咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是711-720 订阅
排序:
Mobile APP user attribute prediction by heterogeneous information network modeling
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
Design and Implementation of Variable Precision Algorithm for Transcendental Functions
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1325卷
作者: Hao Jiangwei Xu Jinchen Guo Shaozhong Xia Yuanyuan Liu Dan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most...
来源: 评论
An anti-side-channel virtual CPU scheduling algorithm based on leakage evaluation for virtual machine security  7
An anti-side-channel virtual CPU scheduling algorithm based ...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Du, Yuanzhi Du, Xuehui Yang, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but... 详细信息
来源: 评论
A practical and aggressive loop fission technique  18th
A practical and aggressive loop fission technique
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing - ICA3PP 2018 Collocated Workshops: ICA3PP 2018 Workshop on Intelligent Algorithms for Large-scale Complex Optimization Problems, IALCOP 2018, ICA3PP 2018 Workshop on Security and Privacy in Data Processing, SPDP 2018
作者: Zhao, Bo Li, Yingying Han, Lin Zhao, Jie Gao, Wei Zhao, Rongcai Yahyapour, Ramin Gesellschaft für wissenschaftliche Datenverarbeitung mbH Göttingen Göttingen37077 Germany State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China French Institute for Research in Computer Science and Automation Rocquencourt France
Loop fission is an effective loop optimization for exploiting fine-grained parallelism. Currently, loop fission is widely used in existing parallelizing compilers. To fully exploit the optimization, we proposed and im... 详细信息
来源: 评论
SARF: A Spark Based Recommendation Framework in the Cloud
SARF: A Spark Based Recommendation Framework in the Cloud
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Jieyao Zhou Yifei Lu Ka Bian Lei Qian School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi China
With the development of the IT industry, the information resources and services that people come into contact with have been growing. The sharing and interaction of these two types of information has led to further gr... 详细信息
来源: 评论
2020 roadmap on two-dimensional materials for energy storage and conversion
收藏 引用
Chinese Chemical Letters 2019年 第12期30卷 2053-2064页
作者: Baolin Xu Shihan Qi Mengmeng Jin Xiaoyi Cai Linfei Lai Zhouting Sun Xiaogang Han Zifeng Lin Hui Shao Peng Peng Zhonghua Xiang Johan E.ten Elshof Rou Tan Chen Liu Zhaoxi Zhang Xiaochuan Duan Jianmin Ma School of Physics and Electronics Hunan UniversityChangsha 410082China Key Laboratory of Flexible Electronics&Institute of Advanced Materials(IAM) Jiangsu National Synergistic Innovation Center for Advanced Materials(SICAM)Nanjing Tech UniversityNanjing 210009China School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore 637371Singapore State Key Lab of Electrical Insulation and Power Equipment Xi'an Jiaotong UniversityXi'an 710049China College of Materials Science and Engineering Sichuan UniversityChengdu 610065China UniversitéPaul Sabatier Laboratoire CIRIMAT UMR CNRS 5085Toulouse 31062France Réseau sur le Stockage Electrochimique de l’Energie(RS2E) CNRS 3459AmiensFrance State Key Laboratory of Organic–Inorganic Composites Beijing University of Chemical TechnologyBeijing 100029China University of Twente AE Enschede 7500the Netherlands Pen-Tung Sah Institute of Micro-Nano Science and Technology Xiamen UniversityXiamen 361005China Key Laboratory of Materials Processing and Mold(Zhengzhou University) Ministry of EducationZhengzhou UniversityZhengzhou 450002China
Energy storage and conversion have attained significant intere st owing to its important applications that reduce CO2 emission through employing green *** promising technologies are included metalair batteries,metal-s... 详细信息
来源: 评论
A Gene-Inspired Malware Detection Approach
收藏 引用
Journal of Physics: Conference Series 2019年 第6期1168卷
作者: Yihang Chen Zheng Shan Fudong Liu Guanghui Liang Binglin Zhao Xingwei Li Meng Qiao State Key of Laboratory of Mathematical Engineering and Advanced Computing 450001 Zhengzhou Henan China
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and pro...
来源: 评论
A Parallel Probabilistic Approach to Factorize a Semiprime
收藏 引用
American Journal of Computational Mathematics 2018年 第2期8卷 175-183页
作者: Jianhui Li Department of Computer Science Guangdong Neusoft Institute Foshan City Foshan China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic... 详细信息
来源: 评论
ChanDet: Detection Model for Potential Channel of iOS Applications
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: GuoMiao Zhou Ming Duan Qi Xi Hao Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking tool, which allows them to do more un...
来源: 评论
Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code  17
Path Sensitive Static Analysis of Taint-Style Vulnerabilitie...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Xue-Xiong Yan Qing-Xian Wang Heng-Tai Ma Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th... 详细信息
来源: 评论