咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 152 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 421 篇 物理学
    • 252 篇 数学
    • 95 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,488 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1581 条 记 录,以下是1061-1070 订阅
排序:
Impact of temperature and relative humidity on the transmission of COVID-19: A modeling study in China and the United states
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jingyuan Tang, Ke Feng, Kai Lin, Xin Lv, Weifeng Chen, Kun Wang, Fei School of Computer Science and Engineering Beihang University China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University China School of Social Sciences Tsinghua University China State Key Laboratory of Software Development Environment Beihang University China Department of Statistics University of Connecticut United States Center for Population Health University of Connecticut Health Center United States Department of Population Health Sciences Weill Cornell Medical College Cornell University United States
Objectives We aim to assess the impact of temperature and relative humidity on the transmission of COVID-19 across communities after accounting for community-level factors such as demographics, socioeconomic status, a... 详细信息
来源: 评论
An anti-side-channel virtual CPU scheduling algorithm based on leakage evaluation for virtual machine security  7
An anti-side-channel virtual CPU scheduling algorithm based ...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Du, Yuanzhi Du, Xuehui Yang, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but... 详细信息
来源: 评论
A Gene-Inspired Malware Detection Approach
收藏 引用
Journal of Physics: Conference Series 2019年 第6期1168卷
作者: Yihang Chen Zheng Shan Fudong Liu Guanghui Liang Binglin Zhao Xingwei Li Meng Qiao State Key of Laboratory of Mathematical Engineering and Advanced Computing 450001 Zhengzhou Henan China
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and pro...
来源: 评论
A Parallel Probabilistic Approach to Factorize a Semiprime
收藏 引用
American Journal of Computational Mathematics 2018年 第2期8卷 175-183页
作者: Jianhui Li Department of Computer Science Guangdong Neusoft Institute Foshan City Foshan China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic... 详细信息
来源: 评论
ChanDet: Detection Model for Potential Channel of iOS Applications
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: GuoMiao Zhou Ming Duan Qi Xi Hao Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking tool, which allows them to do more un...
来源: 评论
Intelligent identification of two-dimensional nanostructures by machine-learning optical microscopy
收藏 引用
Nano Research 2018年 第12期11卷 6316-6324页
作者: Xiaoyang Lin Zhizhong Si Wenzhi Fu Jianlei Yang Side Guo Yuan Cao Jin Zhang Xinhe Wang Peng Liu Kaili Jiang Weisheng Zhao Fert Beijing Research Institute School ofMicroelectronics & Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC)Beihang UniversityBeijing 100191China Beihang-GoertekJoint Microelectronics Institute Qingdao Research InstituteBeihang UniversityQingdao 266000China Fert Beijing Research Institute School of Computer Science and Engineering & Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC)Beihang UniversityBeijing 100191China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics & Tsinghua-Foxconn Nanotechnology Research CenterCollaborative Innovation Center of Quantum MatterTsinghua UniversityBeijing 100084China
Two-dimensional (2D) materials and their heterostructures, with wafer-scale synthesis methods and fascinating properties, have attracted significant interest and triggered revolutions in corresponding device applicati... 详细信息
来源: 评论
Simulation of Passenger Evacuation of High-speed Train Cars
Simulation of Passenger Evacuation of High-speed Train Cars
收藏 引用
Fire Science and Fire Protection engineering (ICFSFPE), Conference on
作者: Shenshi Huang Ruichao Wei Kai Shi Jinxing Hu Shouxiang Lu Liping Lian Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Science Shenzhen China Institute of Advanced Materials Science and Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Science Shenzhen China The Smart City Research Institute of China Electronics Technology Group Corporation Shenzhen China State Key Laboratory of Fire Science University of Science and Technology of China Hefei China School of Urban Planning and Design Peking University Shenzhen China
This study is to evaluate the passenger evacuation of the high-speed train. Geometry was built up based on current Chinese train type CRH380B, and scenarios were designed according to the current emergency response pl... 详细信息
来源: 评论
Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code  17
Path Sensitive Static Analysis of Taint-Style Vulnerabilitie...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Xue-Xiong Yan Qing-Xian Wang Heng-Tai Ma Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th... 详细信息
来源: 评论
HTTP Tunnel Trojan Detection Model Based on Deep Learning
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: Yubo He Yuefei Zhu Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Aiming at reducing the high False Negative rate of the existing Trojan horse detection method based on behavior, this paper utilized the sequence characteristics of tunnel Trojan communication extracted from the trans...
来源: 评论
Photocurrent imaging of multi-memristive charge density wave switching in two-dimensional 1T-TaS2
arXiv
收藏 引用
arXiv 2020年
作者: Patel, Tarun Okamoto, Junichi Dekker, Tina Yang, Bowen Gao, Jingjing Luo, Xuan Lu, Wenjian Sun, Yuping Tsen, Adam W. Institute for Quantum Computing Department of Physics and Astronomy Department of Electrical and Computer Engineering Department of Chemistry University of Waterloo WaterlooONN2L 3G1 Canada Institute of Physics University of Freiburg FreiburgD-79104 Germany Key Laboratory of Materials Physics Institute of Solid State Physics Chinese Academy of Sciences Hefei230031 China University of Science and Technology of China Hefei230026 China High Magnetic Field Laboratory Chinese Academy of Sciences Hefei230031 China Collaborative Innovation Centre of Advanced Microstructures Nanjing University Nanjing210093 China
Transport studies of atomically thin 1T-TaS2 have demonstrated the presence of intermediate resistance states across the nearly commensurate (NC) to commensurate (C) charge density wave (CDW) transition, which can be ... 详细信息
来源: 评论