咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1961 条 记 录,以下是1891-1900 订阅
排序:
Fixing the sender-equivocable encryption scheme in eurocrypt 2010
Fixing the sender-equivocable encryption scheme in eurocrypt...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Huang, Zhengan Liu, Shengli Qin, Baodong Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China College of Computer Science and Technology Southwest University of Science and Technology Mianyang China School of Science Hangzhou Normal University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon... 详细信息
来源: 评论
Data recovery of user-defined procedures in binary translation
Data recovery of user-defined procedures in binary translati...
收藏 引用
International Conference on BioMedical engineering and Informatics (BMEI)
作者: Xiaonan Liu Rongcai Zhao Jianmin Pang Meijuan Yin Zhenfang Wei State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on sh... 详细信息
来源: 评论
Operand stack dependence based Java static software birthmark
Operand stack dependence based Java static software birthmar...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yong Wang Fenlin Liu Zheng Zhao Bin Lu Xin Xie Zhengzhou Institute of Information Science and Technology Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d... 详细信息
来源: 评论
The Research on Cryptographic Algorithms Recognition Technology
The Research on Cryptographic Algorithms Recognition Technol...
收藏 引用
International Conference on Intelligent System Design and engineering Application (ISDEA)
作者: Rui Chang Liehui Jiang Hui Shu Yaobin Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou Henan China
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of... 详细信息
来源: 评论
A New Algorithm to Exploit Superword Level Parallelism
A New Algorithm to Exploit Superword Level Parallelism
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Peng Liu Rong-cai Zhao Wei Gao Shuai Wei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering & Technology Research Center Zhengzhou China
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli... 详细信息
来源: 评论
G Bytes Data Hiding Method Based on Cluster Chain Structure
G Bytes Data Hiding Method Based on Cluster Chain Structure
收藏 引用
第七届中国可信计算与信息安全学术会议
作者: NIU Xiaopeng LI Qingbao WANG Wei WANG Yulong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002HenanChina PLA Information Engineering University Zhengzhou 450001HenanChina
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of ... 详细信息
来源: 评论
Creating cluster states in flux qubits with XY-type exchange interactions
收藏 引用
Physical Review A 2013年 第4期88卷 044303-044303页
作者: Zu-Rong Zhang Chun-Yan Li Chun-Wang Wu Hong-Yi Dai Cheng-Zu Li College of Science National University of Defense Technology Changsha 410073 People's Republic of China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450000 People's Republic of China
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits ar... 详细信息
来源: 评论
Practical decoy-state measurement-device-independent quantum key distribution
收藏 引用
Physical Review A 2013年 第5期87卷 052329-052329页
作者: Shi-Hai Sun Ming Gao Chun-Yan Li Lin-Mei Liang Department of Physics National University of Defense Technology Changsha 410073 People's Republic of China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 People's Republic of China State Key Laboratory of High Performance Computing National University of Defense Technology Changsha 410073 People's Republic of China
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practi... 详细信息
来源: 评论
Stochastic Multi-Symplectic Integrator for Stochastic Nonlinear Schrodinger Equation
收藏 引用
Communications in Computational Physics 2013年 第7期14卷 393-411页
作者: Shanshan Jiang Lijin Wang Jialin Hong College of Science Beijing University of Chemical TechnologyBeijing 100029P.R.China School of Mathematical Sciences Graduate University of Chinese Academy of SciencesBeijing 100049P.R.China State Key Laboratory of Scientific and Engineering Computing Institute of ComputationalMathematics and Scientific/Engineering ComputingAcademy of Mathematics and System ScienceChinese Academy of SciencesP.O.Box 2719Beijing 100190P.R.China
In this paper we propose stochastic multi-symplectic conservation law for stochastic Hamiltonian partial differential equations,and develop a stochastic multisymplectic method for numerically solving a kind of stochas... 详细信息
来源: 评论
An Implementation of Montgomery Modular Multiplication on FPGAs
An Implementation of Montgomery Modular Multiplication on FP...
收藏 引用
International Conference on Information Science and Cloud computing (ISCC)
作者: Xinkai Yan Guiming Wu Dong Wu Fang Zheng Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Lab. of Math. Eng. & Adv. Comput. Wuxi China
Modular multiplication is one of the most important operations in the public key cryptographic algorithms. In order to design a high-performance modular multiplier, we present a novel hybrid Montgomery modular multipl... 详细信息
来源: 评论