咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 756 篇 期刊文献

馆藏范围

  • 1,561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,001 篇 工学
    • 621 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 148 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 98 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 51 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 739 篇 理学
    • 420 篇 物理学
    • 251 篇 数学
    • 94 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,490 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1561 条 记 录,以下是1521-1530 订阅
排序:
Convergence and Scalarization in Whole Function Vectorization
Convergence and Scalarization in Whole Function Vectorizatio...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Feng Yue Jianmin Pang Jiuzhen Jin Dai Chao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
When implementing SPMD programs on multi core platforms, whole function vectorization is an important optimization method. SPMD program has drawback that lots of instructions across multi threads are redundant which i... 详细信息
来源: 评论
The Speedup Model for Manycore Processor
The Speedup Model for Manycore Processor
收藏 引用
International Conference on Information Science and Cloud computing Companion (ISCC-C)
作者: Nan Ye Ziyu Hao Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Integrating a large number of simple cores on the chip to provide the desired performance and throughput, microprocessor has entered the many core era. In order to fully extract the ability of the many core processor,... 详细信息
来源: 评论
Data recovery of user-defined procedures in binary translation
Data recovery of user-defined procedures in binary translati...
收藏 引用
International Conference on BioMedical engineering and Informatics (BMEI)
作者: Xiaonan Liu Rongcai Zhao Jianmin Pang Meijuan Yin Zhenfang Wei State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on sh... 详细信息
来源: 评论
One Wide-Sense Circuit Tree per Traffic Class Based Inter-domain Multicast
One Wide-Sense Circuit Tree per Traffic Class Based Inter-do...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Chen Yue Li Chaoling Huang Kaixiang Zhang Xiaobo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
Steganalysis of F5-like steganography based on selection of joint distribution features  13
Steganalysis of F5-like steganography based on selection of ...
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Liu, Yuan Luo, Xiangyang Lu, Jicang Gong, Daofu Zhengzhou Information Science and Technology Institute Zhengzhou 450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas... 详细信息
来源: 评论
The Research on Cryptographic Algorithms Recognition Technology
The Research on Cryptographic Algorithms Recognition Technol...
收藏 引用
International Conference on Intelligent System Design and engineering Application (ISDEA)
作者: Rui Chang Liehui Jiang Hui Shu Yaobin Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou Henan China
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of... 详细信息
来源: 评论
A flag simulation strategy based on fusion of semantic trees in binary translation
A flag simulation strategy based on fusion of semantic trees...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Xiaonan Liu Rongcai Zhao Jianmin Pang Meijuan Yin Lili Bai Wuping Chen State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China Science and Technology on Information Assurance Laboratory Beijing China
Binary translation is the emulation of one instruction set by another through translation of code. Sequences of instructions are translated from the source to the target instruction set. The semantic equivalence conve... 详细信息
来源: 评论
An improved affinity propagation clustering algorithm for large-scale data sets
An improved affinity propagation clustering algorithm for la...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Xiaonan Liu Meijuan Yin Junyong Luo Wuping Chen State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China Science and Technology on Information Assurance Laboratory Beijing China
Affinity Propagation (AP) clustering does not need to set the number of clusters, and has advantages on efficiency and accuracy, but is not suitable for large-scale data clustering. To ensure both a low time complexit... 详细信息
来源: 评论
Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction
Network backbone anomaly detection using double random fores...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Meijuan Yin Dong Yao Junyong Luo Xiaonan Liu Jing Ma State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China Science and Technology on Information Assurance Laboratory Beijing China
This paper proposed an anomaly detection method that can be used in high speed network backbone. To adapt for the need of online cost-sensitive data processing, some of the attributes are extracted from the header of ... 详细信息
来源: 评论
Fixing the sender-equivocable encryption scheme in eurocrypt 2010
Fixing the sender-equivocable encryption scheme in eurocrypt...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Huang, Zhengan Liu, Shengli Qin, Baodong Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China College of Computer Science and Technology Southwest University of Science and Technology Mianyang China School of Science Hangzhou Normal University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon... 详细信息
来源: 评论