咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是1041-1050 订阅
排序:
An Implementation of Montgomery Modular Multiplication on FPGAs
An Implementation of Montgomery Modular Multiplication on FP...
收藏 引用
International Conference on Information Science and Cloud computing (ISCC)
作者: Xinkai Yan Guiming Wu Dong Wu Fang Zheng Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Lab. of Math. Eng. & Adv. Comput. Wuxi China
Modular multiplication is one of the most important operations in the public key cryptographic algorithms. In order to design a high-performance modular multiplier, we present a novel hybrid Montgomery modular multipl... 详细信息
来源: 评论
Research of function disable energy-saving hardware trojan detection technology
收藏 引用
Energy Education Science and Technology Part A: Energy Science and Research 2013年 第2期31卷 1035-1040页
作者: Xiao, Da Zhu, Yuefei Liu, Shengli Li, Qinbao National Digital Switching System Engineering and Technological Research Center Zhengzhou 450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
Aiming at the function disable Energy-saving hardware Trojan detection application requirements, has resarech the Energy-saving hardware Trojan generation principle and the trigger mechanism deeply, gives the function... 详细信息
来源: 评论
Fixing the sender-equivocable encryption scheme in eurocrypt 2010
Fixing the sender-equivocable encryption scheme in eurocrypt...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Huang, Zhengan Liu, Shengli Qin, Baodong Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China College of Computer Science and Technology Southwest University of Science and Technology Mianyang China School of Science Hangzhou Normal University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon... 详细信息
来源: 评论
Operand stack dependence based Java static software birthmark
Operand stack dependence based Java static software birthmar...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yong Wang Fenlin Liu Zheng Zhao Bin Lu Xin Xie Zhengzhou Institute of Information Science and Technology Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d... 详细信息
来源: 评论
A New Algorithm to Exploit Superword Level Parallelism
A New Algorithm to Exploit Superword Level Parallelism
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Peng Liu Rong-cai Zhao Wei Gao Shuai Wei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering & Technology Research Center Zhengzhou China
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli... 详细信息
来源: 评论
G Bytes Data Hiding Method Based on Cluster Chain Structure
G Bytes Data Hiding Method Based on Cluster Chain Structure
收藏 引用
第七届中国可信计算与信息安全学术会议
作者: NIU Xiaopeng LI Qingbao WANG Wei WANG Yulong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002HenanChina PLA Information Engineering University Zhengzhou 450001HenanChina
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of ... 详细信息
来源: 评论
Creating cluster states in flux qubits with XY-type exchange interactions
收藏 引用
Physical Review A 2013年 第4期88卷 044303-044303页
作者: Zu-Rong Zhang Chun-Yan Li Chun-Wang Wu Hong-Yi Dai Cheng-Zu Li College of Science National University of Defense Technology Changsha 410073 People's Republic of China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450000 People's Republic of China
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits ar... 详细信息
来源: 评论
Practical decoy-state measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2013年 第5期87卷 052329-052329页
作者: Shi-Hai Sun Ming Gao Chun-Yan Li Lin-Mei Liang Department of Physics National University of Defense Technology Changsha 410073 People's Republic of China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 People's Republic of China State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 People's Republic of China
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practi... 详细信息
来源: 评论
Parallel constraint solution method combining search and consistency
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2013年 第SUPPL.2期44卷 268-272页
作者: Cao, Yan Wang, Qingxian Wei, Qiang Yin, Zhongxu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Due to continuous development of multi-core hardware architectures, how to make time-consuming constraint solution have the ability of running in parallel is particularly important. Based on analyzing the relation bet... 详细信息
来源: 评论
Parallelizing Sparse LU Decomposition on FPGAs
Parallelizing Sparse LU Decomposition on FPGAs
收藏 引用
11th International Conference on Field-Programmable Technology (FPT)
作者: Wu, Guiming Xie, Xianghui Dou, Yong Sun, Junqing Wu, Dong Li, Yuan State Key Laboratory of Mathematical Engineering and Advanced Computing China
Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study paralleliz... 详细信息
来源: 评论