咨询与建议

限定检索结果

文献类型

  • 1,112 篇 期刊文献
  • 889 篇 会议
  • 1 册 图书

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 709 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 181 篇 信息与通信工程
    • 180 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 128 篇 控制科学与工程
    • 124 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 96 篇 生物工程
    • 92 篇 光学工程
    • 81 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 51 篇 生物医学工程(可授...
    • 45 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,023 篇 理学
    • 555 篇 物理学
    • 384 篇 数学
    • 121 篇 化学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 81 篇 地球物理学
    • 60 篇 系统科学
  • 223 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 software
  • 24 篇 cryptography
  • 20 篇 malware
  • 19 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 625 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,743 篇 英文
  • 218 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
2002 条 记 录,以下是371-380 订阅
排序:
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud  7th
Security-as-a-Service with Cyberspace Mimic Defense Technolo...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Wang, Junchao Pang, Jianmin Wei, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools automating the application-level requirements to infrastructure provisioning ... 详细信息
来源: 评论
Attention-aligned mean-teacher learning for unsupervised domain adaptive person re-ID
收藏 引用
Science China Technological Sciences 2025年
作者: You LYU Zhen ZHANG Guoliang KANG Wei WEI Institute of Artificial Intelligence Beihang University Key Laboratory of Mathematics Informatics Behavioral Semantics Ministry of Education Beihang University State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University School of Automation Science and Electrical Engineering Beihang University AVICAS Generic Technology Co. Ltd Zhongguancun Laboratory School of Mathematics Sciences Beihang University
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve imag...
来源: 评论
DQPS: An Intelligent Multi-Hop Computation Offloading Scheme for Workflow Applications in Vehicular Edge computing Networks
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 2202-2216页
作者: Lin, Bing Chen, Qiaoxin Chen, Xing Jia, Wen-Kang Lu, Yu Xiong, Neal N. Fujian Normal University College of Physics and Energy Fujian Provincial Key Laboratory of Quantum Manipulation and New Energy Materials Fuzhou350117 China Fujian Provincial Collaborative Innovation Center for Advanced High-Field Superconducting Materials and Engineering Fuzhou350117 China Peking University School of Computer Science 100871 China Xiamen University Department of Informatics and Communication Engineering Xiamen361005 China Fuzhou University College of Computer and Data Science Fuzhou350118 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350118 China Fujian Normal University College of Photonic and Electronic Engineering Fuzhou350117 China Fujian Normal University Concord University College Fuzhou350117 China Sul Ross State University Department of Computer Mathematical and Physical Sciences AlpineTX79830 United States
Vehicular Edge computing (VEC) is a feasible solution for autonomous driving as it can offload latency-sensitive and computation-intensive tasks from vehicle terminals to roadside units (RSUs) for real-time processing... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zhaorui Ma Shicheng Zhang Yiheng Chang Qinglei Zhou Xinhao Hu Xia Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
Street-Level IP Geolocation Algorithm Based on Landmarks Clustering
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 3345-3361页
作者: Fan Zhang Fenlin Liu Rui Xu Xiangyang Luo Shichang Ding Hechan Tian PLA Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Cyberspace Security Key Laboratory of Sichuan Province Chengdu610000China China Electronic Technology Cyber Security Co. Ltd.Chengdu610000China University of Goettingen Goettingen37075Germany
Existing IP geolocation algorithms based on delay similarity often rely on the principle that geographically adjacent IPs have similar ***,this principle is often invalid in real Internet environment,which leads to un... 详细信息
来源: 评论
Analysis of Instantaneous Angular Speed Accuracy Considering Encoder Errors
Analysis of Instantaneous Angular Speed Accuracy Considering...
收藏 引用
International Conference on Automation and computing (ICAC)
作者: Yuanhao Liu Fengshou Gu Qiang Zeng State Key Laboratory of Mechanical Transmissions for Advanced Equipment Chongqing University Chongqing China School of Computing and Engineering University of Huddersfield Huddersfield UK
Instantaneous Angular Speed (IAS) is closely related to the dynamic behavior of rotating machinery and plays a crucial role in diagnosing faults. However, the measurement of the IAS is subject to various errors inevit... 详细信息
来源: 评论
Self-Dual Hadamard Bent Sequences
收藏 引用
Journal of Systems Science & Complexity 2023年 第2期36卷 894-908页
作者: SHI Minjia LI Yaya CHENG Wei CRNKOVIC Dean KROTOV Denis SOLéPatrick Key Laboratory of Intelligent Computing Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security(Institute of Information Engineering) Chinese Academy of SciencesBeijing 100093China. LTCI Télécom ParisParis91120 PalaiseauFrance Secure-IC S.A.S. 104 Bd du Montparnasse75014 Paris Faculty of Mathematics University of RijekaNovosibirsk 630090Russia Sobolev Institute of Mathematics Novosibirsk 630090Russia Aix Marseille Univ CNRSCentrale MarseilleI2MMarseilleFrance
A new notion of bent sequence related to Hadamard matrices was introduced recently,motivated by a security application(Solé,et al.,2021).The authors study the self-dual class in length at most *** authors use thr... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论