咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是1031-1040 订阅
排序:
A cost model for automatic OpenMP parallelization
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 101-110页
作者: Li, Yan-Bing Zhao, Rong-Cai Liu, Xiao-Xian Zhao, Jie PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Logistics Information Center Guangzhou Military Region Joint Logistics Department Guangzhou510000 China
Existing OpenMP cost models does not give enough thought to the implementation details of OpenMP programs so they cannot be applied widely to different types of parallel loops. To solve this problem, this study extend... 详细信息
来源: 评论
Research on Stream Cipher Model Based on Chaos Theory
收藏 引用
International Journal of Technology Management 2013年 第2期 91-93页
作者: Sun Wenjie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 102206
Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disa... 详细信息
来源: 评论
Method based on GSCPN for network vulnerability analysis
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2032-2038页
作者: Gao, Xiang Zhu, Yue-Fei Fei, Jin-Long Han, Tao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ... 详细信息
来源: 评论
An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP
An Automatic Parallel-Stage Decoupled Software Pipelining Pa...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xiaoxian Liu Rongcai Zhao Lin Han Peng Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
While multicore processors increase throughput for multi-programmed and multithreaded codes, many important applications are single threaded and thus do not benefit. Automatic parallelization techniques play an import... 详细信息
来源: 评论
Convergence and Scalarization in Whole Function Vectorization
Convergence and Scalarization in Whole Function Vectorizatio...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Feng Yue Jianmin Pang Jiuzhen Jin Dai Chao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
When implementing SPMD programs on multi core platforms, whole function vectorization is an important optimization method. SPMD program has drawback that lots of instructions across multi threads are redundant which i... 详细信息
来源: 评论
One Wide-Sense Circuit Tree per Traffic Class Based Inter-domain Multicast
One Wide-Sense Circuit Tree per Traffic Class Based Inter-do...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Chen Yue Li Chaoling Huang Kaixiang Zhang Xiaobo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
The Speedup Model for Manycore Processor
The Speedup Model for Manycore Processor
收藏 引用
International Conference on Information Science and Cloud computing Companion (ISCC-C)
作者: Nan Ye Ziyu Hao Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Integrating a large number of simple cores on the chip to provide the desired performance and throughput, microprocessor has entered the many core era. In order to fully extract the ability of the many core processor,... 详细信息
来源: 评论
Embedding change rate estimation based on ensemble learning  13
Embedding change rate estimation based on ensemble learning
收藏 引用
1st ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2013
作者: Li, Zhenyu Hu, Zongyun Luo, Xiangyang Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China Zhengzhou Institute of Information Science and Technology Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to achieve higher estimation accuracy of the embedding change rate of a stego object, an ensemble learning-based estimation method is presented. First of all, a framework of embedding change rate estimation b... 详细信息
来源: 评论
Steganographic codes by applying syndrome-trellis codes to dynamic distortion model in pixel chain
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2014年 第8期51卷 1739-1747页
作者: Bao, Zhenkun Zhang, Weiming Cheng, Sen Zhao, Xianfeng The Fourth Institute Information Engineering University Zhengzhou450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China School of Information Science and Technology University of Science and Technology of China Hefei230026 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Instituteof Information Engineering Chinese Academy of Sciences Beijing100093 China
Double-layered STC (syndrome trellis code) is the most popular method for minimizing the distortion of ± 1 steganography. However, it is a probabilistic algorithm which may fail in the embedding process on some g... 详细信息
来源: 评论
Steganalysis of F5-like steganography based on selection of joint distribution features  13
Steganalysis of F5-like steganography based on selection of ...
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Liu, Yuan Luo, Xiangyang Lu, Jicang Gong, Daofu Zhengzhou Information Science and Technology Institute Zhengzhou 450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas... 详细信息
来源: 评论