咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是411-420 订阅
排序:
Floating Point Optimization Based on Binary Translation System QEMU
Floating Point Optimization Based on Binary Translation Syst...
收藏 引用
2016 2nd Workshop on advanced Research and Technology in Industry Applications(WARTIA 2016)
作者: Qiang Shi Rongcai Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the ef... 详细信息
来源: 评论
The Design and Research for Network Address Space Randomization in OpenFlow Network
The Design and Research for Network Address Space Randomizat...
收藏 引用
2015 Workshop 5
作者: Ziyu Zhao Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility... 详细信息
来源: 评论
Loop-nest Auto-vectorization Method Based on Benefit Analysis
Loop-nest Auto-vectorization Method Based on Benefit Analysi...
收藏 引用
作者: Yao Jinyang Zhao Rongcai Wang Qi Tao Xiaohan State Key Laboratory of Mathematical Engineering and Advanced Computing
The SIMD(Single Instruction Multiple Data) extension component has been widely used in modern processors to improve the execution efficiency of the *** mainstream compilers(such as GCC,ICC,OPEN64,etc.) have supported ... 详细信息
来源: 评论
Register one-to-one mapping strategy in Dynamic Binary Translation
Register one-to-one mapping strategy in Dynamic Binary Trans...
收藏 引用
2014 International Conference on Network Security and Communication engineering(NSCE 2014)
作者: Y.N.Cui J.M.Pang Z.Shan F.Yue State Key Laboratory of Mathematical Engineering and Advanced Computing
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ... 详细信息
来源: 评论
Distributed key Revocation Scheme Based on Shared Binary Tree
Distributed Key Revocation Scheme Based on Shared Binary Tre...
收藏 引用
2015 IEEE International Conference on Progress in Informatics and computing(PIC 2015)
作者: Shaoren Wang Xuehui Du Zhi Yang State Key Laboratory of Mathematical Engineering and Advanced Computing
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha... 详细信息
来源: 评论
An Efficient Improved Model for Tor Anonymous Network
An Efficient Improved Model for Tor Anonymous Network
收藏 引用
2017 4th International Conference on engineering Technology and Application (ICETA 2017)
作者: Yitong Meng Yimin Liu Jinlong Fei Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a... 详细信息
来源: 评论
VBD-MF:A Block Device to Monitor the File System of Virtual Machine
VBD-MF:A Block Device to Monitor the File System of Virtual ...
收藏 引用
2017 International Conference on Mathematics, Modelling and Simulation Technologies and Applications(MMSTA 2017)
作者: Rui LOU Lie-hui JIANG Yi-sen WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD... 详细信息
来源: 评论
Cross-Platform Embedded-System Dynamic Information Acquisition Method
Cross-Platform Embedded-System Dynamic Information Acquisiti...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YISEN WANG JING JING JIANJING SHEN WEIYU DONG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen... 详细信息
来源: 评论
Dynamic Program Behavior Model Based on Layered Dependencies
Dynamic Program Behavior Model Based on Layered Dependencies
收藏 引用
2015 6th IEEE International Conference on Software engineering and Service Science(ICSESS 2015)
作者: Chao Fan Rongcai Zhao Zheng Shan Hongbo Cai State Key Laboratory of Mathematical Engineering and Advanced Computing
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interactio... 详细信息
来源: 评论
A new method for solving the linear recurrence relation with nonhomogeneous constant coefficients in some cases  4
A new method for solving the linear recurrence relation with...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Yang, Ben-Chao Han, Xue-Feng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Mathematics and Information Science Henan Polytechnic University Henan Jiaozuo China
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm... 详细信息
来源: 评论