咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是1641-1650 订阅
排序:
Defense strategy selection based on signaling game  3
Defense strategy selection based on signaling game
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Hengwei Wang, Jindong Yu, Dingkun Han, Jihong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense gam... 详细信息
来源: 评论
Cloud resource scheduling method based on estimation of distirbution shuffled frog leaping algorithm  3
Cloud resource scheduling method based on estimation of dist...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Niu, Kan Wang, Jin-Dong Zhang, Heng-Wei Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the leas... 详细信息
来源: 评论
Research on service trust evaluation approach under cloud computing environment  3
Research on service trust evaluation approach under cloud co...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Yu, Zhi-Yong Zhang, Heng-Wei Niu, Kan Wang, Jin-Dong Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
In cloud computing, the resources of service are widely distributed, complex and fickle. The trust relationship between service entities is hard to establish and maintain with high uncertainty. The characteristics of ... 详细信息
来源: 评论
Native diversity buffers against severity of non-native tree invasions ( vol 621,pg 773 , 2023 )
收藏 引用
NATURE 2023年 第7982期622卷 E2-E2页
作者: Delavaux, Camille S. Crowther, Thomas W. Zohner, Constantin M. Robmann, Niamh M. Lauber, Thomas van den Hoogen, Johan Kuebbing, Sara Liang, Jingjing de-Miguel, Sergio Nabuurs, Gert-Jan Reich, Peter B. Abegg, Meinrad Yao, Yves C. Adou Alberti, Giorgio Zambrano, Angelica M. Almeyda Alvarado, Braulio Vilchez Alvarez-Davila, Esteban Alvarez-Loayza, Patricia Alves, Luciana F. Ammer, Christian Anton-Fernandez, Clara Araujo-Murakami, Alejandro Arroyo, Luzmila Avitabile, Valerio Aymard, Gerardo A. Baker, Timothy R. Balazy, Radomir Banki, Olaf Barroso, Jorcely G. Bastian, Meredith L. Bastin, Jean-Francois Birigazzi, Luca Birnbaum, Philippe Bitariho, Robert Boeckx, Pascal Bongers, Frans Bouriaud, Olivier Brancalion, Pedro H. S. Brandl, Susanne Brienen, Roel Broadbent, Eben N. Bruelheide, Helge Bussotti, Filippo Gatti, Roberto Cazzolla Cesar, Ricardo G. Cesljar, Goran Chazdon, Robin Chen, Han Y. H. Chisholm, Chelsea Cho, Hyunkook Cienciala, Emil Clark, Connie Clark, David Colletta, Gabriel D. Coomes, David A. Valverde, Fernando Cornejo Corral-Rivas, Jose J. Crim, Philip M. Cumming, Jonathan R. Dayanandan, Selvadurai de Gasper, Andre L. Decuyper, Mathieu Derroire, Geraldine DeVries, Ben Djordjevic, Ilija Dolezal, Jiri Dourdain, Aurelie Obiang, Nestor Laurier Engone Enquist, Brian J. Eyre, Teresa J. Fandohan, Adande Belarmain Fayle, Tom M. Feldpausch, Ted R. Ferreira, Leandro V. Fischer, Markus Fletcher, Christine Frizzera, Lorenzo Gamarra, Javier G. P. Gianelle, Damiano Glick, Henry B. Harris, David J. Hector, Andrew Hemp, Andreas Hengeveld, Geerten Herault, Bruno Herbohn, John L. Herold, Martin Hillers, Annika Coronado, Euridice N. Honorio Hui, Cang Ibanez, Thomas T. Amaral, Ieda Imai, Nobuo Jagodzinski, Andrzej M. Jaroszewicz, Bogdan Johannsen, Vivian Kvist Joly, Carlos A. Jucker, Tommaso Jung, Ilbin Karminov, Viktor Kartawinata, Kuswata Kearsley, Elizabeth Kenfack, David Kennard, Deborah K. Kepfer-Rojas, Sebastian Keppel, Gunnar Khan, Mohammed Latif Killeen, Timothy J. Kim, Hyun Seok Kitayama, Kanehiro Kohl, Michael Korju Institute of Integrative Biology ETH Zurich (Swiss Federal Institute of Technology) Zurich Switzerland Department of Genetics Evolution and Environment University College London London UK The Forest School at The Yale School of the Environment Yale University New Haven CT USA Department of Forestry and Natural Resources Purdue University West Lafayette IN USA Department of Agriculture Forestry and Bioresources Seoul National University Seoul South Korea Department of Crop and Forest Sciences University of Lleida Lleida Spain Joint Research Unit CTFC–AGROTECNIO–CERCA Solsona Spain Wageningen University and Research Wageningen The Netherlands World Agroforestry (ICRAF) Nairobi Kenya Department of Forest Resources University of Minnesota St Paul MN USA Hawkesbury Institute for the Environment Western Sydney University Penrith New South Wales Australia Institute for Global Change Biology and School for Environment and Sustainability University of Michigan Ann Arbor MI USA Swiss Federal Institute for Forest Snow and Landscape Research WSL Birmensdorf Switzerland UFR Biosciences University Félix Houphouët-Boigny Abidjan Côte d’Ivoire Department of Agricultural Food Environmental and Animal Sciences University of Udine Udine Italy Faculty of Science and Technology Free University of Bolzano Bolzano Italy Spatial Ecology and Conservation Laboratory Department of Tourism Recreation and Sport Management University of Florida Gainesville FL USA Forestry School Tecnológico de Costa Rica TEC Cartago Costa Rica Fundacion ConVida Universidad Nacional Abierta y a Distancia UNAD Medellin Colombia Field Museum of Natural Histiory Chicago IL USA Center for Tropical Research Institute of the Environment and Sustainability UCLA Los Angeles CA USA Silviculture and Forest Ecology of the Temperate Zones University of Göttingen Göttingen Germany Division of Forest and Forest Resources Norwegian Institute of Bioeconomy Research (NIBIO) Ås Norway Museo de Hi
来源: 评论
Active defense strategy selection based on static Bayesian game  3
Active defense strategy selection based on static Bayesian g...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Hengwei Wang, Jindong Yu, Dingkun Han, Jihong Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Nowadays, the network defense based on incomplete information game model ignored the type of the defender, used simple cost quantitative method, and chosen defense strategies improperly. Aiming at the problem, this pa... 详细信息
来源: 评论
Fuzzy subspace clustering algorithm based on modified firefly algorithm  3
Fuzzy subspace clustering algorithm based on modified firefl...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: He, Jia-Jing Zhang, Heng-Wei Wang, Na Niu, Kan Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Aiming at the clustering problems in selected features and the shortcomings that fuzzy C- means clustering is sensitive to initial value and easy to fall into local optimum, a new fuzzy subspace clustering algorithm b... 详细信息
来源: 评论
SGCAM-an comprehensive analysis method for information risk assessment index system  3
SGCAM-an comprehensive analysis method for information risk ...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Chen, Yu Wang, Jin-Dong Wang, Kun Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,... 详细信息
来源: 评论
Research for modeling network security based on attack-defense grapy of state reduction  3
Research for modeling network security based on attack-defen...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Li, Tao Zhang, Hengwei Wang, Jindong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of... 详细信息
来源: 评论
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
Constraints on Cosmic Strings Using Data from the Third advanced LIGO–Virgo Observing Run
收藏 引用
Physical Review Letters 2021年 第24期126卷 241102-241102页
作者: R. Abbott T. D. Abbott S. Abraham F. Acernese K. Ackley A. Adams C. Adams R. X. Adhikari V. B. Adya C. Affeldt D. Agarwal M. Agathos K. Agatsuma N. Aggarwal O. D. Aguiar L. Aiello A. Ain P. Ajith T. Akutsu K. M. Aleman G. Allen A. Allocca P. A. Altin A. Amato S. Anand A. Ananyeva S. B. Anderson W. G. Anderson M. Ando S. V. Angelova S. Ansoldi J. M. Antelis S. Antier S. Appert Koya Arai Koji Arai Y. Arai S. Araki A. Araya M. C. Araya J. S. Areeda M. Arène N. Aritomi N. Arnaud S. M. Aronson H. Asada Y. Asali G. Ashton Y. Aso S. M. Aston P. Astone F. Aubin P. Auclair P. Aufmuth K. AultONeal C. Austin S. Babak F. Badaracco M. K. M. Bader S. Bae Y. Bae A. M. Baer S. Bagnasco Y. Bai L. Baiotti J. Baird R. Bajpai M. Ball G. Ballardin S. W. Ballmer M. Bals A. Balsamo G. Baltus S. Banagiri D. Bankar R. S. Bankar J. C. Barayoga C. Barbieri B. C. Barish D. Barker P. Barneo S. Barnum F. Barone B. Barr L. Barsotti M. Barsuglia D. Barta J. Bartlett M. A. Barton I. Bartos R. Bassiri A. Basti M. Bawaj J. C. Bayley A. C. Baylor M. Bazzan B. Bécsy V. M. Bedakihale M. Bejger I. Belahcene V. Benedetto D. Beniwal M. G. Benjamin T. F. Bennett J. D. Bentley M. BenYaala F. Bergamin B. K. Berger S. Bernuzzi D. Bersanetti A. Bertolini J. Betzwieser R. Bhandare A. V. Bhandari D. Bhattacharjee S. Bhaumik J. Bidler I. A. Bilenko G. Billingsley R. Birney O. Birnholtz S. Biscans M. Bischi S. Biscoveanu A. Bisht B. Biswas M. Bitossi M.-A. Bizouard J. K. Blackburn J. Blackman C. D. Blair D. G. Blair R. M. Blair F. Bobba N. Bode M. Boer G. Bogaert M. Boldrini F. Bondu E. Bonilla R. Bonnand P. Booker B. A. Boom R. Bork V. Boschi N. Bose S. Bose V. Bossilkov V. Boudart Y. Bouffanais A. Bozzi C. Bradaschia P. R. Brady A. Bramley A. Branch M. Branchesi M. Breschi T. Briant J. H. Briggs A. Brillet M. Brinkmann P. Brockill A. F. Brooks J. Brooks D. D. Brown S. Brunett G. Bruno R. Bruntz J. Bryant A. Buikema T. Bulik H. J. Bulten A. Buonanno R. Buscicchio D. Buskulic L. Cadonati M. Caesar G. Cagnoli C. Cahillane H. W. Cain, III J. Calderón Bustillo J. D LIGO Laboratory California Institute of Technology Pasadena California 91125 USA Louisiana State University Baton Rouge Louisiana 70803 USA Inter-University Centre for Astronomy and Astrophysics Pune 411007 India Dipartimento di Farmacia Università di Salerno I-84084 Fisciano Salerno Italy INFN Sezione di Napoli Complesso Universitario di Monte S.Angelo I-80126 Napoli Italy OzGrav School of Physics and Astronomy Monash University Clayton 3800 Victoria Australia Christopher Newport University Newport News Virginia 23606 USA LIGO Livingston Observatory Livingston Louisiana 70754 USA OzGrav Australian National University Canberra Australian Capital Territory 0200 Australia Max Planck Institute for Gravitational Physics (Albert Einstein Institute) D-30167 Hannover Germany Leibniz Universität Hannover D-30167 Hannover Germany University of Cambridge Cambridge CB2 1TN United Kingdom Theoretisch-Physikalisches Institut Friedrich-Schiller-Universität Jena D-07743 Jena Germany University of Birmingham Birmingham B15 2TT United Kingdom Center for Interdisciplinary Exploration and Research in Astrophysics (CIERA) Northwestern University Evanston Illinois 60208 USA Instituto Nacional de Pesquisas Espaciais 12227-010 São José dos Campos São Paulo Brazil Gravity Exploration Institute Cardiff University Cardiff CF24 3AA United Kingdom Gran Sasso Science Institute (GSSI) I-67100 L’Aquila Italy INFN Laboratori Nazionali del Gran Sasso I-67100 Assergi Italy INFN Sezione di Pisa I-56127 Pisa Italy Università di Pisa I-56127 Pisa Italy International Centre for Theoretical Sciences Tata Institute of Fundamental Research Bengaluru 560089 India Gravitational Wave Science Project National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan Advanced Technology Center National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan California State University Fullerton Fullerton California 92831 USA NCSA University of Illi
We search for gravitational-wave signals produced by cosmic strings in the advanced LIGO and Virgo full O3 dataset. Search results are presented for gravitational waves produced by cosmic string loop features such as ... 详细信息
来源: 评论