咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1966 条 记 录,以下是1851-1860 订阅
排序:
One wide-sense circuit tree per traffic class based inter-domain multicast
One wide-sense circuit tree per traffic class based inter-do...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
Efficient client-to-client password authenticated key exchange based on RSA
Efficient client-to-client password authenticated key exchan...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Ma, Chuangui Wei, Fushan Gao, Fengxiu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The design of secure password authenticated key exchange (PAKE) protocols with RSA is a nontrivial hard work. Until now there have been only a few secure PAKE protocols based on RSA and most of them work in the two-pa... 详细信息
来源: 评论
Carrying multicast traffic across domain by per-access-network based Wide-Sense Circuit Tree
Carrying multicast traffic across domain by per-access-netwo...
收藏 引用
2013 IEEE International Conference of IEEE Region 10, IEEE TENCON 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu... 详细信息
来源: 评论
DDoS defense mechanism analysis based on signaling game model
DDoS defense mechanism analysis based on signaling game mode...
收藏 引用
2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
作者: Gao, Xiang Zhu, Yue-Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou City China
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDo... 详细信息
来源: 评论
Erratum to: Proton-hole and core-excited states in the semi-magic nucleus 131In82
收藏 引用
The European Physical Journal A 2016年 第12期52卷 1-2页
作者: Taprogge, J. Jungclaus, A. Grawe, H. Borzov, I. N. Nishimura, S. Doornenbal, P. Lorusso, G. Simpson, G. S. Söderström, P. -A. Sumikama, T. Xu, Z. Y. Baba, H. Browne, F. Fukuda, N. Gernhäuser, R. Gey, G. Inabe, N. Isobe, T. Jung, H. S. Kameda, D. Kim, G. D. Kim, Y. -K. Kojouharov, I. Kubo, T. Kurz, N. Kwon, Y. K. Li, Z. Sakurai, H. Schaffner, H. Shimizu, Y. Steiger, K. Suzuki, H. Takeda, H. Vajta, Zs. Watanabe, H. Wu, J. Yagi, A. Yoshinaga, K. Benzoni, G. Bönig, S. Chae, K. Y. Coraggio, L. Daugas, J. -M. Drouet, F. Gadea, A. Gargano, A. Ilieva, S. Itaco, N. Kondev, F. G. Kröll, T. Lane, G. J. Montaner-Pizá, A. Moschner, K. Mücher, D. Naqvi, F. Niikura, M. Nishibata, H. Odahara, A. Orlandi, R. Patel, Z. Podolyák, Zs. Wendt, A. Instituto de Estructura de la Materia CSIC Madrid Spain Departamento de Física Teórica Universidad Autónoma de Madrid Madrid Spain RIKEN Nishina Center RIKEN Saitama Japan GSI Helmholtzzentrum für Schwerionenforschung GmbH Darmstadt Germany National Research Centre “Kurchatov Institute” Moscow Russia Joint Institute for Nuclear Research Dubna Russia National Physical Laboratory NPL Teddington UK Department of Physics University of Surrey Guildford UK CNRS/IN2P3 Institut National Polytechnique de Grenoble LPSC Université Joseph Fourier Grenoble 1 Grenoble Cedex France Department of Physics Tohoku University Sendai Japan Department of Physics University of Tokyo Tokyo Japan School of Computing Engineering and Mathematics University of Brighton Brighton UK Physik Department E12 Technische Universität München Garching Germany Institut Laue-Langevin Grenoble Cedex 9 France Department of Physics Chung-Ang University Seoul Korea Rare Isotope Science Project Institute for Basic Science Daejeon Korea Department of Nuclear Engineering Hanyang University Seoul Korea School of Physics and State key Laboratory of Nuclear Physics and Technology Peking University Beijing China MTA Atomki Debrecen Hungary Department of Physics Osaka University Toyonaka Japan Department of Physics Faculty of Science and Technology Tokyo University of Science Noda Japan INFN Sezione di Milano Milano Italy Institut für Kernphysik Technische Universität Darmstadt Darmstadt Germany Department of Physics Sungkyunkwan University Suwon Korea Istituto Nazionale di Fisica Nucleare Complesso Universitario di Monte S. Angelo Napoli Italy CEA DAM DIF Arpajon cedex France Instituto de Física Corpuscular CSIC-Univ. of Valencia Paterna Spain Seconda Università di Napoli Dipartimento di Matematica e Fisica Caserta Italy Nuclear Engineering Division Argonne National Laboratory Argonne USA Department of Nuclear Physics Research School of Physical Sciences and Engineering Austr
来源: 评论
Design of TPM chip based on signal integrity analysis
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 44-52页
作者: Li, Yan-Bing Ye, Jian Zhu, Zhen-Min PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
It is important for personalized social services to calculate the relationship strength between users in a social network. Meanwhile, the psychological studies has shown that the personality traits is one of the key f... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 198-203页
作者: Jiao Luyao Li Yifa Qiao Shuaiting Department of Information Science Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... 详细信息
来源: 评论
Identification of global histogram equalization by modeling gray-level cumulative distribution
Identification of global histogram equalization by modeling ...
收藏 引用
2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013
作者: Yuan, Hai-Dong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing China
Previous studies have shown how to 'fingerprint' certain image processing operation. In this paper, we model the gray-level cumulative distribution of histogram-equalized image as discrete identity function, w... 详细信息
来源: 评论
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 377-384页
作者: WANG Xiaorui WANG Qingxian GUO Yudong LU Jianping Fourth Department PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Communication Command Chongqing Communication Institute
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... 详细信息
来源: 评论