咨询与建议

限定检索结果

文献类型

  • 1,099 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,267 篇 工学
    • 704 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 170 篇 电气工程
    • 122 篇 控制科学与工程
    • 122 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 79 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,011 篇 理学
    • 551 篇 物理学
    • 384 篇 数学
    • 122 篇 统计学(可授理学、...
    • 119 篇 化学
    • 115 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 deep neural netw...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 85 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering And Advanced Computing"
1985 条 记 录,以下是1391-1400 订阅
排序:
Numerical simulation of liquid sloshing with multiple flexible baffles using a coupled SPH with smoothed point interpolation method  28
Numerical simulation of liquid sloshing with multiple flexib...
收藏 引用
28th International Ocean and Polar engineering Conference, ISOPE 2018
作者: Wang, Shuangqiang Zhang, Guiyong Yan, Boqian Zhang, Zhiqian Zong, Zhi School of Naval Architecture Engineering Dalian University of Technology Liaoning Engineering Laboratory for Deep-Sea Floating Structures Dalian China State Key Laboratory of Structural Analysis for Industrial Equipment Dalian University of Technology Dalian China Collaborative Innovation Center for Advanced Ship and Deep-Sea Exploration Shanghai China Institute of High Performance Computing A*STAR Singapore
A novel method of coupled SPH with smoothed point interpolation method (S-PIM) has been employed to simulate the 2-D problem of liquid sloshing with multiple flexible baffles. In this simulation, the exciting force en... 详细信息
来源: 评论
Enhancing Traffic Performance of Scale-free Networks by Employing Hybrid-information-based Queuing Strategy
Enhancing Traffic Performance of Scale-free Networks by Empl...
收藏 引用
2018 International Conference on Mechanical,Electrical,Electronic engineering & Science(MEEES 2018)
作者: Yulin Lu Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute
Traffic congestion problem has become a bottleneck restricting the development of modern transportation systems, and accordingly the networked traffic system has drawn lots of researcher's attention. To enhance tr... 详细信息
来源: 评论
An Efficient Improved Model for Tor Anonymous Network
An Efficient Improved Model for Tor Anonymous Network
收藏 引用
2017 4th International Conference on engineering Technology and Application (ICETA 2017)
作者: Yitong Meng Yimin Liu Jinlong Fei Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a... 详细信息
来源: 评论
Cross-Platform Embedded-System Dynamic Information Acquisition Method
Cross-Platform Embedded-System Dynamic Information Acquisiti...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YISEN WANG JING JING JIANJING SHEN WEIYU DONG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen... 详细信息
来源: 评论
VBD-MF:A Block Device to Monitor the File System of Virtual Machine
VBD-MF:A Block Device to Monitor the File System of Virtual ...
收藏 引用
2017 International Conference on Mathematics, Modelling and Simulation Technologies and Applications(MMSTA 2017)
作者: Rui LOU Lie-hui JIANG Yi-sen WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD... 详细信息
来源: 评论
A Technique for Bytecode Decompilation of PLC Program
A Technique for Bytecode Decompilation of PLC Program
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Xuefeng LV Yaobin Xie Xiaodong Zhu Lu Ren State Key Laboratory of Mathematical Engineering and Advanced Computing
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
来源: 评论
Intrusion Detection Algorithm Based on Convolutional Neural Network
Intrusion Detection Algorithm Based on Convolutional Neural ...
收藏 引用
2017 4th International Conference on engineering Technology and Application (ICETA 2017)
作者: Yuchen Liu Shengli Liu Xing Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server... 详细信息
来源: 评论
Route Intrusion Detection Based on Long Short Term Memory Recurrent Neural Network
Route Intrusion Detection Based on Long Short Term Memory Re...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YUCHEN LIU SHENGLI LIU YANG WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces... 详细信息
来源: 评论
SDNGuardian: Secure your REST NBIs with API-grained permission checking system  12th
SDNGuardian: Secure your REST NBIs with API-grained permissi...
收藏 引用
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2016
作者: Ren, Kailei Wei, Qiang Wu, Zehui Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China China National Digital Switching System Engineering and Technological Research Center Zhengzhou450001 China
REST NBI (REST Northbound API) is the mainstream NBI implementation method of current SDN controllers, but none of them has achieved authorization management, which leads to serious privilege abuse problems. In this p... 详细信息
来源: 评论
Boosting Electrocatalytic Activity of 3d-Block Metal (Hydro)oxides by Ligand-Induced Conversion
收藏 引用
Angewandte Chemie 2021年 第19期133卷
作者: Dr. Wenxian Liu Dong Zheng Dr. Tianqi Deng Dr. Qiaoli Chen Chongzhi Zhu Chengjie Pei Dr. Hai Li Dr. Fangfang Wu Dr. Wenhui Shi Dr. Shuo-Wang Yang Prof. Yihan Zhu Prof. Xiehong Cao College of Materials Science and Engineering State Key Laboratory Breeding Base of Green Chemistry Synthesis Technology Center for Electron Microscopy Center for Membrane Separation and Water Science & Technology College of Chemical Engineering Zhejiang University of Technology 18 Chaowang Road Hangzhou Zhejiang 310014 P. R. China Institute of High Performance Computing Agency for Science Technology and Research 1 Fusionopolis Way #16-16 Connexis Singapore 138632 Singapore Key Laboratory of Flexible Electronics and Institute of Advanced Materials Jiangsu National Synergetic Innovation Center for Advanced Materials Nanjing Tech University 30 South Puzhu Road Nanjing Jiangsu 211816 P. R. China
The 3d-transition-metal (hydro)oxides belong to a group of highly efficient, scalable and inexpensive electrocatalysts for widespread energy-related applications that feature easily tailorable crystal and electronic s... 详细信息
来源: 评论