咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1993 条 记 录,以下是251-260 订阅
排序:
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detection System with Fog computing  25
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detect...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Nowadays, the IoT (internet of things) botnet has become a huge threat to network security. In response to this threat, we present a cooperative adaptive network intrusion detection system (IDS) framework with fog com... 详细信息
来源: 评论
Obtaining Electromagnetic Properties of Multi-Type Media in Realistic Environments:state-of-the-Art and Prospects
收藏 引用
China Communications 2025年 第1期22卷 25-40页
作者: Guo Lantu Guan Ke Liu Ting He Danping Zhang Haixia Zhu Qiuming Lu Jun Zhang Minggao China Research Institute of Radiowave Propagation Qingdao 266107China State Key Laboratory of Advanced Rail Autonomous Operation Beijing Jiaotong UniversityBeijing 100044China School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China School of Control Science and Engineering Shandong UniversityJinan 250061China Shandong Key Laboratory of Intelligent Communication and Sensing-Computing Integration Jinan 250061China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210016China Jiaxing University Jiaxing 314001China
To meet the requirements of electromagnetic(EM)theory and applied physics,this study presents an overview of the state-of-the-art research on obtaining the EM properties of media and points out potential solutions tha... 详细信息
来源: 评论
BOBBLE: A Mixed Routing-Granularity Distributed Load Balancing for Data Center Networks  23
BOBBLE: A Mixed Routing-Granularity Distributed Load Balanci...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Xu, Zhengzhi Lu, Yifei Ma, Xu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
In current Datacenter Networks (DCNs), Equal-Cost Multipath (ECMP) is a default load balancing scheme. However, using ECMP may result in rapid growth of Flow Completion Time (FCT) due to its well-known drawbacks. In o... 详细信息
来源: 评论
Boosting Performance and QoS for Concurrent GPU B+trees by Combining-Based Synchronization  23
Boosting Performance and QoS for Concurrent GPU B+trees by C...
收藏 引用
28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023
作者: Zhang, Weihua Zhao, Chuanlei Peng, Lu Lin, Yuzhe Zhang, Fengzhe Lu, Yunping School of Computer Science Fudan University China Institute of Big Data Fudan University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Parallel Processing Institute Fudan University China Department of Computer Science Tulane University United States
Concurrent B+trees have been widely used in many systems. With the scale of data requests increasing exponentially, the systems are facing tremendous performance pressure. GPU has shown its potential to accelerate con... 详细信息
来源: 评论
Cooperative structure of Li/Ni mixing and stacking faults for achieving high-capacity Co-free Li-rich oxides
收藏 引用
Journal of Energy Chemistry 2024年 第8期95卷 315-324,I0007页
作者: Zhen Wu Yu-Han Zhang Hao Wang Zewen Liu Xudong Zhang Xin Dai Kunyang Zou Xiaoming Lou Xuechen Hu Lijing Ma Yan Liu Yongning Liu State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina Qingdao Industrial Energy Storage Research Institute Qingdao Institute of Bioenergy and Bioprocess TechnologyChinese Academy of SciencesQingdao 266101ShandongChina Hefei Advanced Computing Center Operation Management Corp Ltd Hefei 230088AnhuiChina Center for High Performance Computing Network Information CenterXi’an Jiaotong UniversityXi’an 710049ShaanxiChina Wuhan Dongfeng Motor Corporation Ltd Wuhan 430056HubeiChina School of Materials Science and Intelligent Engineering Nanjing UniversitySuzhou 215163JiangsuChina Key Laboratory of MEMS of the Ministry of Education Southeast UniversityNanjing 210096JiangsuChina International Research Center for Renewable Energy State Key Laboratory of Multiphase Flow in Power Engineering Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina
Co-free Li-rich layered oxides(LLOs)are emerging as promising cathode materials for Li-ion batteries due to their low cost and high ***,they commonly face severe structural instability and poor electrochemical activit... 详细信息
来源: 评论
Extraction of Secret Message Based on Uniformly Most Powerful Test
SSRN
收藏 引用
SSRN 2022年
作者: Du, Hansong Liu, Jiufen Luo, Xiangyang Zhang, Yi The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As the ultimate goal of steganalysis, secret message extraction is a bottleneck and difficulty that has long plagued the development of steganalysis technology. Existing pioneering work on secret message extraction fo... 详细信息
来源: 评论
spotFuzzer: Static Instrument and Fuzzing Windows COTs
arXiv
收藏 引用
arXiv 2022年
作者: Gu, Yeming Shu, Hui Ma, Rongkuan Yan, Lin Zhu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
The security research on Windows has received little attention in the academic circle. Most of the new methods are usually designed for Linux system, and are difficult to transplant to Windows. Fuzzing for Windows pro... 详细信息
来源: 评论
A Neighbor Immunization Strategy to Block Virus Spreading on Networks  2
A Neighbor Immunization Strategy to Block Virus Spreading on...
收藏 引用
2nd Information Communication Technologies Conference, ICTC 2021
作者: Yaohui, Hao Yingze, Liu Baole, Zhao Qingxian, Wang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
In order to achieve better effect on blocking virus propagation, a neighbor immunization strategy was proposed and verified in this paper. On email-EU real networks and on scale-free model network, the efficiencies of... 详细信息
来源: 评论
Energy Stable Nodal DG Methods for Maxwell’s Equations of Mixed-Order Form in Nonlinear Optical Media
收藏 引用
Communications on Applied Mathematics and Computation 2024年 第1期6卷 30-63页
作者: Maohui Lyu Vrushali A.Bokil Yingda Cheng Fengyan Li State Key Laboratory of Scientific and Engineering Computing(LSEC) Academy of Mathematics and System SciencesChinese Academy of SciencesBeijing100190China Department of Mathematics College of ScienceOregon State UniversityCorvallisOR97331USA Department of Mathematics Michigan State UniversityEast LansingMI48824USA Department of Computational Mathematics Science and EngineeringMichigan State UniversityEast LansingMI48824USA Department of Mathematical Sciences Rensselaer Polytechnic InstituteTroyNY12180USA
In this work,we develop energy stable numerical methods to simulate electromagnetic waves propagating in optical media where the media responses include the linear Lorentz dispersion,the instantaneous nonlinear cubic ... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Chenwei Li Mengyuan Pan Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
来源: 评论