咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是1231-1240 订阅
排序:
An effective usage and access control scheme for preventing permission leak in a trusted execution environment  16
An effective usage and access control scheme for preventing ...
收藏 引用
6th International Conference on Communication and Network Security, ICCNS 2016
作者: Chang, Rui Jiang, Liehui Yin, Qing Ren, Lu Liu, Qingfeng State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou450001 China China National Digital Switching System Engineering Technological Research Center Zhengzhou450001 China
In the universal Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when... 详细信息
来源: 评论
Static Detection of Execution After Redirect Vulnerabilities in PHP Applications
Static Detection of Execution After Redirect Vulnerabilities...
收藏 引用
2016 IEEE 7th International Conference on Software engineering and Service Science
作者: Chuansen Chai Xuexiong Yan Qingxian Wang Shukai Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
In recent years,modern web applications are becoming more and more complex and it makes difficult for developers to audit the *** number of attacks against these applications has increased *** detection techniques for... 详细信息
来源: 评论
Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
收藏 引用
Communications in Theoretical Physics 2015年 第3期63卷 296-302页
作者: 王卫龙 高明 马智 State Key Laboratory of Mathematical Engineering and Advanced Computing
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol... 详细信息
来源: 评论
Floating Point Optimization Based on Binary Translation System QEMU
Floating Point Optimization Based on Binary Translation Syst...
收藏 引用
2016 2nd Workshop on advanced Research and Technology in Industry Applications(WARTIA 2016)
作者: Qiang Shi Rongcai Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the ef... 详细信息
来源: 评论
A Brief Survey of Specification Inference in Static Program Analysis
A Brief Survey of Specification Inference in Static Program ...
收藏 引用
2016 2nd International Conference on Advances in Mechanical engineering and Industrial Informatics(AMEII 2016)
作者: Chuansen Chai Xuexiong Yan Qingxian Wang Shukai Liu Yajing Sun Shuai Yi State Key Laboratory of Mathematical Engineering and Advanced Computing
Nowadays,many applications are too big to keep their own *** analysis is a technique which can be used for ensure the safety of large ***,frequent calls to libraries and frameworks bring a lot of difficulties to the *... 详细信息
来源: 评论
Video behavior recognition based on locally compressive sensing
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2018年 第6期58卷 581-586页
作者: Wang, Wenfeng Chen, Xi Wang, Haiyang Peng, Wei Qian, Jing Zheng, Hongwei State Key Laboratory of Desert and Oasis Ecology Xinjiang Institute of Ecology and Geography Chinese Academy of Sciences Urumqi830011 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China School of Information Science and Engineering Xiamen University Xiamen361005 China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
Compressive sensing has been successfully applied in the field of target tracking but not for behavior recognition. This paper presents a locally compressive sensing algorithm for behavior analysis which combines comp... 详细信息
来源: 评论
Cooperative computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture
收藏 引用
Journal of Computer Science & Technology 2015年 第1期30卷 145-162页
作者: 郑方 李宏亮 吕晖 过锋 许晓红 谢向辉 State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h... 详细信息
来源: 评论
Rapid detection of stego images based on identifiable features  18
Rapid detection of stego images based on identifiable featur...
收藏 引用
18th International Conference on advanced Communications Technology, ICACT 2016
作者: Pang, Weiwei Luo, Xiangyang Ren, Jie Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Zhengzhou Science and Technology Institute Zhengzhou450001 China Science and Technology on Information Assurance Laboratory Beijing100072 China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden... 详细信息
来源: 评论
Formalization of the Access Control on ARM-Android Platform with the B Method
收藏 引用
Journal of Physics: Conference Series 2017年 第1期933卷
作者: Lu Ren Wei Wang Xiaodong Zhu Yujia Man Qing Yin State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China 450001
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous en...
来源: 评论
Joint product numerical range and geometry of reduced density matrices
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2017年 第2期60卷 9-17页
作者: Jianxin Chen Cheng Guo Zhengfeng Ji Yiu-Tung Poon Nengkun YU Bei Zeng Jie Zhou Joint Center for Quantum Information and Computer Science University of Maryland College Park 20740 USA Institute for Advanced Study Tsinghua University Beijing 100084 China Centre for Quantum Computation & Intelligent Systems School of Software Faculty of Engineering and Information Technology University of Technology Sydney Sydney 2007 Australia State Key Laboratory of Computer Science.Institute of Software Chinese Academy of Sciences Beijing 100084 China Department of Mathematics Iowa State University Ames 50011-2140 USA Institute for Quantum Computing University of Waterloo Waterloo N2L 3G1 Canada Department of Mathematics & Statistics University of Guelph Guelph N1G 2 W1 Canada Perimeter Institute for Theoretical Physics Waterloo N2L 2Y5 Canada
The reduced density matrices of a many-body quantum system form a convex set, whose three-dimensional projection is convex in R3. The boundary of may exhibit nontrivial geometry, in particular ruled surfaces. T... 详细信息
来源: 评论