咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是201-210 订阅
排序:
THE Furnace temperature curve based on one-dimensional unsteady heat conduction model  14
THE Furnace temperature curve based on one-dimensional unste...
收藏 引用
14th International Symposium on Computational Intelligence and Design, ISCID 2021
作者: Liu, Jiaqi Zhou, Hongchuan Yang, Benchao Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to... 详细信息
来源: 评论
Design and Implementation of Variable Precision Algorithm for Transcendental Functions
Design and Implementation of Variable Precision Algorithm fo...
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Jiangwei, Hao Jinchen, Xu Shaozhong, Guo Yuanyuan, Xia Dan, Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most... 详细信息
来源: 评论
mathematical modeling of intelligent RGV simulation scheduling system based on simulated annealing algorithm  14
Mathematical modeling of intelligent RGV simulation scheduli...
收藏 引用
14th International Symposium on Computational Intelligence and Design, ISCID 2021
作者: Yang, Benchao Zhou, Hongchuan Liu, Jiaqi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
By establishing a mathematical model, the intelligent RGV scheduling scheme is optimized to design an efficient and stable intelligent RGV simulation scheduling system. This paper studies two different situations, inc... 详细信息
来源: 评论
Grover algorithm circuit optimization and noise analysis on integer factorization  7
Grover algorithm circuit optimization and noise analysis on ...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Song, Hui-Chao Liu, Xiao-Nan Jiang, Duo An, Jiale University of Information Engineering State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The classical computer is restricted by Moore's law and other factors into the development bottleneck, quantum computer by virtue of its natural acceleration advantage into the field of vision. Quantum computing c... 详细信息
来源: 评论
Defense strategy selection method for Stackelberg security game based on incomplete information  2019
Defense strategy selection method for Stackelberg security g...
收藏 引用
2019 International Conference on Artificial Intelligence and Computer Science, AICS 2019
作者: Ge, Xiaoyue Zhou, Tianyang Zang, Yichao State Key Laboratory of Mathematical Engineering and Advanced Computing Information and Engineering University Zhengzhou China
Network attack and defense confrontation is essentially a game process between unequal subjects on both sides of attack and defense. There are some defects in the prior hypothesis that the subject status of both sides... 详细信息
来源: 评论
A Combination Method of Resampling and Random Forest for Imbalanced Data Classification  4
A Combination Method of Resampling and Random Forest for Imb...
收藏 引用
4th International Conference on Advances in Computer Technology, Information Science and Communications, CTISC 2022
作者: Zheng, Liu Han, Qiu Junhu, Zhu Information & Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the research of imbalanced data classification, the resampling effect of the existing resampling and random forest combination technology is greatly affected by the characteristic dimension of the training set, res... 详细信息
来源: 评论
Exploration and research of blended learning in the "principles of computer organization"  2
Exploration and research of blended learning in the "princip...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Hou, Yifan Wang, Wei Liu, Fudong Shan, Zheng Wang, Junchao Wang, Lixin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati... 详细信息
来源: 评论
A Network Deception Defense Mechanism Based on Virtual Topology Generation
A Network Deception Defense Mechanism Based on Virtual Topol...
收藏 引用
2023 International Conference on Intelligent Systems, Communications, and Computer Networks, ISCCN 2023
作者: Wang, Binghui Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism... 详细信息
来源: 评论
The Propagation Strategy Model of Taint Analysis  4
The Propagation Strategy Model of Taint Analysis
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Ren, Yuzhu Zhao, Jiangtao Zhang, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
A Regional Network Topology Construction Algorithm Based on Sampling Measurement  5
A Regional Network Topology Construction Algorithm Based on ...
收藏 引用
2021 5th International Workshop on advanced Algorithms and Control engineering, IWAACE 2021
作者: Tao, Zhiyuan Liu, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ... 详细信息
来源: 评论