Jin Hebei Institute of Applied Mathematics Hebei China School of Computer Science and Technology Tianjin University Tianjin China School of Information Engineering Tianjin University Tianjin China
User authentication is very important to information security. In this paper, we present an economical hash-based strong password authentication scheme by using of a popular removable storage device. With the help of ... 详细信息
来源: 评论
Adjacent Vertex Reducible Vertex-Total Coloring of Graphs
Adjacent Vertex Reducible Vertex-Total Coloring of Graphs
收藏 引用
International Conference on Computational Intelligence and Software engineering (CiSE)
作者: Enqiang Zhu Zhongfu Zhang Zhiwen Wang Jingwen Li Fei Wen HuiLin Cai Institute of Applied Mathematics Lanzhou Jiaotong University Lanzhou China College of Mathematics and Computer Ningxia University Yinchuan China School of Mechatronic Engineering Lanzhou Jiaotong University Lanzhou China
Let G = (V, E) be a simple graph, k (1 ¿ k ¿ ¿(G) +1) is a positive integer, f is a mapping from V(G) ¿ E(G) to {1,2, ···, k} such that ¿uv ¿ E(G),f(u) ¿ f(v) and C(u)... 详细信息
来源: 评论
Analysing questionnaires on IT project status - complexity reduction by the application of rough concepts
Analysing questionnaires on IT project status - complexity r...
收藏 引用
20th Australasian Conference on Information Systems, ACIS 2009
作者: Peters, Georg Poon, Simon Gordon Hunter, M. Munich University of Applied Sciences Department of Computer Science and Mathematics Lothstrasse 34 80637 Munich Germany School of Information Technologies Faculty of Engineering and IT University of Sydney NSW 2006 Australia University of Lethbridge Faculty of Management Lethbridge AB T1K 3M4 Canada
Since its introduction half a century ago IT has become one of the most important infrastructure components of virtually any organisation. An important key area of qualitative research in information systems is interv... 详细信息
来源: 评论
Analysing questionnaires on IT project status - Complexity reduction by the application of rough concepts
Analysing questionnaires on IT project status - Complexity r...
收藏 引用
12th Australian Conference on Knowledge Management and Intelligent Decision Support, ACKMIDS 09 and 20th Australasian Conference on Information Systems, ACIS 2009
作者: Peters, Georg Poon, Simon Hunter, M. Gordon Munich University of Applied Sciences Department of Computer Science and Mathematics Lothstrasse 34 80637 Munich Germany School of Information Technologies Faculty of Engineering and IT University of Sydney NSW 2006 Australia University of Lethbridge Faculty of Management Lethbridge AB T1K 3M4 Canada
Since its introduction half a century ago IT has become one of the most important infrastructure components of virtually any organisation. An important key area of qualitative research in information systems is interv... 详细信息
来源: 评论
Linear network coordinated beamforming for cell-boundary users
Linear network coordinated beamforming for cell-boundary use...
收藏 引用
2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2009
作者: Chae, Chan-Byoung Kim, Sang-Hyun Heath Jr., Robert W. School of Engineering and Applied Sciences Harvard University Cambridge MA 02138 United States Department of Mathematics University of Texas at Austin 1 University Station C1200 Austin TX 78712 United States Department of Electrical and Computer Engineering University of Texas at Austin 1 University Station C0803 Austin TX 78712 United States
In this paper, low complexity linear network coordinated beamforming (N-CBF) algorithms under a zero inter-user interference constraint are proposed for the multi-cell downlink channel. We consider a downlink scenario... 详细信息
来源: 评论
Fault tolerant control using self-diagnostic smart actuator
Fault tolerant control using self-diagnostic smart actuator
收藏 引用
SICE Annual Conference
作者: Inseok Yang Kyungmin Kang Dongik Lee Department of Industrial Applied Mathematics Kyungpook National University Daegu South Korea School of Electrical Engineering & Computer Science Kyungpook National University Daegu South Korea
In this paper, a networked fault tolerant control strategy that utilizes a self-diagnostic smart actuator is presented with an application to ldquosteer-by-wirerdquo (SBW) which is a network based steering system for ... 详细信息
来源: 评论
A Concrete Certificateless Signature Scheme without Pairings
A Concrete Certificateless Signature Scheme without Pairings
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Aijun Ge Shaozhen Chen Xinyi Huang Department of Applied Mathematics Zhengzhou Information Science and Technology Institute Zhengzhou Henan China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in c... 详细信息
来源: 评论