咨询与建议

限定检索结果

文献类型

  • 59 篇 会议
  • 28 篇 期刊文献

馆藏范围

  • 87 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 36 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 机械工程
    • 3 篇 生物工程
    • 2 篇 电气工程
    • 2 篇 建筑学
    • 2 篇 环境科学与工程(可...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 矿业工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 21 篇 理学
    • 7 篇 数学
    • 7 篇 物理学
    • 5 篇 生物学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 5 篇 computational mo...
  • 4 篇 computer archite...
  • 4 篇 algorithm design...
  • 4 篇 pipelines
  • 4 篇 engines
  • 3 篇 parallel process...
  • 3 篇 neural networks
  • 3 篇 resource managem...
  • 3 篇 benchmark testin...
  • 3 篇 feature extracti...
  • 3 篇 degradation
  • 3 篇 hardware
  • 3 篇 field programmab...
  • 3 篇 training
  • 2 篇 conferences
  • 2 篇 neurons
  • 2 篇 deep learning
  • 2 篇 nonlinear optics
  • 2 篇 computation offl...
  • 2 篇 performance opti...

机构

  • 71 篇 state key labora...
  • 8 篇 neuroscience and...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 nanjing universi...
  • 3 篇 parallel process...
  • 2 篇 state key labora...
  • 2 篇 state key lab of...
  • 2 篇 state key labora...
  • 2 篇 science and tech...
  • 2 篇 state key labora...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 pla strategic su...
  • 2 篇 interdisciplinar...

作者

  • 4 篇 depei qian
  • 4 篇 cao lihong
  • 4 篇 xianghui xie
  • 4 篇 zhongzhi luan
  • 4 篇 hailong yang
  • 3 篇 yang hailong
  • 3 篇 weihua zhang
  • 3 篇 xie xianghui
  • 3 篇 fu wenlong
  • 3 篇 zhilei chai
  • 3 篇 da wang
  • 3 篇 zheng fang
  • 3 篇 tegawendé f. bis...
  • 3 篇 dong wu
  • 3 篇 kui liu
  • 2 篇 lin gan
  • 2 篇 zhou jingya
  • 2 篇 gan shuitao
  • 2 篇 jingya zhou
  • 2 篇 li li

语言

  • 81 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing WuXi"
87 条 记 录,以下是51-60 订阅
Intra-pulse Intentional Modulation Recognition of Radar Signals at Low SNR  2
Intra-pulse Intentional Modulation Recognition of Radar Sign...
收藏 引用
2nd IEEE International Conference on Circuits, System and Simulation, ICCSS 2018
作者: Xi, Tian Yishan, Liu Xianyue, Pan Wentao, Chen College of Electronic Science and Engineering National University of Defense Technology Changsha China State Key Laboratory of Mathemsatical Engineering and Advanced Computing Wuxi China
Intra-pulse features extraction of radar is of great research significance in electronic reconnaissance technology. With continuous development and equipment of the new system radar, the characteristics of the modern ... 详细信息
来源: 评论
Block Ciphers Classification Based on Random Forest
收藏 引用
Journal of Physics: Conference Series 2019年 第3期1168卷 032015-032015页
作者: Hu, Xinyi Zhao, Yaqun State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China State Key Laboratory of Cryptography and Science China
Discriminant analysis is an important analytical method in cryptanalysis. When only known ciphertext, the encryption algorithm for identifying and classifying is an important part of distinguishing analysis. In this p...
来源: 评论
Active Defense Technology Based on Natural Software Diversity in Java Web Services
收藏 引用
Journal of Physics: Conference Series 2020年 第3期1550卷
作者: Zhenwu Liu Zheng Zhang Hao Liu Gaofei Zhang Yuan Chen State key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou HeNan 450001 China PLA Strategic Support Force Information Engineering University ZhengZhou HeNan 450001 China Jiangnan Institute of Computing Technology WuXi JiangSu 214083 China
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unkno...
来源: 评论
swTVM: Towards Optimized Tensor Code Generation for Deep Learning on Sunway Many-Core Processor
arXiv
收藏 引用
arXiv 2019年
作者: Li, Mingzhen Liu, Changxi Liao, Jianjin Zheng, Xuegui Yang, Hailong Sun, Rujun Xu, Jun Gan, Lin Yang, Guangwen Luan, Zhongzhi Qian, Depei School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment Beijing China National University of Singapore Singapore Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application portability. Among t... 详细信息
来源: 评论
A Parallel Probabilistic Approach to Factorize a Semiprime
收藏 引用
American Journal of Computational Mathematics 2018年 第2期8卷 175-183页
作者: Jianhui Li Department of Computer Science Guangdong Neusoft Institute Foshan City Foshan China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic... 详细信息
来源: 评论
Some Inequalities on <i>T<sub>3</sub></i>Tree
收藏 引用
Advances in Pure Mathematics 2018年 第8期8卷 711-719页
作者: Xingbo Wang Department of Mechatronic Engineering Foshan University Foshan China Guangdong Engineering Center of Information Security for Intelligent Manufacturing System Foshan China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The article proves several inequalities derived from nodal multiplication on T3 tree. The proved inequalities are helpful to estimate certain quantities related with the T3 tree as well as examples of proving an inequ... 详细信息
来源: 评论
Biological data processing based on bio-processor unit(BPU), a new concept for next generation computational biology
收藏 引用
Science China(Life Sciences) 2018年 第5期61卷 597-598页
作者: Di Liu Dongbo Bu Tieliu Shi Jianxiao Quan Depeng Wang Yongyong Shi Xiao-Chen Bo Wenbao Han Computational Virology Group Wuhan Institute of Virology Chinese Academy of Sciences Wuhan 430071 China Key Laboratory of InteUigent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Center for Bioinformatics and Computational Biology and the Institute of Biomedical Sciences School of Life Sciences East China Normal University Shanghai 200214 China State Key Laboratory of Mathematical Engineering and Advanced Computation Wuxi 214122 China Jiangsu Variable Supercomputer Tech Co Ltd. Wuxi 214125 China NextOmics Blosctences Wuhan 430074 China Bio-X Institutes Key Laboratory for the Genetics of Developmental and Neuropsychiatric Disorders (Ministry of Education) Shanghai Jiao Tong University Shanghai 200030 China Beijing Institute of Radiation Medicine Beifing 100850 China
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantial... 详细信息
来源: 评论
Brief Investigation on Square Root of a Node of <i>T</i><sub>3</sub>Tree
收藏 引用
Advances in Pure Mathematics 2018年 第7期8卷 666-671页
作者: Guihong Chen Jianhui Li Department of Computer Science and Technology Neusoft Institute Guangdong Foshan China School of Electronics and Information Technology Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The article investigates some properties of square root of T3 tree’s nodes. It first proves several inequalities that are helpful to estimate the square root of a node, and then proves several theorems to describe th... 详细信息
来源: 评论
Recommendation system based on trusted relation transmission
Recommendation system based on trusted relation transmission
收藏 引用
International Conference on Intelligent System and Knowledge engineering, ISKE
作者: Yixiong Bian Huakang Li Jiangsu Key Lab of Big Data and Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
With the rapid development of the internet, applications of recommendation systems for online shops and entertainment platforms become more and more popular. In order to improve the effectiveness of recommendation, ex... 详细信息
来源: 评论
Cooperative computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture
收藏 引用
Journal of Computer Science & Technology 2015年 第1期30卷 145-162页
作者: 郑方 李宏亮 吕晖 过锋 许晓红 谢向辉 State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h... 详细信息
来源: 评论