咨询与建议

限定检索结果

文献类型

  • 1,085 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,257 篇 工学
    • 703 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 175 篇 信息与通信工程
    • 171 篇 电气工程
    • 122 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 83 篇 网络空间安全
    • 70 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 549 篇 物理学
    • 385 篇 数学
    • 124 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 38 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 615 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 65 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=The State Key Laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是231-240 订阅
排序:
A Bidirectional Data Packet Tampering Method for Linux System
A Bidirectional Data Packet Tampering Method for Linux Syste...
收藏 引用
2022 International Conference on Network Communication and Information Security, ICNCIS 2022
作者: Lv, Siou Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method... 详细信息
来源: 评论
Measurement-Based Non-Stationary Markov Tapped Delay Line Channel Model for 5G-Railways
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Zhang, Xuejian He, Ruisi Yang, Mi Ding, Jianwen Chen, Ruifeng Gao, Shuaiqi Qi, Ziyi Zhang, Zhengyu Ai, Bo Zhong, Zhangdui Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Electronics and Information Engineering The Frontiers Science Center for Smart High-speed Railway System Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Henan High Speed Railway Operation and Maintenance Engineering Research Center Zhengzhou451460 China China Academy of Railway Sciences Corporation Ltd. Institute of Computing Technology Beijing100081 China
5 G for Railways (5G-R) is globally recognized as a promising next-generation railway communication system designed to meet increasing demands. Channel modeling serves as foundation for communication system design, wi... 详细信息
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan The Beijing Key Laboratory of Network System Architecture and Convergence The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing China Singapore The Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Department of Industrial and Systems Engineering University of Miami Coral GablesFL33146 United States The College of Information Science and Electronic Engineering Zhejiang University Zhejiang Hangzhou310027 China The Department of Computer Science North Carolina State University RaleighNC27695 United States The Beijing Key Laboratory of Network System Architecture and Convergence China The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously collects f... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
Beating stripe solitons arising from helicoidal spin-orbit coupling in Bose-Einstein condensates
收藏 引用
Physical Review E 2025年 第4期111卷 044203-044203页
作者: Cui-Cui Ding Qin Zhou B. A. Malomed Research Group of Nonlinear Optical Science and Technology Research Center of Nonlinear Science School of Mathematical and Physical Sciences Wuhan Textile University Wuhan 430200 China State Key Laboratory of New Textile Materials and Advanced Processing Wuhan Textile University Wuhan 430200 China Department of Physical Electronics School of Electrical Engineering Faculty of Engineering and the Center for Light-Matter University Tel Aviv University Tel Aviv Israel Instituto de Alta Investigación Universidad de Tarapacá Casilla 7D Arica Chile
We demonstrate that the model of a spatially nonuniform two-component Bose-Einstein condensates (BEC) featuring the helicoidal spin-orbit coupling (SOC), gives rise to dark-bright soliton complexes characterized by sp... 详细信息
来源: 评论
A Robust Deep Learning-Based DOA Super-Resolution Estimation Method With Single Snapshot
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Luo, Tao Chen, Peng Yang, Zihan Zheng, Le Zhang, Yudong Liu, Jun Southeast University State Key Laboratory of Millimeter Waves Nanjing 210096 China Beijing Institute of Technology School of Information and Electronics Beijing 100081 China Beijing Institute of Technology Chongqing Innovation Center Chongqing 401120 China University of Leicester School of Computing and Mathematical Sciences Leicester LE1 7RH United Kingdom Army Engineering University of PLA National Key Laboratory on Electromagnetic Environment Effects and Electro-optical Engineering Nanjing 210007 China
At present, deep learning (DL) has attracted widespread attention and has been widely applied in different areas of wireless communication, and signal processing. Due to its excellent feature extraction capability, it... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Empirical investigation of stochastic local search for maximum satisfiability
收藏 引用
Frontiers of Computer Science 2019年 第1期13卷 86-98页
作者: Yi CHU Chuan LUO Shaowei CAI Haihang YOU State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China University of Chinese Academy of Sciences Beijing 100049China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
The maximum satisfiability (MAX-SAT)problem is an important NP-hard problem in theory,and has a broad range of applications in *** local search (SLS)is becoming an increasingly popular method for solving ***,a powerfu... 详细信息
来源: 评论
A Routing Recovery Method Based on Structure Properties and Centralized Control for Inter Domain Routing System  17
A Routing Recovery Method Based on Structure Properties and ...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Yi Guo Juwei Yan Liancheng Zhang Han Qiu Institute for Network Science and Cyberspace Tsinghua University State Key Laboratory of Mathematical Engineering and Advanced Computing
The network attack against inter domain routing system becomes more and more complex, especially in recent years there has appeared a new kind of attacks, that is a LDoS-based cross plane attack. Due to such attacks h... 详细信息
来源: 评论
Multiple Images Steganography of JPEG Images Based on Optimal Payload Distribution
收藏 引用
Computer Modeling in engineering & Sciences 2020年 第10期125卷 417-436页
作者: Yang Pei Xiangyang Luo Yi Zhang Liyan Zhu Zhong Yuan Network Security Research Institute Zhengzhou UniversityZhengzhou450000China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during ***,the main multiple images steganography algorithms mainly distribute the p... 详细信息
来源: 评论