咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是401-410 订阅
排序:
Estimating Multiple Socioeconomic Attributes via Home Location-A Case Study in China
收藏 引用
Journal of Social computing 2021年 第1期2卷 71-88页
作者: Shichang Ding Xin Gao Yufan Dong Yiwei Tong Xiaoming Fu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 276800China Department of Sociology Tsinghua UniversityBeijing 100085China Institute of Computer Science University of GottingenGottingen 37077Germany Shanghai Hejin Information Technology Company Shanghai 200100China
Inferring people’s Socioeconomic Attributes(SEAs),including income,occupation,and education level,is an important problem for both social sciences and many networked applications like targeted advertising and persona... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger Technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论
Molecular Dynamics Study of the Effect of Substrate Temperature on the Barrier Behavior in Aluminum Oxide Josephson Junctions
SSRN
收藏 引用
SSRN 2022年
作者: Han, Chuanbing Sun, Huihui Hou, Chaofeng Qiu, Junling Wang, Weilong Liu, Fudong Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Institute of Process Engineering Chinese Academy of Sciences Beijing100190 China
Although the quality and reliability of Josephson junctions have improved considerably, the effect of preparation parameters on the structure and nanochemical properties of the barrier layer remains elusive. Here, we ... 详细信息
来源: 评论
Implementing a modified Smith predictor using chemical reaction networks and its application to protein translation  4
Implementing a modified Smith predictor using chemical react...
收藏 引用
4th International Conference on Industrial Artificial Intelligence, IAI 2022
作者: Xiao, Yijun Lv, Hui Wang, Xing'an School of Software Engineering Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Liaoning Dalian116622 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Liaoning Shenyang110004 China College of Environmental and Chemical Engineering Dalian University Liaoning Dalian116622 China Dalian Chivy Biotechnology Co. Ltd Liaoning Dalian116622 China
In this article, a special attention is paid to the biochemical controller synthesis for time delay systems and try to implement the well-established Smith predictor approach in the context of biochemical systems. The... 详细信息
来源: 评论
Auto-MatRegressor材料性能自动预测器:解放材料机器学习"调参师"
收藏 引用
Science Bulletin 2023年 第12期68卷 1259-1270,M0004页
作者: 刘悦 王双燕 杨正伟 Maxim Avdeev 施思齐 School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel School of Materials Science and EngineeringShanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Zhejiang Laboratory Hangzhou 311100China Australian Nuclear Science and Technology Organisation Sydney 2232Australia School of Chemistry The University of SydneySydney 2006Australia
机器学习因其能够快速、精准拟合数据的潜在模式而被广泛应用于材料构效关系研究。然而,材料科学家往往需要进行繁琐的模型选择及参数寻优才能构建出高精度预测模型,为了解放材料机器学习"调参师",本文研发了基于元学习的材... 详细信息
来源: 评论
The Propagation Strategy Model of Taint Analysis  4
The Propagation Strategy Model of Taint Analysis
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Ren, Yuzhu Zhao, Jiangtao Zhang, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Network to Learn High-Order Social Relations for Diffusion Prediction
MC-RGCN: A Multi-Channel Recurrent Graph Convolutional Netwo...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ningbo Huang Gang Zhou Mengli Zhang Meng Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Information diffusion prediction aims to predict the tendency of information spreading in the network. Previous methods focus on extracting chronological features from diffusion paths and leverage relations in social ... 详细信息
来源: 评论
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph
ZeroDVS: Trace-Ability and Security Detection of Container I...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Yan Zheng Weiyu Dong Jiangtao Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Docker image is the foundation for container operation. Docker Hub is the largest online repository of public container images. Users can upload and download any random image file to the hub due to the absence of adeq... 详细信息
来源: 评论
Mathematical modeling of lunar soft landing —Take chang'e-3 as an example
Mathematical modeling of lunar soft landing —Take chang'e-3...
收藏 引用
IEEE International Conference on Automation, Electronics and Electrical engineering (AUTEEE)
作者: Benchao Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论