咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 1,580 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,014 篇 工学
    • 625 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 151 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 742 篇 理学
    • 421 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1580 条 记 录,以下是731-740 订阅
排序:
Implementation of Hodgkin-Huxley Spiking Neuron Model Using FPGA  19
Implementation of Hodgkin-Huxley Spiking Neuron Model Using ...
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Yi, Zexuan Fu, Wenlong Cao, Lihong Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
For the study of new computer architecture inspired by brain, implementing neuron function on hardware has become an emerging research direction. To study the feasibility of biological neuron implementation and accele... 详细信息
来源: 评论
Malware homology identification based on a gene perspective
收藏 引用
Frontiers of Information Technology & Electronic engineering 2019年 第6期20卷 801-815页
作者: Bing-lin ZHAO Zheng SHAN Fu-dong LIU Bo ZHAO Yi-hang CHEN Wen-jie SUN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Georg-August-University of Goettingen Goettingen 37077 Germany
Malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis,... 详细信息
来源: 评论
Representation Learning on Networks for Community Detection
Representation Learning on Networks for Community Detection
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Jingya Zhou Jianxi Fan Jin Wang Baolei Cheng School of Computer Science and Technology Soochow University Suzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Community detection is a fundamental problem in network analysis. In recent years, network representation learning has been leveraged to help the detection of potential communities. However, representation learning an... 详细信息
来源: 评论
A Self-Powered Nanogenerator for the Electrical Protection of Integrated Circuits from Trace Amounts of Liquid
收藏 引用
Nano-Micro Letters 2020年 第1期12卷 54-62页
作者: Zhuang Hui Ming Xiao Daozhi Shen Jiayun Feng Peng Peng Yangai Liu Walter WDuley YNorman Zhou Beijing Key Laboratory of Materials Utilization of Nonmetallic Minerals and Solid Wastes National Laboratory of Mineral MaterialsSchool of Materials Science and TechnologyChina University of GeosciencesBeijing 100083People’s Republic of China Department of Mechanics and Mechatronics Engineering Centre for Advanced Materials JoiningUniversity of WaterlooWaterlooON N2L 3G1Canada School of Mechanical Engineering and Automation Beihang UniversityBeijing 100191People’s Republic of China Waterloo Institute of Nanotechnology University of WaterlooWaterlooON N2L 3G1Canada Institute for Quantum Computing University of WaterlooWaterlooON N2L 3G1Canada State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyHarbin 150001People’s Republic of China Department of Physics and Astronomy University of WaterlooWaterlooON N2L 3G1Canada
With the increase in the use of electronic devices in many different environments,a need has arisen for an easily implemented method for the rapid,sensitive detection of liquids in the vicinity of electronic *** this ... 详细信息
来源: 评论
Multi-Variant eXecution: state-of-the-Art and Research Challenges
Multi-Variant eXecution: State-of-the-Art and Research Chall...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Gaofei Zhang Zheng Zhang Bolin Ma Jiang Wang State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering & Technological R&D Center Zhengzhou China
As Internet security issues are becoming increasingly serious, many scholars and experts are exploring new defense strategies. The availability of multi-core computers and cloud computing resources has brought back th...
来源: 评论
Street-Level Landmarks Acquisition Based on SVM Classifiers
收藏 引用
Computers, Materials & Continua 2019年 第5期59卷 591-606页
作者: Ruixiang Li Yingying Liu Yaqiong Qiao Te Ma Bo Wang Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China Henan Institute of Animal Husbandry Economics Zhengzhou450044China State University of New York at Buffalo New York14260-1660United States
High-density street-level reliable landmarks are one of the important foundations for street-level ***,the existing methods cannot obtain enough street-level landmarks in a short period of *** this paper,a street-leve... 详细信息
来源: 评论
Revisiting Test Cases to Boost Generate-and-Validate Program Repair
Revisiting Test Cases to Boost Generate-and-Validate Program...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Jingtang Zhang Kui Liu Dongsun Kim Li Li Zhe Liu Jacques Klein Tegawendé F. Bissyandé Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software (Nanjing University of Aeronautics and Astronautics) Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Kyungpook National University Daegu South Korea Monash University Melbourne Australia Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
Fault localization produces bug positions as the basic input for many automated program repair (APR) systems. Given that test cases are the common means that automatic fault localization techniques leverage, we invest...
来源: 评论
Malicious Code Detection Technology Based on A3C Algorithm
Malicious Code Detection Technology Based on A3C Algorithm
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Yi Xue Hui Shu Wenjuan Bu Wu Qu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Beijing Venustech Cybervision Co. Ltd. China Beijing China
In the face of the explosive growth of malicious code, this paper proposes a malicious code detection technology based on the A3C algorithm. The technology constructs a malicious code anti-detection adversarial model ... 详细信息
来源: 评论
BTI Aging Monitoring based on SRAM Start-up Behavior
BTI Aging Monitoring based on SRAM Start-up Behavior
收藏 引用
Asian Test Symposium (ATS)
作者: Shengyu Duan Peng Wang Gaole Sai School of Computer Engineering and Science Shanghai University Shanghai China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Bias Temperature Instability (BTI) is one of the dominant CMOS aging mechanisms. It causes time-dependent variation, threatening circuit lifetime reliability. BTI-induced circuit errors are not detectable at the fabri... 详细信息
来源: 评论
A Regional Network Topology Construction Algorithm Based On Sampling Measurement
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1861卷
作者: Zhiyuan Tao Yan Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ...
来源: 评论