咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是1931-1940 订阅
排序:
Predictive control of convex polyhedron LPV systems with Markov jumping parameters
Predictive control of convex polyhedron LPV systems with Mar...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Yanyan Yin Fei Liu Peng Shi Hamid Reza Karimi Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education) Institute of Automation Jiangnan University Wuxi 214122 China Department of Computing and Mathematical Sciences University of Glamorgan Pontypridd CF37 1DL United Kingdom Department of Engineering Faculty of Engineering and Science University of Agder N-4898 Grimstad Norway
The problem of receding horizon predictive control of stochastic linear parameter varying systems is discussed. First, constant coefficient matrices are obtained at each vertex in the interior of linear parameter vary... 详细信息
来源: 评论
Gain-Scheduled H-infinity Observer Design for Nonlinear Stochastic Systems with Time-Delay and Actuator Saturation
Gain-Scheduled H-infinity Observer Design for Nonlinear Stoc...
收藏 引用
American Control Conference
作者: Yanyan Yin Peng Shi Fei Liu Hamid Reza Karimi Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education) Institute of Automation Jiangnan University Wuxi Jiangsu 214122 P. R. China Department of Computing and Mathematical Sciences University of Glamorgan Pontypridd CF37 1DL United Kingdom Department of Engineering Faculty of Engineering and Science University of Agder N-4898 Grimstad Norway
In this paper, we propose a method for designing continuous gain-scheduled robust H_∞ observer on a class of extended stochastic nonlinear systems subject to time delay and actuator saturation. Initially, gradient li... 详细信息
来源: 评论
Modelling of the Electric Field Assisted Capillarity Effect used for the fabrication of hollow polymer microstructures
Modelling of the Electric Field Assisted Capillarity Effect ...
收藏 引用
Thermal, Mechanical and Multiphysics Simulation and Experiments in Micro-Electronics and Micro-Systems EuroSimE
作者: C. Tonry M. Patel C. Bailey M.P.Y. Desmuliez S. Cargill W. Yu Computational Mechanics and Reliability Group (CMRG) School of Computing and Mathematical Sciences University of Greenwich London UK Microsystems Engineering Centre (MISEC) School of Engineering & Physical Sciences Heriot-Watt University Edinburgh UK State Key Laboratory of Applied Optics Changchun Institute of Optics Fine mechanics and Physics Chinese Academy of Sciences Changchun Jilin China
Electric Field Assisted Capillarity (EFAC) is a novel process which has the potential for the single step fabrication of hollow polymer microstructures. The process has been shown to work experimentally on a microscal... 详细信息
来源: 评论
Provably Secure Role-Based Encryption with Revocation Mechanism
收藏 引用
Journal of Computer Science & Technology 2011年 第4期26卷 697-710页
作者: 朱岩 胡宏新 Gail-Joon Ahn 王怀习 王善标 Institute of Computer Science and Technology Peking University Beijing Key Laboratory of Internet Security Technology Peking University School of Computing Informatics and Decision Systems EngineeringArizona State University School of Mathematical Sciences Peking University
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... 详细信息
来源: 评论
Provably secure role-based encryption with revocation mechanism
Provably secure role-based encryption with revocation mechan...
收藏 引用
作者: Zhu, Yan Hu, Hong-Xin Ahn, Gail-Joon Wang, Huai-Xi Wang, Shan-Biao Institute of Computer Science and Technology Peking University Beijing 100871 China Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States 4School of Mathematical Sciences Peking University Beijing 100871 China
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ba... 详细信息
来源: 评论
Model Checking of Adaptive Programs with Mode-extended Linear Temporal Logic
Model Checking of Adaptive Programs with Mode-extended Linea...
收藏 引用
IEEE Workshop on engineering of Autonomic and Autonomous Systems (EASE)
作者: Yongwang Zhao Dianfu Ma Jing Li Zhuqing Li State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论
Towards Verifying Global Properties of Adaptive Software Based on Linear Temporal Logic
Towards Verifying Global Properties of Adaptive Software Bas...
收藏 引用
International Conference on advanced Information Networking and Applications (AINA)
作者: Yongwang Zhao Jing Li Dou Sun Dianfu Ma Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论
Some recent progress on curvilinear imagers and eyeball cameras
Some recent progress on curvilinear imagers and eyeball came...
收藏 引用
Imaging Systems and Applications, ISA 2011
作者: Jung, Inhwa Xiao, Jianliang Malyarchuk, Viktor Lu, Chaofeng Li, Ming Liu, Zhuangjian Yoon, Jongseung Huang, Yonggang Rogers, John A. Department of Materials Science and Engineering Beckman Institute for Advanced Science and Technology Frederick Seitz Materials Research Laboratory University of Illinois at Urbana-Champaign Urbana IL 61801 United States Department of Civil Engineering Zhejiang University Hangzhou Zhejiang 310058 China Department of Civil and Environmental Engineering Northwestern University Evanston IL 60208 United States State Key Laboratory of Structural Analysis for Industrial Equipment Dalian University of Technology Dalian 116024 China Institute of High Performance Computing 1 Fusionopolis Way #16-16 Connexis 138632 Singapore Department of Mechanical Engineering Northwestern University Evanston IL 60208 United States
We present curvilinear imagers using photodetector arrays on elastomeric membranes, capable of reversible deformation into hemispherical shapes via hydraulics. Combining with tunable, fluidic plano-convex lenses yield... 详细信息
来源: 评论
Abnormal electron paths induced by Klein tunneling in graphene quantum point contacts
收藏 引用
Physical Review B 2011年 第3期84卷 035426-035426页
作者: Rui Yang Liang Huang Ying-Cheng Lai Celso Grebogi School of Electrical Computer and Energy Engineering Arizona State University Tempe Arizona 85287 USA Institute of Computational Physics and Complex Systems and Key Laboratory for Magnetism and Magnetic Materials of MOE Lanzhou University Lanzhou Gansu 730000 China Department of Physics Arizona State University Tempe Arizona 85287 USA Institute for Complex Systems and Mathematical Biology School of Natural and Computing Sciences King’s College University of Aberdeen Aberdeen United Kingdom
We study quantum transport in a general graphene system subject to external potential, a situation that can be expected in all kinds of future graphene-based electronic devices with quantum dots and quantum point cont... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论