咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是301-310 订阅
排序:
Axiomatic approaches based on the software trustworthiness measure
Axiomatic approaches based on the software trustworthiness m...
收藏 引用
International Conference on Applied System Innovation, ICASI 2015
作者: Tao, H.W. Chen, Y.X. Pang, J.M. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China MoE Engineering Center for Software/Hardware Co-Design Technology and Application East China Normal University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the outstanding problems of software trustworthiness, the measurement of software trustworthiness has aroused more and more concern. However, few researches pay attention to using more rigorous approaches in th...
来源: 评论
A new socio-rational secret sharing scheme
收藏 引用
International Journal of Innovative computing and Applications 2017年 第1期8卷 21-30页
作者: Jin, Jianghao Zhou, Xie Ma, Chuangui Wang, Xu'an State Key laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China Department of Basic Courses Army Aviation Institute Beijing China Engineering University of CAPF Xi'anShanxi China
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights... 详细信息
来源: 评论
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
Spreading Dynamics of Random Walks in Complex Networks  8
Spreading Dynamics of Random Walks in Complex Networks
收藏 引用
8th International Conference on Information Technology: IoT and Smart City, ICIT 2020
作者: Hao, Yaohui Liu, Hongbo Sun, Jiajia Gao, Liwei Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The study of spreading dynamics is an important foundation to analyze the spread of viruses orrumors. The general method of analyzing spreading dynamics is based on model, such as SI model, SISmodel, SIR model,ect. Ho... 详细信息
来源: 评论
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
THE RELAXING SCHEMES FOR HAMILTON-JACOBI EQUATIONS
收藏 引用
计算数学(英文版) 2001年 第3期19卷 231-240页
作者: Hua-zhong Tang Hua-zhong Tang Hua-mu Wu State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems SciencesChinese Academy of Sciences Beijing 100080 China School of Mathematical Sciences Peking University Beijing 100871 China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems SciencesChinese Academy of Sciences Beijing 100080 China
Hamilton-Jacobiequation appears frequently in applications, e.g., in differential games and control theory, and is closely related to hyperbolic conservation laws[3, 4, 12]. This is helpful in the design of difference... 详细信息
来源: 评论
Power-Aware Data Management Based on Hybrid RAM-NVM Memory for Smart Bracelet
收藏 引用
Journal of Electronic Science and Technology 2017年 第4期15卷 385-390页
作者: Jin-Yu Zhan Jun-Huan Yang Wei Jiang Yi-Xin Li Yi-Ming Zhang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000China
Wearable devices become popular because they can help people observe health *** battery life is the critical problem for wearable devices. The non-volatile memory(NVM) attracts attention in recent years because of its... 详细信息
来源: 评论
Potential Indicator for Continuous Emotion Arousal by Dynamic Neural Synchrony  4th
Potential Indicator for Continuous Emotion Arousal by Dyna...
收藏 引用
4th International Workshop on Human Brain and Artificial Intelligence, HBAI 2024
作者: Pan, Guandong Wu, Zhaobang Yang, Yaqian Wang, Xin Liu, Longzhao Zheng, Zhiming Tang, Shaoting School of Computer Science and Engineering Beihang University Beijing100191 China Institute of Artificial Intelligence Beihang University Beijing100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics Beihang University Beijing100191 China Institute of Medical Artificial Intelligence Binzhou Medical University Yantai264003 China Zhongguancun Laboratory Beijing100094 China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University Beijing100191 China PengCheng Laboratory Shenzhen518055 China State Key Lab of Software Development Environment Beihang University Beijing100191 China
The need for automatic and high-quality emotion annotation is paramount in applications such as continuous emotion recognition and video highlight detection, yet achieving this through manual human annotations is chal... 详细信息
来源: 评论
Potential Indicator for Continuous Emotion Arousal by Dynamic Neural Synchrony
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Guandong Wu, Zhaobang Yang, Yaqian Wang, Xin Liu, Longzhao Zheng, Zhiming Tang, Shaoting School of Computer Science and Engineering Beihang University Beijing100191 China Institute of Artificial Intelligence Beihang University Beijing100191 China Key laboratory of Mathematics Informatics and Behavioral Semantics Beihang University Beijing100191 China Institute of Medical Artificial Intelligence Binzhou Medical University Yantai264003 China Zhongguancun Laboratory Beijing100094 China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University Beijing100191 China PengCheng Laboratory Shenzhen518055 China State Key Lab of Software Development Environment Beihang University Beijing100191 China
The need for automatic and high-quality emotion annotation is paramount in applications such as continuous emotion recognition and video highlight detection, yet achieving this through manual human annotations is chal... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论