咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering And Advanced Computing"
1958 条 记 录,以下是21-30 订阅
排序:
Admissibly Randomized Coordinate Descent Methods for computing Extreme Eigenpairs of Symmetric Matrices
收藏 引用
Numerical Linear Algebra with Applications 2025年 第2期32卷
作者: Bai, Zhong-Zhi Chen, Yan-Qi State Key Laboratory of Mathematical Sciences State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China
For solving symmetric eigenvalue problems of extremely large matrices that cannot be stored in a whole in the computer memory, we propose a class of admissibly randomized coordinate descent methods by minimizing the c... 详细信息
来源: 评论
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 评论
Non-binary entanglement-assisted quantum stabilizer codes
收藏 引用
Science China(Information Sciences) 2017年 第4期60卷 210-223页
作者: Lan LUO Zhi MA Zhengchao WEI Riguang LENG State Key Laboratory of Mathematical Engineering and Advanced Computing
In this paper, we present the pm-ary entanglement-assisted(EA) stabilizer formalism, where p is a prime and m is a positive integer. Given an arbitrary non-abelian "stabilizer", the problem of code construct... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论
Minimizing transformer inference overhead using controlling element on Shenwei AI accelerator
收藏 引用
Frontiers of Information Technology and Electronic engineering 2025年 第4期26卷 605-622页
作者: Zhao, Yulong Wu, Chunzhi Wang, Yizhuo Zhang, Lufei Zhang, Yaguang Shen, Wenyuan Fan, Hao Fang, Hankang Qin, Yi Liu, Xin State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China School of Non-Commissioned Officer Space Engineering University Beijing100004 China National Supercomputing Center in Wuxi Wuxi214000 China Zhejiang Lab Hangzhou310000 China National Research Centre of Parallel Computer Engineering and Technology Beijing100081 China
Transformer models have become a cornerstone of various natural language processing (NLP) tasks. However, the substantial computational overhead during the inference remains a significant challenge, limiting their dep... 详细信息
来源: 评论
An Adaptive Proximal Inexact Gradient Framework and Its Application to Per-Antenna Constrained Joint Beamforming and Compression Design
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Xilai Jiang, Bo Liu, Ya-Feng State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China
In this paper, we propose an adaptive proximal inexact gradient (APIG) framework for solving a class of nonsmooth composite optimization problems involving function and gradient errors. Unlike existing inexact proxima... 详细信息
来源: 评论
A Further Understanding of Differential-Linear Cryptanalysis
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 660-666页
作者: REN Jiongjiong CHEN Shaozhen State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Cryptology
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the ***, the links between differential-lin... 详细信息
来源: 评论
ThicknesVAE: Learning a Latera Prior for Clothed Human Body Reconsuction
ThicknesVAE: Learning a Latera Prior for Clothed Human Body ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wu, Xiaotao Fan, Zhaoxin He, Huiguang Shen, Dinggang School of Biomedical Engineering State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai201210 China NeuBCI Group State Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Institute of Automation Chinese Academy of Sciences Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beihang University Beijing100191 China Beijing Academy of Blockchain and Edge Computing China Shanghai United Imaging Intelligence Co. Ltd. Shanghai200232 China Shanghai Clnical Research and Trial Center Shanghai201210 China
Sandwich-like structures have shown remarkable efficacy in clothed human reconstruction. However, these approaches often generate unrealistic side geometries due to inadequate handling of lateral regions. This paper a... 详细信息
来源: 评论
Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
收藏 引用
Communications in Theoretical Physics 2015年 第3期63卷 296-302页
作者: 王卫龙 高明 马智 State Key Laboratory of Mathematical Engineering and Advanced Computing
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论