咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是721-730 订阅
排序:
Robust three-qubit search algorithm in Rydberg atoms via geometric control
收藏 引用
Physical Review A 2022年 第5期106卷 052610-052610页
作者: Bing-Bing Liu Zheng Shan M.-R. Yun D.-Y. Wang B.-J. Liu L.-L. Yan M. Feng S.-L. Su Key Laboratory of Material Physics Ministry of Education School of Physics and Microelectronics Zhengzhou University Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 Henan China Department of Physics Southern University of Science and Technology Shenzhen Guangdong 518055 China State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics Wuhan Institute of Physics and Mathematics Innovation Academy of Precision Measurement Science and Technology Chinese Academy of Sciences Wuhan 430071 China Research Center for Quantum Precision Measurement Guangzhou Institute of Industry Technology Guangzhou 511458 China Department of Physics Zhejiang Normal University Jinhua 321004 China
Rydberg atoms possess long coherence time and inherent scalability, which makes it promising to implement quantum algorithms. An exact and robust quantum search algorithm (SA) is essential to some practical applicatio... 详细信息
来源: 评论
Characterization and construction of optimal binary linear codes with one-dimensional hull
arXiv
收藏 引用
arXiv 2022年
作者: Li, Shitao Shi, Minjia Kim, Jon-Lark The School of Mathematical Sciences Anhui University Hefei230601 China The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education The School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The Department of Mathematics Sogang University Seoul Korea Republic of
The hull of a linear code over finite fields is the intersection of the code and its dual, and linear codes with small hulls have applications in computational complexity and information protection. Linear codes with ... 详细信息
来源: 评论
High Temperature Strengthening Mechanism of Pure Zn with Trace Mn Addition
SSRN
收藏 引用
SSRN 2023年
作者: Li, Meng Xue, Zhe Shi, Zhang-Zhi Wang, Yi-Nan Dai, Fu-Zhi Zhang, Li-Zhi Zhou, Shao-Xiong Huang, Bing-Xin Guan, Zhen-Peng Wang, Lu-Ning State Key Laboratory for Advanced Metals and Materials Key Laboratory for Advanced Materials Processing of Ministry of Education Beijing Laboratory of Metallic Materials and Processing for Modern Transportation School of Materials Science and Engineering University of Science and Technology Beijing Beijing100083 China Orthopedics Department Peking University ShouGang Hospital Beijing100144 China Artificial Intelligence for Science Institute Beijing100871 China School of Mathematical Sciences Peking University Beijing100871 China Central Iron and Steel Research Institute Beijing100081 China
This work reveals how trace Mn significantly improves high temperature strength of pure Zn. The peak stress of pure Zn increases from 46 MPa to 84 MPa at 300 °C/0.1 s-1after 0.8 wt.% Mn addition. The Zn-0.8Mn all... 详细信息
来源: 评论
Covariance-Based Activity Detection in Cooperative Multi-Cell Massive MIMO: Scaling Law and Efficient Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Ziyue Liu, Ya-Feng Wang, Zhaorui Yu, Wei The State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China The School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Shenzhen518172 China The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto TorontoONM5S 3G4 Canada
This paper focuses on the covariance-based activity detection problem in a multi-cell massive multiple-input multiple-output (MIMO) system. In this system, active devices transmit their signature sequences to multiple... 详细信息
来源: 评论
NOMANet: A Graph Neural Network Enabled Power Allocation Scheme for NOMA
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Yipu Lu, Yang Chen, Wei Ai, Bo Niyato, Dusit Ding, Zhiguo State Key Laboratory of Advanced Rail Autonomous Operation China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates
This paper proposes a graph neural network (GNN) enabled power allocation scheme for non-orthogonal multiple access (NOMA) networks. In particular, a downlink scenario with one base station serving multiple users over... 详细信息
来源: 评论
CADEC: A Combinatorial Auction for Dynamic Distributed DNN Inference Scheduling in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Xu, Xiaolong Hu, Yuhao Cui, Guangming Qi, Lianyong Dou, Wanchun Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China College of Computer science and technology Qingdao China Georgia State University Department of Computer Science United States
Deep Neural Network (DNN) Inference, as a key enabler of intelligent applications, is often computation-intensive and latency-sensitive. Combining the advantages of cloud computing (abundant computing resources) and e... 详细信息
来源: 评论
Energy Efficient Collaborative Federated Learning Design: A Graph Neural Network based Approach
Energy Efficient Collaborative Federated Learning Design: A ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Christopher G. Brinton Changchuan Yin Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
In this paper, we consider the design of an energy efficient collaborative federated learning (CFL) methodology where devices exchange their local FL parameters with a subset of their neighbors without reliance on a p...
来源: 评论
Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method
收藏 引用
Computers, Materials & Continua 2019年 第4期59卷 199-214页
作者: Yang Wu Weiping Shang Jiahao Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002China School of Telecommunications Engineering Xidian UniversityXi’an710071China Zhuhai Campus of Beijing Normal University Zhuhai519000China
Robust data hiding techniques attempt to construct covert communication in a lossy public ***,the existing robust JPEG steganographic algorithms cannot overcome the side-information missing ***,this paper proposes a n... 详细信息
来源: 评论
A new network intrusion detection system based on blockchain
收藏 引用
International Journal of Performability engineering 2019年 第12期15卷 3187-3195页
作者: Fu, Jinhua Xu, Mixue Huang, Yongzhong Tao, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou450002 China
With the increasing application of computers and networks, several network security problems have emerged, and thus network intrusion detection systems have become the focus of network security research. In order to a... 详细信息
来源: 评论
Phase Reentrances and Solid Deformations in Confined Colloidal Crystals
收藏 引用
Physical Review Letters 2024年 第1期132卷 018202-018202页
作者: Xiaoxia Li Huang Fang Krongtum Sankaewtong Minhuan Li Yanshuang Chen Jiping Huang Ran Ni Hajime Tanaka Peng Tan State Key Laboratory of Surface Physics and Department of Physics Fudan University Shanghai 200433 China Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai 200433 China Chemical Engineering School of Chemical and Biomedical Engineering Nanyang Technological University 62 Nanyang Drive 637459 Singapore Department of Fundamental Engineering Institute of Industrial Science University of Tokyo 4-6-1 Komaba Meguro-ku Tokyo 153-8505 Japan Research Center for Advanced Science and Technology University of Tokyo 4-6-1 Komaba Meguro-ku Tokyo 153-8904 Japan
A simple geometric constraint often leads to novel, complex crystalline phases distinct from the bulk. Using thin-film charge colloidal crystals, a model system with tunable interactions, we study the effects of geome... 详细信息
来源: 评论