咨询与建议

限定检索结果

文献类型

  • 1,879 篇 期刊文献
  • 924 篇 会议

馆藏范围

  • 2,803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,691 篇 理学
    • 987 篇 物理学
    • 602 篇 数学
    • 174 篇 统计学(可授理学、...
    • 172 篇 化学
    • 130 篇 生物学
    • 96 篇 系统科学
    • 91 篇 地球物理学
    • 71 篇 天文学
  • 1,649 篇 工学
    • 811 篇 计算机科学与技术...
    • 657 篇 软件工程
    • 223 篇 电子科学与技术(可...
    • 212 篇 信息与通信工程
    • 196 篇 电气工程
    • 165 篇 材料科学与工程(可...
    • 160 篇 化学工程与技术
    • 157 篇 控制科学与工程
    • 135 篇 核科学与技术
    • 120 篇 光学工程
    • 104 篇 生物工程
    • 83 篇 力学(可授工学、理...
    • 79 篇 机械工程
    • 79 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 64 篇 仪器科学与技术
    • 59 篇 生物医学工程(可授...
    • 58 篇 冶金工程
  • 252 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 50 篇 医学
    • 45 篇 临床医学
  • 41 篇 法学
  • 22 篇 经济学
  • 18 篇 农学
  • 15 篇 军事学
  • 9 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 51 篇 hadron colliders
  • 39 篇 machine learning
  • 38 篇 higgs bosons
  • 37 篇 feature extracti...
  • 36 篇 deep learning
  • 36 篇 branching fracti...
  • 35 篇 lepton colliders
  • 32 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 particle decays
  • 27 篇 particle data an...
  • 26 篇 training
  • 26 篇 nuclear structur...
  • 25 篇 relativistic hea...
  • 25 篇 security
  • 23 篇 supersymmetric m...
  • 23 篇 software
  • 23 篇 extensions of hi...
  • 23 篇 hadronic decays

机构

  • 540 篇 state key labora...
  • 264 篇 department of mo...
  • 239 篇 faculty of scien...
  • 238 篇 department for p...
  • 236 篇 west university ...
  • 232 篇 department of ph...
  • 226 篇 department of ph...
  • 222 篇 infn e laborator...
  • 221 篇 kirchhoff-instit...
  • 219 篇 department of ph...
  • 219 篇 department of ph...
  • 207 篇 department physi...
  • 203 篇 research center ...
  • 200 篇 fakultät für phy...
  • 197 篇 institute of phy...
  • 194 篇 graduate school ...
  • 194 篇 institute of phy...
  • 181 篇 department of ph...
  • 179 篇 instituto de fís...
  • 173 篇 faculté des scie...

作者

  • 185 篇 d. calvet
  • 173 篇 j. m. izen
  • 171 篇 c. alexa
  • 171 篇 g. bella
  • 171 篇 c. amelung
  • 170 篇 n. orlando
  • 169 篇 j. strandberg
  • 168 篇 y. tayalati
  • 168 篇 g. spigo
  • 168 篇 v. chiarella
  • 168 篇 f. siegert
  • 164 篇 a. dimitrievska
  • 164 篇 f. deliot
  • 160 篇 r. ströhmer
  • 156 篇 m. rijssenbeek
  • 155 篇 s. jin
  • 155 篇 g. gaudio
  • 154 篇 y. abulaiti
  • 153 篇 y. tu
  • 153 篇 w. j. fawcett

语言

  • 2,640 篇 英文
  • 104 篇 其他
  • 61 篇 中文
检索条件"机构=State key laboratory of mathematics engineering and advanced computing"
2803 条 记 录,以下是51-60 订阅
排序:
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
The exactness of the l_(1)penalty function for a class of mathematical programs with generalized complementarity constraints
收藏 引用
Fundamental Research 2024年 第6期4卷 1459-1464页
作者: Yukuan Hu Xin Liu State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China
In a mathematical program with generalized complementarity constraints(MPGCC),complementarity relation is imposed between each pair of variable *** includes the traditional mathematical program with complementarity co... 详细信息
来源: 评论
Spherical Magnetic Fe-Alginate Microgels Fabricated by Droplet-Microfluidics Combining with an External Crosslinking Approach and the Study of Their pH Dependent Fe^(3+) Release Behaviors
收藏 引用
Chinese Journal of Polymer Science 2025年 第2期43卷 289-302页
作者: Jie Chen Run-Yu Yu ai-Qi Wang Zhe-Yu Zhang Arezoo Ardekani Yuan-Du Hu Department of Materials Science and Engineering School of Physics Science and EngineeringBeijing Jiaotong UniversityBeijing100044China Guangdong Provincial Key Laboratory of Technique and Equipment for Macromolecular Advanced Manufacturing South China University of TechnologyGuangzhou510641China State Key Laboratory of Molecular Engineering of Polymers Fudan UniversityShanghai200438China Department of Mathematics School of Mechanical EngineeringPurdue University585 Purdue MallWest LafayetteIN47907-2088USA
Due to the rapid development and potential applications of iron(Ⅲ)-alginate(Fe-Alg)microgels in biomedical as well as environmental engineering,this study explores the preparation and characterization of spherical Fe... 详细信息
来源: 评论
Accelerating the cryo-EM structure determination in RELION on GPU cluster
收藏 引用
Frontiers of Computer Science 2022年 第3期16卷 21-39页
作者: Xin YOU Hailong YANG Zhongzhi LUAN Depei QIAN Sino-German Joint Software Institute School of Computer Science and EngineeringBeihang UniversityBeijing 100191China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determi... 详细信息
来源: 评论
Packet Modification and Utilization Technology of SOHO Router  2
Packet Modification and Utilization Technology of SOHO Route...
收藏 引用
2nd International Conference on advanced Manufacturing Technology and Manufacturing Systems, ICAMTMS 2023
作者: Gai, Xianzhe Cai, Ruijie Jia, Fan Chen, Hongwei Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing 62 Science Ave. Zhengzhou450001 China
As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet... 详细信息
来源: 评论
A Review of Few-Shot Network Traffic Classification Based on Deep Learning
A Review of Few-Shot Network Traffic Classification Based on...
收藏 引用
2023 International Conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Yang, Kai Wang, Ruo Nan Meng, Qi Meng, Long Qi, Zan Li, Xue Fei, Jin Long State Key Laboratory of Mathematical Engineering And Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i... 详细信息
来源: 评论
The convergence properties of infeasible inexact proximal alternating linearized minimization
收藏 引用
Science China mathematics 2023年 第10期66卷 2385-2410页
作者: Yukuan Hu Xin Liu State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China
The proximal alternating linearized minimization(PALM)method suits well for solving blockstructured optimization problems,which are ubiquitous in real *** the cases where subproblems do not have closed-form solutions,... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey  4
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Tang, Yonghe Wang, Huanwei Liu, Tieming Jing, Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论