咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是1581-1590 订阅
排序:
Glucose Oxidase Sensing: 3D Macroporous Zinc Compound/Silicone Hybrid Foams for Amperometric Sensing of Glucose Oxidase (Global Challenges 2/2019)
收藏 引用
Global Challenges 2019年 第2期3卷 1970021-1970021页
作者: Ye Wu Hao Fu Weiwei Xie Yingcheng Lin Orhan Kizilkaya Jian Xu Division of Electrical and Computer Engineering Louisiana State University Baton Rouge LA 70803 USA Department of Mechanical Engineering Mcgill University 817 Sherbrooke St. West Montreal Quebec H3A 0C3 Canada Department of Chemistry Louisiana State University Baton Rouge LA 70803 USA Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) of Ministry of Education Chongqing 400044 China College of Communication Engineering Chongqing University Chongqing 400044 China Center for Advanced Microstructures and Devices Louisiana State University 6980 Jefferson Hwy. Baton Rouge LA 70806 USA
来源: 评论
Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
Vulnerability Analysis for Complex Networks under the Shorte...
收藏 引用
2016 International Conference on Communications, Information Management and Network Security (CIMNS2016)
作者: Yaohui Hao Jihong Han Qinghua Cheng Yongjin Hu Zhengzhou Institute of Information Science and technology State Key Laboratory of Mathematical Engineering and Advanced Computing
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random ... 详细信息
来源: 评论
Research on undergraduate thesis' s tutor allocation based on Dynamic Game Model of Incomplete Information
Research on undergraduate thesis' s tutor allocation based o...
收藏 引用
2016 3rd International Conference on Education,Management and computing Technology(ICEMCT 2016)
作者: Hengwei Zhang Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing
Fairness is the prerequisite to the undergraduate thesis' s tutor allocation, which means students have the priority for choosing tutors. Because of rich experience and authoritative discourse power, the senior tu... 详细信息
来源: 评论
Tunable disorder and localization in the rare-earth nickelates
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Changan Chang, Ching-Hao Huang, Angus Wang, Pei-Chun Wu, Ping-Chun Yang, Lin Xu, Chi Pandey, Parul Zeng, Min Böttger, Roman Jeng, Horng-Tay Zeng, Yu-Jia Helm, Manfred Chu, Ying-Hao Ganesh, R. Zhou, Shengqiang Helmholtz-Zentrum-Dresden-Rossendorf Bautzner Landstraße 400 Dresden01328 Germany Technische Universität Dresden Dresden01062 Germany Shenzhen Key Laboratory of Laser Engineering College of Optoelectronic Engineering Shenzhen University Shenzhen518060 China Leibniz-Institute for Solid State and Materials Research Helmholtzstraße 20 Dresden01069 Germany Department of Physics National Tsing Hua University Hsinchu30043 Taiwan Department of Materials Science and Engineering National Chiao Tung University Hsinchu Taiwan Institute for Advanced Materials Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials South China Normal University Guangzhou51006 China Institute of Physics Academia Sinica Taipei11529 Taiwan Center for Emergent Functional Matter Science National Chiao Tung University Hsinchu30010 Taiwan Institute of Mathematical Sciences HBNI C I T Campus Chennai600113 India
The rare-earth nickelates are a rich playground for transport properties, known to host non-Fermi liquid character, resistance saturation and metal-insulator transitions. We report a study of transport in LaNiO3 in th... 详细信息
来源: 评论
Battery Swapping Assignment for Electric Vehicles: A Bipartite Matching Approach
Battery Swapping Assignment for Electric Vehicles: A Biparti...
收藏 引用
IEEE Annual Conference on Decision and Control
作者: Pengcheng You John Z. F. Pang Minghua Chen Steven H. Low Youxian Sun State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou China Department of Computing and Mathematical Sciences California Institute of Technology Pasadena CA USA Department of Information Engineering The Chinese University of Hong Kong Hong Kong China
This paper formulates an optimal station assignment problem for electric vehicle (EV) battery swapping that takes into account both temporal and spatial couplings. The goal is to reduce the total EV cost and station c... 详细信息
来源: 评论
Joint power and admission control based on channel distribution information: A novel two-timescale approach
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Qitian Kang, Dong He, Yichu Chang, Tsung-Hui Liu, Ya-Feng School of Mathematical Sciences Peking University Beijing100871 China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China School of Science and Engineering Chinese University of Hong Kong Shenzhen Research Institute of Big Data Shenzhen518172 China
In this letter, we consider the joint power and admission control (JPAC) problem by assuming that only the channel distribution information (CDI) is available. Under this assumption, we formulate a new chance (probabi... 详细信息
来源: 评论
Construction of One-Gray Weight Codes and Two-Gray Weight Codes over Z4+uZ4
收藏 引用
Journal of Systems Science & Complexity 2016年 第5期29卷 1472-1484页
作者: SHI Minjia WANG Dandan GAO Jian WU Bo Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei 230039 China National Mobile Communications Research Laboratory Southeast University Nanjing 210096China School of Mathematical Sciences Anhui University Hefei 230601 China. School of Science Shandong University of Technology Zibo 255091 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Bcijing 100093 China
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over Z_4 +uZ_4(u^2=u) with type 16^(k_1)8^... 详细信息
来源: 评论
City-level geolocation algorithm of network entities based on landmark clustering
City-level geolocation algorithm of network entities based o...
收藏 引用
International Conference on advanced Communication Technology (ICACT)
作者: Guang Zhu Xiangyang Luo Fenlin Liu Fan Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou China
For the existing network entity geolocation algorithms based on the delay measurement are usually suffer from the inflation and jitter of the network delay, a new algorithm of city-level geolocation based on landmark ... 详细信息
来源: 评论
IP city-level geolocation based on the PoP-level network topology analysis
IP city-level geolocation based on the PoP-level network top...
收藏 引用
International Conference on Information Communication and Management (ICICM)
作者: Siqi Liu Fenlin Liu Fan Zhao Lixiang Chai Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou China
In view of that the reliability of existing typical IP city-level geolocation approaches are limited to the delay measurement accuracy, IP targets reachability and other factors, this paper proposed an IP city-level g... 详细信息
来源: 评论
An effective usage and access control scheme for preventing permission leak in a trusted execution environment  16
An effective usage and access control scheme for preventing ...
收藏 引用
6th International Conference on Communication and Network Security, ICCNS 2016
作者: Chang, Rui Jiang, Liehui Yin, Qing Ren, Lu Liu, Qingfeng State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou450001 China China National Digital Switching System Engineering Technological Research Center Zhengzhou450001 China
In the universal Android system, each application runs in its own sandbox, and the permission mechanism is used to enforce access control to the system APIs and applications. However, permission leak could happen when... 详细信息
来源: 评论