咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1993 条 记 录,以下是341-350 订阅
排序:
Embedding Attribute and Relation Information for Person Entity Alignment  6
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Wang, Can Liu, Xiaonan Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Variational Quantum Algorithm and Its Application on Non-Linear Equations  2
Variational Quantum Algorithm and Its Application on Non-Lin...
收藏 引用
2021 2nd International Conference on Computer Information and Big Data Applications, CIBDA 2021
作者: Yang, Yihang Shan, Zheng Zhao, Bo Xu, Le School of Information Engineering Zhengzhou University Zhengzhou Henan450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou Henan450000 China
Quantum algorithms of factoring problem have been paid more and more attention since Shor's algorithm was proposed. Combining the current quantum computer hardware level and integer factorization quantum algorithm... 详细信息
来源: 评论
Accurate and Efficient Human Activity Recognition Through Semi-Supervised Deep Learning
收藏 引用
IEEE Sensors Journal 2025年 第12期25卷 23105-23116页
作者: Long, Xianlei Wang, Ping Gu, Fuqiang Yan, Jinjin Yu, Fangwen Li, Yan Chen, Chao Guo, Songtao Chongqing University College of Computer Science Chongqing400044 China Harbin Engineering University Qingdao Innovation and Development Center Qingdao266400 China Tsinghua University Department of Precision Instrument Beijing China Macquarie University School of Computing Sydney Australia Chongqing University State Key Laboratory of Mechanical Transmission for Advanced Equipment Chongqing400044 China
In recent years, deep learning has been widely used for human activity recognition (HAR) based on wearable sensor data due to its excellent performance. However, deep learning approaches often need a large amount of l... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique  20
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Sun, Zedong Gu, Chunxiang Zheng, Yonghui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论
A new method for solving the linear recurrence relation with nonhomogeneous constant coefficients in some cases  4
A new method for solving the linear recurrence relation with...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Yang, Ben-Chao Han, Xue-Feng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Mathematics and Information Science Henan Polytechnic University Henan Jiaozuo China
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm... 详细信息
来源: 评论
A BOW-Based Sentence Embedding Method for Chinese Event Identification  4
A BOW-Based Sentence Embedding Method for Chinese Event Iden...
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Gao, Lizheng Zhou, Gang Luo, Junyong State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
作者: Hongmin WANG Qiang WEI Yaobin XIE State Key Laboratory of Mathematical Engineering and Advanced Computing
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the ... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
2020 International Conference on Computer engineering and Intelligent Control, ICCEIC 2020
作者: Ou, Yunjia Zhou, Tianyang Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
Practical Control Flow Integrity using Multi-Variant execution  20
Practical Control Flow Integrity using Multi-Variant executi...
收藏 引用
2020 International Conference on Internet computing for Science and engineering, ICICSE 2020 and the 13th International Conference on advanced Computer Theory and engineering, ICACTE 2020
作者: Yao, Dong Zhang, Zheng Zhang, Gaofei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum  6
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Chang, Xiangyang Zhu, Junhu Zhao, Shibin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论