咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是1551-1560 订阅
排序:
Spin-valley-controlled photonic topological insulator
arXiv
收藏 引用
arXiv 2018年
作者: Xue, Haoran Gao, Fei Yu, Yang Chong, Yidong Shvets, Gennady Zhang, Baile State Key Laboratory of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore637371 Singapore School of Applied and Engineering Physics Cornell University IthacaNY14853 United States Centre for Disruptive Photonic Technologies Nanyang Technological University Singapore637371 Singapore Key Lab. of Advanced Micro/Nano Electronic Devices and Smart Systems of Zhejiang Electromagnetics Academy Zhejiang University Zhejiang University Hangzhou310027 China
The discovery of photonic topological insulators (PTIs)1-3 has opened the door to fundamentally new topological states of light. Current time-reversal-invariant PTIs emulate either the quantum spin Hall (QSH) effect4-... 详细信息
来源: 评论
Random asynchronous iterations in distributed coordination algorithms
arXiv
收藏 引用
arXiv 2018年
作者: Chen, Yao Xia, Weiguo Cao, Ming Lü, Jinhu Department of Computer Science Southwestern University of Finance and Economics Chengdu611130 China School of Control Science and Engineering Dalian University of Technology Dalian116024 China Faculty of Science and Engineering ENTEG University of Groningen Groningen9747 AG Netherlands School of Automation Science and Electrical Engineering State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China
Distributed coordination algorithms (DCA) carry out information processing processes among a group of networked agents without centralized information fusion. Though it is well known that DCA characterized by an SIA (... 详细信息
来源: 评论
Rapid detection of stego images based on identifiable features  18
Rapid detection of stego images based on identifiable featur...
收藏 引用
18th International Conference on advanced Communications Technology, ICACT 2016
作者: Pang, Weiwei Luo, Xiangyang Ren, Jie Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Zhengzhou Science and Technology Institute Zhengzhou450001 China Science and Technology on Information Assurance Laboratory Beijing100072 China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden... 详细信息
来源: 评论
A framework for test data generation of object-oriented programs based on complete testing chain
A framework for test data generation of object-oriented prog...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Gang Li Lei Yu Huihui Sun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Test data generation is always a hot topic in software testing since efficient test data generation method can significantly increase the efficiency of software testing and decrease the cost. Method call relation and ... 详细信息
来源: 评论
A method of metamorphic relations constructing for object-oriented software testing
A method of metamorphic relations constructing for object-or...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Xinglong Zhang Lei Yu Xuemei Hou State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To solve the Oracle problem of methods sequence in object-oriented software testing, a method of metamorphic relations constructing for object-oriented software testing based on algebraic specification was proposed. F... 详细信息
来源: 评论
Eavesdropper’s ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence
arXiv
收藏 引用
arXiv 2019年
作者: Chaiwongkhot, Poompong Kuntz, Katanya B. Zhang, Yanbao Huang, Anqi Bourgoin, Jean-Philippe Sajeed, Shihan Lütkenhaus, Norbert Jennewein, Thomas Makarov, Vadim Institute for Quantum Computing University of Waterloo WaterlooONN2L 3G1 Canada Department of Physics and Astronomy University of Waterloo WaterlooONN2L 3G1 Canada NTT Basic Research Laboratories NTT Corporation AtsugiKanagawa Japan NTT Research Center for Theoretical Quantum Physics NTT Corporation AtsugiKanagawa Japan Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Aegis Quantum WaterlooON Canada Department of Electrical and Computer Engineering University of Toronto M5S 3G4 Canada Quantum Information Science Program Canadian Institute for Advanced Research TorontoONM5G 1Z8 Canada Russian Quantum Center Skolkovo Moscow143025 Russia Shanghai Branch National Laboratory for Physical Sciences at Microscale and CAS Center for Excellence in Quantum Information University of Science and Technology of China Shanghai201315 China NTI Center for Quantum Communications National University of Science and Technology MISiS Moscow119049 Russia
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously de... 详细信息
来源: 评论
Secure and efficient smart card based remote user password authentication scheme
收藏 引用
International Journal of Network Security 2016年 第4期18卷 782-792页
作者: Wei, Jianghong Liu, Wenfen Hu, Xuexian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450002 China
In distributed systems, the smart card based password authentication, as one of the most convenient and efficienttwo-factor authentication mechanisms, is widely used toensure that the protected services are not availa... 详细信息
来源: 评论
Two-Step Fabrication of Li4Ti5O12-Coated Carbon Nanofibers as a Flexible Film Electrode for High-Power Lithium-Ion Batteries
收藏 引用
ChemElectroChem 2017年 第9期4卷 2286-2292页
作者: Zhang, Zhaobao Deng, Xiang Sunarso, Jaka Cai, Rui Chu, Shiyong Miao, Jie Zhou, Wei Shao, Zongping Jiangsu National Synergetic Innovation Center for Advanced Materials State Key Laboratory of Materials-Oriented Chemical Engineering College of Chemical Engineering Nanjing Tech University No.5 Xin Mofan Road Nanjing 210009 China College of Energy Nanjing Tech University No.5 Xin Mofan Road Nanjing 210009 China Department of Chemical Engineering Curtin University Perth 6845 WA Australia Faculty of Engineering Computing and Science Swinburne University of Technology Jalan Simpang Tiga Kuching Sarawak 93350 Malaysia
A self-standing nonwoven flexible Li4Ti5O12/carbon nanofiber composite (denoted LTO/CNF) was synthesized by using a facile method involving the electrospinning fabrication of CNFs and chemical deposition of LTO over t... 详细信息
来源: 评论
Entity disambiguation with markov logic network knowledge graphs
收藏 引用
International Journal of Performability engineering 2017年 第8期13卷 1293-1303页
作者: Ma, Jiangtao Wei, Tao Qiao, Yaqiong Huang, Yongzhong Xie, Weibo Zhang, Chaoqin Wang, Yanjun Zhan, Rui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China Zhengzhou University of Light Industry Zhengzhou450002 China National Digital Switching System Engineering and Technological R and D Center Zhengzhou451000 China Henan Institute of Engineering Computer College Zhengzhou451000 China North China University of Water Resources and Electric Power Zhengzhou450002 China
Disambiguating named entities is an important problem in natural language processing, knowledge base, question answering systems. In the paper, we propose a Markov logic network knowledge graph solution for solving en... 详细信息
来源: 评论
A hidden service model based on HS-HS anonymous network
收藏 引用
AIP Conference Proceedings 2017年 第1期1890卷
作者: Yitong Meng Xing Zhao Jinlong Fei Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmiss...
来源: 评论