咨询与建议

限定检索结果

文献类型

  • 2,090 篇 期刊文献
  • 1,604 篇 会议
  • 3 册 图书

馆藏范围

  • 3,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,378 篇 工学
    • 1,392 篇 计算机科学与技术...
    • 1,094 篇 软件工程
    • 377 篇 信息与通信工程
    • 343 篇 电子科学与技术(可...
    • 305 篇 电气工程
    • 255 篇 控制科学与工程
    • 201 篇 化学工程与技术
    • 194 篇 生物工程
    • 187 篇 光学工程
    • 168 篇 机械工程
    • 164 篇 材料科学与工程(可...
    • 119 篇 仪器科学与技术
    • 117 篇 动力工程及工程热...
    • 112 篇 网络空间安全
    • 106 篇 生物医学工程(可授...
    • 102 篇 力学(可授工学、理...
    • 64 篇 交通运输工程
    • 63 篇 土木工程
    • 58 篇 安全科学与工程
  • 1,800 篇 理学
    • 853 篇 数学
    • 806 篇 物理学
    • 236 篇 统计学(可授理学、...
    • 229 篇 生物学
    • 198 篇 化学
    • 129 篇 系统科学
    • 91 篇 地球物理学
  • 468 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 98 篇 工商管理
  • 85 篇 医学
    • 74 篇 临床医学
  • 61 篇 法学
  • 42 篇 经济学
  • 22 篇 军事学
  • 21 篇 农学
  • 10 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 55 篇 feature extracti...
  • 54 篇 semantics
  • 52 篇 deep learning
  • 52 篇 machine learning
  • 50 篇 training
  • 45 篇 computational mo...
  • 44 篇 optimization
  • 36 篇 data models
  • 33 篇 security
  • 31 篇 cryptography
  • 30 篇 network security
  • 30 篇 software
  • 28 篇 robustness
  • 27 篇 cosmic rays
  • 27 篇 algorithm design...
  • 23 篇 deep neural netw...
  • 23 篇 data mining
  • 23 篇 protocols
  • 23 篇 malware
  • 23 篇 nuclear structur...

机构

  • 614 篇 state key labora...
  • 152 篇 university of ch...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 82 篇 school of physic...
  • 80 篇 center for astro...
  • 76 篇 college of physi...
  • 74 篇 state key labora...
  • 74 篇 institute of fro...
  • 72 篇 school of physic...
  • 70 篇 national astrono...
  • 69 篇 school of physic...
  • 67 篇 national space s...
  • 63 篇 state key labora...
  • 63 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 chen m.j.
  • 67 篇 li xin
  • 67 篇 bao y.w.
  • 66 篇 liu b.
  • 64 篇 hu h.b.
  • 64 篇 danzengluobu
  • 62 篇 min z.
  • 61 篇 qin j.j.

语言

  • 3,498 篇 英文
  • 116 篇 其他
  • 87 篇 中文
检索条件"机构=State Key Laboratory of Scientfic/Engineering Computing"
3697 条 记 录,以下是1-10 订阅
排序:
Pre-trained Semantic Interaction based Inductive Graph Neural Networks for Text Classification  31
Pre-trained Semantic Interaction based Inductive Graph Neura...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Shiyu Zhou, Gang Lu, Jicang Chen, Jing Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing China
Nowadays, research of Text Classification (TC) based on graph neural networks (GNNs) is on the rise. Both inductive methods and transductive methods have made significant progress. For transductive methods, the semant... 详细信息
来源: 评论
Research on Intrusion Tolerance System Based on Behavioral Baseline and Defense-in-Depth Architecture
Research on Intrusion Tolerance System Based on Behavioral B...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Meng, Qi Wang, Xuemeng Yang, Kai Meng, Long Wang, Jiancheng Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
Tolerance technology is the third-generation network security technology commonly used in the world. It is derived from the category of information survival and endogenous security technology. A scholar from Carnegie ... 详细信息
来源: 评论
Social Media User Geolocation Based on Large Language Models  2nd
Social Media User Geolocation Based on Large Language Model...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Zhang, Meng Luo, Xiangyang Huang, Ningbo Key Laboratory of Cyberspace Situation Awareness of Henan Province Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
In the digital age, social media platforms have amassed a wealth of user-generated content, which contains valuable geographic information. However, the irregularities and noise in user-generated text, have led to sub... 详细信息
来源: 评论
Adaptive cyclic gradient methods with interpolation
收藏 引用
Computational Optimization and Applications 2025年 1-25页
作者: Xie, Yixin Sun, Cong Yuan, Ya-Xiang Beijing100876 China Ministry of Education Beijing100876 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing100190 China
Gradient method is an important method for solving large scale problems. In this paper, a new gradient method framework for unconstrained optimization problem is proposed, where the stepsize is updated in a cyclic way... 详细信息
来源: 评论
On greedy randomized coordinate updating iteration methods for solving symmetric eigenvalue problems
收藏 引用
Applied Numerical Mathematics 2025年 216卷 76-97页
作者: Bai, Zhong-Zhi State Key Laboratory of Mathematical Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences P.O. Box 2719 Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
In order to compute the smallest eigenvalue and its corresponding eigenvector of a large-scale, real, and symmetric matrix, we propose a class of greedy randomized coordinate updating iteration methods based on the pr... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
Passive on-chip isolators based on the thin-film lithium niobate platform
收藏 引用
Chinese Physics B 2025年 第3期34卷 408-413页
作者: Jiacheng Liu Gongyu Xia Qilin Hong Pingyu Zhu Kai-Kai Zhang keyu Xia Ping Xu Shiqiao Qin Zhihong Zhu College of Advanced Interdisciplinary Studies&Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense TechnologyChangsha 410073China Institute for Quantum Information and State Key Laboratory of High-Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210023China
Optical isolators,the photonic analogs of electronic diodes,are essential for ensuring the unidirectional flow of light in optical systems,thereby mitigating the destabilizing effects of back ***-film lithium niobate(... 详细信息
来源: 评论
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Edge-Driven Industrial computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论