咨询与建议

限定检索结果

文献类型

  • 652 篇 会议
  • 302 篇 期刊文献

馆藏范围

  • 954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 502 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 102 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 60 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 59 篇 控制科学与工程
    • 45 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 342 篇 理学
    • 170 篇 数学
    • 128 篇 物理学
    • 69 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 148 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 malware
  • 17 篇 semantics
  • 17 篇 cryptography
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 926 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=State Key Laboratary of Mathematical Engineering and Advanced Computing"
954 条 记 录,以下是901-910 订阅
排序:
The optimization of IF-conversion in whole function vectorization
收藏 引用
Research Journal of Applied Sciences, engineering and Technology 2014年 第1期8卷 64-68页
作者: Pang, Jianmin Yue, Feng Shan, Zheng Dai, Chao Jin, Jiuzhen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to get better performance, lots of optimization methods are used in code transformation. When migrating SPMD to multi-core platform, vectorization is one key optimization to improve performance. Control flow ... 详细信息
来源: 评论
Data Dependence Constraints on SIMD Extensions
Data Dependence Constraints on SIMD Extensions
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Yong-sheng HOU Rong-cai ZHAO Shi-jie YAN Xuan LI State Key Laboratory of Mathematical Engineering and Advanced Computing School of Automation and Electrical Engineering Beijing University of Science and Technology
Exploiting fine-grained data-level parallelism via SIMD(Single Instruction Multiple Data) extension instructions is a universal approach in recent decades. A parallelizing compiler with SIMD vectorization is a widespr... 详细信息
来源: 评论
Certificateless non-interactive key exchange protocol without pairings
Certificateless non-interactive key exchange protocol withou...
收藏 引用
International Conference on Security and Cryptography (SECRYPT)
作者: Yun Wei Fushan Wei Chuangui Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China
Non-interactive key exchange (NIKE) allows two parties to establish a shared key without communications. In ID-based non-interactive key exchange (ID-NIKE) protocols, private key generator (PKG) knows user's priva... 详细信息
来源: 评论
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论
25th Annual Computational Neuroscience Meeting CNS-2016, Seogwipo City, South Korea, July 2-7, 2016 Abstracts
收藏 引用
BMC NEUROSCIENCE 2016年 第1期17卷 1-112页
作者: [Anonymous] Computational Neurobiology Laboratory The Salk Institute for Biological Studies San Diego USA UNIC CNRS Gif sur Yvette France The European Institute for Theoretical Neuroscience (EITN) Paris France ATR Computational Neuroscience Laboratories Kyoto Japan Krembil Research Institute University Health Network Toronto Canada Department of Physiology University of Toronto Toronto Canada Department of Medicine (Neurology) University of Toronto Toronto Canada Department of Physics University of New Hampshire Durham USA Department of Neurophysiology Nencki Institute of Experimental Biology Warsaw Poland Department of Theory Wigner Research Centre for Physics of the Hungarian Academy of Sciences Budapest Hungary Department of Mathematical Sciences KAIST Daejoen Republic of Korea Department of Mathematics University of Houston Houston USA Department of Biochemistry & Cell Biology and Institute of Biosciences and Bioengineering Rice University Houston USA Department of Biology and Biochemistry University of Houston Houston USA Grupo de Neurocomputación Biológica Dpto. de Ingeniería Informática Escuela Politécnica Superior Universidad Autónoma de Madrid Madrid Spain Department of Biological Sciences University of Southern California Los Angeles USA Center for Neuroscience Korea Institute of Science and Technology Seoul South Korea Department of Neurology Albert Einstein College of Medicine Bronx USA Center for Neuroscience KIST Seoul South Korea Department of Neuroscience University of Science and Technology Daejon South Korea Systems Neuroscience Group QIMR Berghofer Medical Research Institute Herston Australia Department of Psychology Yonsei University Seoul South Korea Department of Psychiatry Kyung Hee University Hospital at Gangdong Seoul South Korea Department of Psychiatry Veterans Administration Boston Healthcare System and Harvard Medical School Brockton USA Department of Electrical and Electronic Engineering The University of Melbourne Parkvil
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
来源: 评论
Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates
Mixed Obfuscation of Overlapping Instruction and Self-Modify...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Xin Xie Fenlin Liu Bin Lu Fei Xiang Zhengzhou Information Science and Technology Institute The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Static disassembly is used to analyze program control flow that is the key process of reverse analysis. Aiming at the problem that attackers are always using static disassembly to analyze control transfer instructions... 详细信息
来源: 评论
An object based software tool for software measurement
An object based software tool for software measurement
收藏 引用
International Conference on Information Communication and Embedded Systems (ICICES)
作者: G. Santhoshini K. Anbazhagan Zhengzhou Information Science and Technology Institute The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Software metrics are vital tools to enhance the quality of computer software, and to help in the control of software projects. Object-oriented technology is a new promising approach for developing software systems to ... 详细信息
来源: 评论
Using C to implement high-efficient computation of dense optical flow on FPGA-accelerated heterogeneous platforms
Using C to implement high-efficient computation of dense opt...
收藏 引用
IEEE International Conference on Field-Programmable Technology (FPT)
作者: Zhilei Chai Haojie Zhou Zhibin Wang Dong Wu School of Internet of Things Engineering Jiangnan University Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
High-quality algorithms for dense optical flow computation are computationally intensive. To compute them with high speed and low power is vital to make optical flow computation applicable in real-world applications. ... 详细信息
来源: 评论
Double LDA: A Sentiment Analysis Model Based on Topic Model
Double LDA: A Sentiment Analysis Model Based on Topic Model
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Xue Chen Wenqing Tang Hao Xu Xiaofeng Hu School of Computer Engineering and Science Shanghai University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The sentiment mining is a fast growing topic of both academic research and commercial applications, especially with the widespread of short-text applications on the Web. A fundamental problem that confronts sentiment ... 详细信息
来源: 评论
A Thread-Aware Adaptive Data Prefetcher
A Thread-Aware Adaptive Data Prefetcher
收藏 引用
IEEE International Conference on Computer Design: VLSI in Computers and Processors, (ICCD)
作者: Jiyang Yu Peng Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Department of Information Science and Electronic Engineering Zhejiang University Hangzhou China
Most processors employ hardware data prefetching to hide memory access latencies. However the prefetching requests from different threads on a multi-core processor can cause severe interference with prefetching and/or... 详细信息
来源: 评论