咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是221-230 订阅
排序:
Utilization-Aware Data Variable Allocation on NVM- Based SPM in Real-Time Embedded Systems
收藏 引用
Journal of Electronic Science and Technology 2021年 第2期19卷 163-172页
作者: Jin-Yu Zhan Yi-Xin Li Wei Jiang Jun-Huan Yang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054 State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo... 详细信息
来源: 评论
Bi-population genetic algorithm-based attack path discovery research in large-scale networks  4
Bi-population genetic algorithm-based attack path discovery ...
收藏 引用
4th World Conference on computing and Communication Technologies, WCCCT 2021
作者: Tairan, Hu Wenlong, Gao Tianyang, Zhou Yichao, Zang National Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
with the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s... 详细信息
来源: 评论
Optimal scheme for dynamic adjustment of active mirror in FAST system  2021
Optimal scheme for dynamic adjustment of active mirror in FA...
收藏 引用
2021 5th International Conference on Computer Science and Artificial Intelligence
作者: Hongchuan Zhou Jiaqi Liu Junyan Song Benchao Yang State Key Laboratory of Mathematical Engineering and advanced computing China
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode... 详细信息
来源: 评论
ThickV-Stain: Unprocessed Thick Tissues Virtual Staining for Rapid Intraoperative Histology  7
ThickV-Stain: Unprocessed Thick Tissues Virtual Staining for...
收藏 引用
7th International Conference on Medical Imaging with Deep Learning, MIDL 2024
作者: Shi, Lulin Hou, Xingzhong Wong, Ivy H.M. Chan, Simon C.K. Chen, Zhenghui Lo, Claudia T.K. Wong, Terence T.W. Translational and Advanced Bioimaging Laboratory Department of Chemical and Biological Engineering The Hong Kong University of Science and Technology Hong Kong State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Virtual staining has shown great promise in realizing a rapid and low-cost clinical alternative for pathological examinations, eliminating the need for chemical reagents and laborious staining procedures. However, mos... 详细信息
来源: 评论
A Survey on Knowledge Graph Representation Learning with Text Information  21
A Survey on Knowledge Graph Representation Learning with Tex...
收藏 引用
Proceedings of the 3rd World Symposium on Software engineering
作者: Ling Wang Jicang Lu Gang Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing China
Knowledge graph representation learning provides a lot of help for subsequent tasks such as knowledge graph completion, information retrieval, and intelligent question answering. By representing the knowledge graph as... 详细信息
来源: 评论
Edge-Driven Industrial computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论
Software Vulnerability Mining Techniques Based on Data Fusion and Reverse engineering
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Liu, Tieming State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper pr... 详细信息
来源: 评论
DSSA: Dual-Side Sparse Systolic Array Architecture for Accelerating Convolutional Neural Network Training  22
DSSA: Dual-Side Sparse Systolic Array Architecture for Accel...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Zhengbo Chen Qi Yu Fang Zheng Feng Guo Zuoning Chen Information Engineering University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Chinese Academy of Engineering China
Ever-growing CNN size incurs a significant amount of redundancy in model parameters, which in turn, puts considerable burden on hardware. Unstructured pruning is widely used to reduce model sparsity. While, the irregu... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization  24
Coarse-to-Fine Proposal Refinement Framework for Audio Tempo...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Shenzhen China
Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. However, existing countermea... 详细信息
来源: 评论
Pixel+ and Pixel++: compact and efficient forward-secure multi-signatures for PoS blockchain consensus  24
Pixel+ and Pixel++: compact and efficient forward-secure mul...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Jianghong Wei Guohua Tian Ding Wang Fuchun Guo Willy Susilo Xiaofeng Chen State Key Laboratory of Integrated Service Networks (ISN) Xidian University and State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Integrated Service Networks (ISN) Xidian University College of Cyber Science Nankai University School of Computing and Information Technology University of Wollongong
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
来源: 评论