咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是291-300 订阅
Function Projective Synchronization of Chaotic PMSMs with Certain and Uncertain System Parameters
Function Projective Synchronization of Chaotic PMSMs with Ce...
收藏 引用
2021 China Automation Congress, CAC 2021
作者: Wang, Mufeng Liu, Ke Geng, Yangyang Che, Xin Wang, Jingpei College of Control Science & Engineering Zhejiang University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, driven by huge engineering demands, industrial Cyber-Physical System (iCPS) has developed rapidly. As an important energy conversion device in iCPS, stable operation of permanent magnet synchronous mo... 详细信息
来源: 评论
Tailor : Datacenter Load Balancing for Accelerating Distributed Deep Learning  9
Tailor : Datacenter Load Balancing for Accelerating Distribu...
收藏 引用
9th International Conference on advanced Cloud and Big Data, CBD 2021
作者: Xu, Zhengzhi Lu, Yifei Li, Jingqi Ma, Xu Qian, Lei Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Accelerating Distributed Deep Learning draws increasing attention recently. Existing solutions like gradient compression, pipelining computation/communication, flow scheduling based on gradient disparities, neglect lo... 详细信息
来源: 评论
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detection System with Fog computing  25
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detect...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Nowadays, the IoT (internet of things) botnet has become a huge threat to network security. In response to this threat, we present a cooperative adaptive network intrusion detection system (IDS) framework with fog com... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array  5
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiang, Heng Li, Lichun Zhang, Hailong Pan, Hongyi Li, Xue College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
Discovering users' potential demands for literature recommendation
收藏 引用
9th FTRA InternationalConference on Future Information Technology, FutureTech 2014
作者: Gao, Yinghu Chen, Xue Xu, Zheng School of Computer Engineering and Science Shanghai University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Inspired by the process of human memory and interaction, this paper provides a discovery model of user demands. We can get the keywords network and episodic network by capture and analysis the user's behavior in t... 详细信息
来源: 评论
A semantic representation of micro-blog short text based on topic model
收藏 引用
9th FTRA InternationalConference on Future Information Technology, FutureTech 2014
作者: Tang, Wenqing Chen, Xue Xu, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China School of Computer Engineering and Science Shanghai University Shanghai China
The fundamental challenge confronting micro-blog short texts is to represent, compute and mine their semantics since they are colloquial language and restricted within 140 words. This paper presents an approach to rep... 详细信息
来源: 评论
Honeypot Detection Method Based on Anomalous Requests Response Differences  23
Honeypot Detection Method Based on Anomalous Requests Respon...
收藏 引用
6th International Conference on Electronics, Communications and Control engineering, ICECC 2023
作者: Chen, Xingyu Lu, Bin Sun, Rongbo Jiang, Mi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University China Cyber Security College Information Engineering University China
Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin... 详细信息
来源: 评论
BOBBLE: A Mixed Routing-Granularity Distributed Load Balancing for Data Center Networks  23
BOBBLE: A Mixed Routing-Granularity Distributed Load Balanci...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Xu, Zhengzhi Lu, Yifei Ma, Xu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
In current Datacenter Networks (DCNs), Equal-Cost Multipath (ECMP) is a default load balancing scheme. However, using ECMP may result in rapid growth of Flow Completion Time (FCT) due to its well-known drawbacks. In o... 详细信息
来源: 评论
Constructing Non-binary Asymmetric Quantum Codes via Graphs
收藏 引用
China Communications 2013年 第2期10卷 33-41页
作者: 马智 冷日光 魏正超 钟淑琴 State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ... 详细信息
来源: 评论
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division  5
A Modeling Method of Cyberspace Security Structure Based on ...
收藏 引用
5th IEEE International Conference on Computer and Communication engineering Technology, CCET 2022
作者: Zhu, Yuwen Yu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Security Institute of Information Engineering Beijing100000 China
As the cyberspace structure becomes more and more complex, the problems of dynamic network space topology, complex composition structure, large spanning space scale, and a high degree of self-organization are becoming... 详细信息
来源: 评论