咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是481-490 订阅
排序:
An Automatic Reassembly Model and Algorithm of Log File Fragments Based on Graph Theory
An Automatic Reassembly Model and Algorithm of Log File Frag...
收藏 引用
2015 6th IEEE International Conference on Software engineering and Service Science(ICSESS 2015)
作者: Shuai Yi Xueli Hu Hao Wu Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing
Automatic reassembly of log file fragments from a collection of mixed fragments is one of the most important process during log file carving. In this paper we propose a general process model and design an algorithm ba... 详细信息
来源: 评论
A new aggregate signature scheme in cryptographic currency
收藏 引用
International Journal of Performability engineering 2017年 第5期13卷 754-762页
作者: Yuan, Chao Xu, Mixue Si, Xueming State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
With the rise of Bitcoin, cryptographic currencies have attracted more and more attention. Subsequently, other cryptographic currencies were gradually created, such as Zcash, Moreno, Dash and so on. In cryptographic c... 详细信息
来源: 评论
Design and Implementation of Variable Precision Algorithm for Transcendental Functions
Design and Implementation of Variable Precision Algorithm fo...
收藏 引用
作者: Hao Jiangwei Xu Jinchen Guo Shaozhong Xia Yuanyuan Liu Dan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most... 详细信息
来源: 评论
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Yanyang Gu Ping Zhang Zhifeng Chen Fei Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Text clustering algorithm based on deep representation learning
Text clustering algorithm based on deep representation learn...
收藏 引用
作者: Wang, Binyu Liu, Wenfen Lin, Zijie Hu, Xuexian Wei, Jianghong Liu, Chun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541000 China
Text clustering is an important method for effectively organising, summarising, and navigating text information. However, in the absence of labels, the text data to be clustered cannot be used to train the text repres... 详细信息
来源: 评论
Memory Error Detection Based on Dynamic Binary Translation
Memory Error Detection Based on Dynamic Binary Translation
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Hang Xu Wei Ren Zimian Liu Jiajun Chen Junhu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall... 详细信息
来源: 评论
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture
Research on Performance Optimization for Sparse Matrix-Vecto...
收藏 引用
Information Technology and Computer Application (ITCA), International Conference on
作者: Qihan Wang Mingliang Li Jianming Pang Di Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing zhengzhou China
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu... 详细信息
来源: 评论
A framework for test data generation of object-oriented programs based on complete testing chain
A framework for test data generation of object-oriented prog...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Gang Li Lei Yu Huihui Sun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Test data generation is always a hot topic in software testing since efficient test data generation method can significantly increase the efficiency of software testing and decrease the cost. Method call relation and ... 详细信息
来源: 评论
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Network to Learn High-Order Social Relations for Diffusion Prediction
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Netwo...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ningbo Huang Gang Zhou Mengli Zhang Meng Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Information diffusion prediction aims to predict the tendency of information spreading in the network. Previous methods focus on extracting chronological features from diffusion paths and leverage relations in social ... 详细信息
来源: 评论
Defense Strategy Selection Method for Stackelberg Security Game Based on Incomplete Information
Defense Strategy Selection Method for Stackelberg Security G...
收藏 引用
作者: Xiaoyue Ge Tianyang Zhou Yichao Zang State Key Laboratory of Mathematical Engineering and Advanced Computing Information & Engineering University
Network attack and defense confrontation is essentially a game process between unequal subjects on both sides of attack and *** are some defects in the prior hypothesis that the subject status of both sides of the att... 详细信息
来源: 评论