咨询与建议

限定检索结果

文献类型

  • 4,530 篇 期刊文献
  • 1,821 篇 会议
  • 5 册 图书

馆藏范围

  • 6,356 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,827 篇 工学
    • 1,560 篇 计算机科学与技术...
    • 1,210 篇 软件工程
    • 494 篇 电子科学与技术(可...
    • 481 篇 化学工程与技术
    • 466 篇 电气工程
    • 444 篇 信息与通信工程
    • 353 篇 控制科学与工程
    • 347 篇 材料科学与工程(可...
    • 340 篇 力学(可授工学、理...
    • 261 篇 光学工程
    • 244 篇 动力工程及工程热...
    • 242 篇 生物工程
    • 238 篇 机械工程
    • 215 篇 核科学与技术
    • 195 篇 仪器科学与技术
    • 186 篇 冶金工程
    • 144 篇 土木工程
    • 140 篇 生物医学工程(可授...
    • 132 篇 水利工程
    • 118 篇 网络空间安全
  • 3,793 篇 理学
    • 2,298 篇 物理学
    • 1,369 篇 数学
    • 497 篇 化学
    • 390 篇 统计学(可授理学、...
    • 314 篇 生物学
    • 215 篇 系统科学
    • 161 篇 地球物理学
  • 526 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 138 篇 医学
  • 86 篇 农学
  • 69 篇 法学
  • 54 篇 经济学
  • 24 篇 军事学
  • 11 篇 教育学
  • 8 篇 艺术学
  • 4 篇 文学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 246 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 61 篇 feature extracti...
  • 60 篇 deep learning
  • 60 篇 relativistic hea...
  • 56 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 48 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 quark & gluon je...
  • 36 篇 hadrons
  • 36 篇 data models
  • 33 篇 security

机构

  • 1,026 篇 yerevan physics ...
  • 917 篇 centro brasileir...
  • 892 篇 charles universi...
  • 888 篇 university of de...
  • 888 篇 department of ph...
  • 872 篇 institute rudjer...
  • 867 篇 university of so...
  • 858 篇 helsinki institu...
  • 857 篇 infn sezione di ...
  • 853 篇 infn sezione di ...
  • 848 篇 irfu cea univers...
  • 847 篇 university of sp...
  • 841 篇 university of cy...
  • 839 篇 indian institute...
  • 831 篇 institute of hig...
  • 822 篇 national and kap...
  • 822 篇 infn laboratori ...
  • 816 篇 universidad san ...
  • 810 篇 rwth aachen univ...
  • 806 篇 academy of scien...

作者

  • 631 篇 waltenberger w.
  • 623 篇 lowette s.
  • 570 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 skovpen k.
  • 539 篇 lemaitre v.
  • 537 篇 schieck j.
  • 536 篇 tytgat m.
  • 534 篇 sznajder a.
  • 530 篇 tumasyan a.
  • 525 篇 jeitler m.
  • 522 篇 vannerom d.
  • 521 篇 delaere c.
  • 516 篇 giammanco a.
  • 503 篇 van mechelen p.
  • 503 篇 carvalho w.
  • 499 篇 alves g.a.
  • 495 篇 wulz c.-e.
  • 494 篇 delcourt m.
  • 490 篇 moraes a.

语言

  • 6,036 篇 英文
  • 176 篇 其他
  • 149 篇 中文
  • 7 篇 德文
  • 7 篇 法文
检索条件"机构=State Key Laboratory of Scientific and Engineering Computing"
6356 条 记 录,以下是241-250 订阅
排序:
Parallel hybrid iteration methods for block bordered linear systems
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 1997年 第1期86卷 37-60页
作者: Bai, ZZ State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Chinese Academy of Sciences P.O. Box 2719 Beijing 100080 People's Republic of China
A class of parallel hybrid iteration method and its accelerated overrelaxation variant are established for solving the large sparse block bordered system of linear equations, and their convergence are proved when the ...
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Three-dimensional large eddy simulation and vorticity analysis of unsteady cavitating flow around a twisted hydrofoil
收藏 引用
Journal of Hydrodynamics 2013年 第4期25卷 510-519页
作者: 季斌 罗先武 彭晓星 吴玉林 State Key Laboratory of Hydroscience and Engineering Tsinghua University China Ship Scientific Research Center
Large Eddy Simulation (LES) was coupled with a mass transfer cavitation model to predict unsteady 3-D turbulent cavita- ting flows around a twisted hydrofoil. The wall-adapting local eddy-viscosity (WALE) model wa... 详细信息
来源: 评论
On the regularity of trust region-cg algorithm: With application to deconvolution problem
收藏 引用
Science China Mathematics 2003年 第3期46卷 312-325页
作者: 王彦飞 Laboratory of Remote Sensing Information Sciences Institute of Remote Sensing ApplicationsChinese Academy of Sciences State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematicsand Scientific/Engineering ComputingAcademy of Mathematics and System SciencesChinese Academy of SciencesBeijing 100080China
Deconvolution problem is a main topic in signal processing. Many practical applications are re-quired to solve deconvolution problems. An important example is image reconstruction. Usually, researcherslike to use regu... 详细信息
来源: 评论
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论
Compact Arrayed Waveguide Gratings Fabricated on 800-nm-thick Si3N4 Photonic Integration Platform
收藏 引用
Journal of Lightwave Technology 2025年
作者: Fan, Zhuping Yan, Xiongshuo Li, Xuan Ma, Xiao Wang, Xuyang Zou, Jun Zhejiang University ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou311215 China Zhejiang University of Technology School of Physics Hangzhou310023 China Zhejiang University of Science and Technology School of Information & Electronic Engineering Hangzhou310023 China Shanxi University State Key Laboratory of Quantum Optics and Quantum Optics Devices Taiyuan030006 China
Silicon nitride (Si3N4) waveguide with thickness of > 600 nm having strong mode confinement and anomalous group velocity dispersion (GVD) has today become the leading photonic integration platform for linear and Ke... 详细信息
来源: 评论
Stego key searching for LSB steganography on JPEG decompressed image
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 60-74页
作者: Jiufen LIU Yuguo TIAN Tao HAN Junchao WANG Xiangyang LUO Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
At present, steganalysis research focuses on detecting the existence of a hidden message. However,extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer f... 详细信息
来源: 评论
THE GLOBAL ATTRACTOR FOR A VISCOUS WEAKLY DISSIPATIVE GENERALIZED TWO-COMPONENT μ-HUNTER-SAXTON SYSTEM
收藏 引用
Acta Mathematica Scientia 2018年 第2期38卷 651-672页
作者: 张磊 刘斌 School of Mathematics and Statistics Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology
This article is concerned with the existence of global attractor of a weakly dissipative generalized two-component μ-Hunter-Saxton (gμHS2) system with viscous terms. Under the period boundary conditions and with t... 详细信息
来源: 评论
Cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 评论