咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是1341-1350 订阅
排序:
Cloud resource scheduling method based on estimation of distirbution shuffled frog leaping algorithm  3
Cloud resource scheduling method based on estimation of dist...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Niu, Kan Wang, Jin-Dong Zhang, Heng-Wei Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the leas... 详细信息
来源: 评论
Research for modeling network security based on attack-defense grapy of state reduction  3
Research for modeling network security based on attack-defen...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Li, Tao Zhang, Hengwei Wang, Jindong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of... 详细信息
来源: 评论
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
Business process mining based insider threat detection system
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 37卷 180-188页
作者: Zhu, Tai-Ming Guo, Yuan-Bo Ju, An-Kang Ma, Jun School of Cyberspace Security PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internal staff may bring greater harm to organizations in information security. Traditional insider threat detection met... 详细信息
来源: 评论
Pressure-induced Superconductivity in the three-component fermion topological semimetal molybdenum phosphide
arXiv
收藏 引用
arXiv 2017年
作者: Chi, Zhenhua Chen, Xuliang An, Chao Yang, Liuxiang Zhao, Jinggeng Feng, Zili Zhou, Yonghui Zhou, Ying Gu, Chuanchuan Zhang, Bowen Yuan, Yifang Kenney-Benson, Curtis Yang, Wenge Wu, Gang Wan, Xiangang Shi, Youguo Yang, Xiaoping Yang, Zhaorong Key Laboratory of Materials Physics Institute of Solid State Physics Chinese Academy of Sciences Hefei230031 China Anhui Province Key Laboratory of Condensed Matter Physics at Extreme Conditions High Magnetic Field Laboratory Chinese Academy of Sciences Hefei230031 China University of Science and Technology of China Hefei230026 China Beijing100094 China Department of Physics Harbin Institute of Technology Harbin150080 China Natural Science Research Center Academy of Fundamental and Interdisciplinary Sciences Harbin Institute of Technology Harbin150080 China Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing100190 China School of Physical Sciences University of Chinese Academy of Sciences Beijing100190 China Department of Physics and Engineering Zhengzhou University Zhengzhou450052 China HPCAT Geophysical Laboratory Carnegie Institution of Washington ArgonneIL60439 United States Shanghai201203 China Institute of High Performance Computing 1 Fusionopolis Way 16-16 Connexis Singapore138632 Singapore National Laboratory of Solid State Microstructures College of Physics Nanjing University Nanjing210093 China Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China
Topological semimetal, a novel state of quantum matter hosting exotic emergent quantum phenomena dictated by the non-trivial band topology, has emerged as a new frontier in condensed-matter physics. Very recently, a c... 详细信息
来源: 评论
Junk code elimination based on idle object set
Junk code elimination based on idle object set
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Wei Lin Jin-long Fei Rui-jie Cai State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
来源: 评论
High performance porous iron oxide-carbon nanotube nanocomposite as an anode material for lithium-ion batteries
收藏 引用
Electrochimica Acta 2016年 212卷 179-186页
作者: Qian Lin Jie Wang Yijun Zhong Jaka Sunarso Moses O. Tadé Li Li Zongping Shao Jiangsu National Synergetic Innovation Center for Advanced Materials (SICAM) State Key Laboratory of Materials-Oriented Chemical Engineering College of Chemical Engineering Nanjing Tech University No.5 Xin Mofan Road Nanjing 210009 PR China College of Chemical Engineering Nanjing Forestry University Nanjing 210037 PR China Faculty of Engineering Computing and Science Swinburne University of Technology Jalan Simpang Tiga 93350 Kuching Sarawak Malaysia Department of Chemical Engineering Curtin University Perth WA 6845 Australia Jiangsu National Synergetic Innovation Center for Advanced Materials (SICAM) State Key Laboratory of Materials-Oriented Chemical Engineering College of Energy Nanjing Tech University No.5 Xin Mofan Road Nanjing 210009 PR China
Here, we showed that relatively high content of Fe 3 O 4 nanoparticles (up to 83   wt. %) can be homogeneously dispersed into carbon nanotubes (CNTs) conductive networks using non-aqueous media by refluxing metho... 详细信息
来源: 评论
FPGA-Based Parallel Implementation of SURF Algorithm
FPGA-Based Parallel Implementation of SURF Algorithm
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Wenjie Chen Shuaishuai Ding Zhilei Chai Daojing He Weihua Zhang Guanhua Zhang Qiwei Peng Wang Luo MoE Engineering Research Center for Software/Hardware Co-design Technology and Application East China Normal University Shanghai China School of loT Engineering Jiangnan University Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Parallel Processing Institute Fudan University Shanghai China
SURF (Speeded up robust features) detection is used extensively in object detection, tracking and matching. However, due to its high complexity, it is usually a challenge to perform such detection in real time on a ge... 详细信息
来源: 评论
A novel genetic algorithm for constructing uniform test forms of cognitive diagnostic models
A novel genetic algorithm for constructing uniform test form...
收藏 引用
Congress on Evolutionary Computation
作者: Ye-shi Jiang Ying Lin Jing-Jing Li Zheng-jia Dai Jun Zhang Xinglin Zhang Ministry of Education Key Laboratory of Machine Intelligence - & Sensor Networks P.R. China School of Data & Computer Science Sun Yat-sen University School of Computer Science South China Normal University Department of Psychology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing School of Comouter Science & Engineering South China University of Technology
Cognitive diagnostic models (CDMs) are a new class of test models developed for educational assessment. They have gained growing attention in recent years for their distinctive ability to provide detailed feedback abo... 详细信息
来源: 评论
An SIMD Code Generation Technology for Indirect Array
An SIMD Code Generation Technology for Indirect Array
收藏 引用
2015 7th International Conference on Computer Research and Development (ICCRD 2015)
作者: Peng-yuan Li Rong-cai Zhao Qing-hua Zhang Lin Han State Key Laboratory of Mathematical Engineering and Advanced Computing
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, ... 详细信息
来源: 评论