咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是1831-1840 订阅
排序:
Dynamic evolution of collective emotions in social networks: a case study of Sina weibo
收藏 引用
Science China(Information Sciences) 2013年 第7期56卷 150-167页
作者: XIONG XiaoBing ZHOU Gang HUANG YongZhong CHEN HaiYong XU Ke State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Software Development Environment Beihang University
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in O... 详细信息
来源: 评论
A Malware Threat Decision Model Based on Dynamic Multi-Source Data Acquisition
A Malware Threat Decision Model Based on Dynamic Multi-Sourc...
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Di SUN Jian-min PANG Chao DAI State Key Laboratory of Mathematical Engineering and Advanced Technological Research Center
With the continuous advent of malware, in order to improve the utilization ratio of resources and deal with the threat of malware effectively, in this paper, we provide a malware threats decision model for multilevel ... 详细信息
来源: 评论
A Thread-Aware Adaptive Data Prefetcher
A Thread-Aware Adaptive Data Prefetcher
收藏 引用
IEEE International Conference on Computer Design: VLSI in Computers and Processors, (ICCD)
作者: Jiyang Yu Peng Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Department of Information Science and Electronic Engineering Zhejiang University Hangzhou China
Most processors employ hardware data prefetching to hide memory access latencies. However the prefetching requests from different threads on a multi-core processor can cause severe interference with prefetching and/or... 详细信息
来源: 评论
Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k-module
Cryptanalysis of an Implementation of TTM Cryptosystems Base...
收藏 引用
2013 International Conference on advanced Computer Science and Electronics Information(ICACSEI 2013)
作者: Hongwei Tao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouChina China National Digital Switching System Engineering and Technological Research Center
TTM cryptosystems proposed by *** are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q 8 -module. Un... 详细信息
来源: 评论
Improving guide-based vulnerability detection with hybrid symbolic execution
Improving guide-based vulnerability detection with hybrid sy...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yongji Ouyang Shuai Zeng Chao Yang Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Management and Control for Complex System Institute of Automation Chinese Academy of Sciences Beijing China
Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detect... 详细信息
来源: 评论
Program Crash Analysis Based on Taint Analysis
Program Crash Analysis Based on Taint Analysis
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Zhang Puhan Wu Jianxiong Wang Xin Zehui Wu China Information Technology Security Evaluation Center Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception an... 详细信息
来源: 评论
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition
Cryptographic Algorithms Analysis Technology Research Based ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Rui Chang Liehui Jiang Hui Shu Hongqi He MEAC State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptogr... 详细信息
来源: 评论
Parallelized Race Detection Based on GPU Architecture
Parallelized Race Detection Based on GPU Architecture
收藏 引用
10th Annual Conference of advanced Computer Architecture, ACA 2014
作者: Dai, Zhuofang Zhang, Zheng Wang, Haojun Li, Yi Zhang, Weihua Software School Fudan University Shanghai China Shanghai Key Laboratory of Data Science Fudan University Shanghai China Parallel Processing Institute Fudan University Shanghai 201203 China State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou 450001 China
In order to harness abundant hardware resources, parallel programming has become a necessity in multicore era. However, parallel programs are prone to concurrency bugs, especially data races. Even worse, current softw... 详细信息
来源: 评论
Chip waveforms attribute recognition model research and design
Chip waveforms attribute recognition model research and desi...
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Xiao, Da Feng, Jing Zhu, Yue Fei Peng, Fei Lan, Jing Hong Computer network department ZhengZhou Information Science University ZhengZhouHeNan China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhouHeNan China Urumqi General Hospital of PLA.Urumqi 7 Jianxue Street Xinjiang Uygur Zizhiqu Jinshui District ZhengZhouHeNan China
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche... 详细信息
来源: 评论
Dense matter with eXTP
arXiv
收藏 引用
arXiv 2018年
作者: Watts, Anna L. Yu, Wenfei Poutanen, Juri Zhang, Shu Bhattacharyya, Sudip Bogdanov, Slavko Ji, Long Patruno, Alessandro Riley, Thomas E. Bakala, Pavel Baykal, Altan Bernardini, Federico Bombaci, Ignazio Brown, Edward Cavecchi, Yuri Chakrabarty, Deepto Chenevez, Jérôme Degenaar, Nathalie Santo, Melania Del Salvo, Tiziana Di Doroshenko, Victor Falanga, Maurizio Ferdman, Robert D. Feroci, Marco Gambino, Angelo F. Ge, MingYu Greif, Svenja K. Guillot, Sebastien Gungor, Can Hartmann, Dieter H. Hebeler, Kai Heger, Alexander Homan, Jeroen Iaria, Rosario in’t Zand, Jean Kargaltsev, Oleg Kurkela, Aleksi Lai, Xiaoyu Li, Ang Li, XiangDong Li, Zhaosheng Linares, Manuel Lu, FangJun Mahmoodifar, Simin Méndez, Mariano Miller, M. Coleman Morsink, Sharon Nättilä, Joonas Possenti, Andrea Prescod-Weinstein, Chanda Qu, JinLu Riggio, Alessandro Salmi, Tuomo Sanna, Andrea Santangelo, Andrea Schatz, Hendrik Schwenk, Achim Song, LiMing Šrámková, Eva Stappers, Benjamin Stiele, Holger Strohmayer, Tod Tews, Ingo Tolos, Laura Török, Gabriel Tsang, David Urbanec, Martin Vacchi, Andrea Xu, RenXin Xu, Ypeng Zane, Silvia Zhang, Guobao Zhang, ShuangNan Zhang, Wenda Zheng, ShiJie Zhou, Xia Anton Pannekoek Institute for Astronomy University of Amsterdam Science Park 904 Amsterdam1098 XH Netherlands Shanghai Astronomical Observatory Shanghai200030 China Tuorla Observatory Department of Physics and Astronomy University of Turku Väisäläntie 20 PiikkiöFIN-21500 Finland Nordita KTH Royal Institute of Technology Stockholm University Roslagstullsbacken 23 StockholmSE-10691 Sweden Institute of High Energy Physics CAS Beijing100049 China Tata Institute of Fundamental Research Mumbai400005 India Columbia Astrophysics Laboratory Columbia University 550 West 120th Street New YorkNY10027 United States Institut für Astronomie und Astrophysik Tübingen Universität Tübingen Sand 1 TübingenD-72076 Germany Leiden Observatory Leiden University PO Box 9513 Leiden2300 RA Netherlands Research Center for Computational Physics and Data Processing Silesian University in Opava Bezrucovo nam. 13 OpavaCZ-74601 Czech Republic Physics Department Middle East Technical University Ankara06531 Turkey INAF Osservatorio Astronomico di Roma Via Frascati 33 Monteporzio CatoneI-00078 Italy New York University Abu Dhabi PO Box 129188 Abu Dhabi United Arab Emirates Dipartimento di Fisica Enrico Fermi University of Pisa PisaI-56127 Italy INFN Italian National Institute for Nuclear Physics Pisa Section Pisa56127 Italy Department of Physics and Astronomy Michigan State University East LansingMI48824 United States Department of Astrophysical Sciences Princeton University Peyton Hall PrincetonNJ08544 United States Mathematical Sciences and STAG Research Centre University of Southampton SouthamptonSO17 1BJ United Kingdom MIT Kavli Institute for Astrophysics and Space Research CambridgeMA02139 United States DTU Space Technical University of Denmark Elektrovej 327-328 Kgs Lyngby2800 Denmark INAF/IASF Palermo via Ugo La Malfa 153 PalermoI-90146 Italy Universita degli Studi di Palermo Dipartimento di Fisica e Chimica via Archira 36 Palermo90123 Italy
In this White Paper we present the potential of the Enhanced X-ray Timing and Polarimetry (eXTP) mission for determining the nature of dense matter;neutron star cores host an extreme density regime which cannot be rep... 详细信息
来源: 评论