咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是401-410 订阅
排序:
Research on aggregated multicast based on wide-sense circuit tree
收藏 引用
2013 3rd International Symposium on Chemical engineering and Material Properties, ISCEMP 2013
作者: Zhang, Xiao Bo Lan, Ju Long Chen, Yue Li, Chao Ling State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450000 China China National Digital Switching System Engineering and Technological Research Center Zhengzhou 450000 China
To achieve the scalability and Quality of Service (QoS) of multicast service, a Wide-Sense Circuit Tree (WSCT) based on Aggregated Multicast Tree is proposed. By aggregating multicast traffics of the same class, WSCT ... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
2021国际计算机前沿大会
作者: Ke Tang Fudong Liu Zheng Shan Chunyan Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
Information technology facilitates people's lives greatly,while it also brings many security issues,such as code plagiarism,software in-fringement,and malicious *** order to solve the problems,reverse engineering ...
来源: 评论
Survey on the Improvement and Application of HHL Algorithm
Survey on the Improvement and Application of HHL Algorithm
收藏 引用
2022 International Conference on Computer Modelling and Big Data Analytics, CMBDA 2022
作者: Liu, Xiaonan Xie, Haoshan Liu, Zhengyu Zhao, Chenyan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University ZhengZhou450000 China School of Computer and Artificial Intelligence ZhengZhou University ZhengZhou450000 China
Quantum computing is a new computing mode that follows the laws of quantum mechanics to control quantum information units for computation. In terms of computational efficiency, due to the existence of quantum mechanic... 详细信息
来源: 评论
MalCommunity: A Graph-Based Evaluation Model for Malware Family Clustering
MalCommunity: A Graph-Based Evaluation Model for Malware Fam...
收藏 引用
2018国际计算机前沿大会(原国际青年计算机大会)
作者: Yihang Chen Fudong Liu Zheng Shan Guanghui Liang State Key of Laboratory of Mathematical Engineering and Advanced Computing
Malware clustering analysis plays an important role in largescale malware homology analysis. However, the generation approach of the ground truth data is usually ignored. The labels from Anti-virus(AV)engines are most...
来源: 评论
SDNGuardian: Secure your REST NBIs with API-grained permission checking system  12th
SDNGuardian: Secure your REST NBIs with API-grained permissi...
收藏 引用
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2016
作者: Ren, Kailei Wei, Qiang Wu, Zehui Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China China National Digital Switching System Engineering and Technological Research Center Zhengzhou450001 China
REST NBI (REST Northbound API) is the mainstream NBI implementation method of current SDN controllers, but none of them has achieved authorization management, which leads to serious privilege abuse problems. In this p... 详细信息
来源: 评论
An SIMD Code Generation Technology for Indirect Array
An SIMD Code Generation Technology for Indirect Array
收藏 引用
2015 7th International Conference on Computer Research and Development (ICCRD 2015)
作者: Peng-yuan Li Rong-cai Zhao Qing-hua Zhang Lin Han State Key Laboratory of Mathematical Engineering and Advanced Computing
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, ... 详细信息
来源: 评论
Research on Sleep Staging Method Based on Multi-Scale Convolution and Self-Attention Mechanism  2
Research on Sleep Staging Method Based on Multi-Scale Convol...
收藏 引用
2nd International Conference on Biomedical and Intelligent Systems, IC-BIS 2023
作者: Pan, Dongdong Li, Yingying School of Computer and Artificial Intelligence Zhengzhou University China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University China
Sleep is a very important physiological process for humans, and sleep staging is an important basis for evaluating sleep quality and diagnosing sleep-related diseases. Manual sleep staging is time-consuming and labori... 详细信息
来源: 评论
A Brief Survey of Specification Inference in Static Program Analysis
A Brief Survey of Specification Inference in Static Program ...
收藏 引用
2016 2nd International Conference on Advances in Mechanical engineering and Industrial Informatics(AMEII 2016)
作者: Chuansen Chai Xuexiong Yan Qingxian Wang Shukai Liu Yajing Sun Shuai Yi State Key Laboratory of Mathematical Engineering and Advanced Computing
Nowadays,many applications are too big to keep their own *** analysis is a technique which can be used for ensure the safety of large ***,frequent calls to libraries and frameworks bring a lot of difficulties to the *... 详细信息
来源: 评论
Floating Point Optimization Based on Binary Translation System QEMU
Floating Point Optimization Based on Binary Translation Syst...
收藏 引用
2016 2nd Workshop on advanced Research and Technology in Industry Applications(WARTIA 2016)
作者: Qiang Shi Rongcai Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the ef... 详细信息
来源: 评论