咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 778 篇 期刊文献

馆藏范围

  • 1,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,036 篇 工学
    • 622 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 135 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 100 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 81 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 77 篇 网络空间安全
    • 64 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 751 篇 理学
    • 424 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 87 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 108 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 95 篇 university of ch...
  • 88 篇 key laboratory f...
  • 86 篇 department of ph...
  • 84 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 national space s...
  • 80 篇 school of physic...
  • 70 篇 department of en...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 76 篇 danzengluobu
  • 75 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 69 篇 liu b.
  • 68 篇 liu d.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 68 篇 guo y.q.
  • 67 篇 chen m.j.
  • 67 篇 bao y.w.
  • 66 篇 hu h.b.
  • 65 篇 liu h.d.
  • 64 篇 li cheng
  • 64 篇 mao j.r.
  • 64 篇 fan y.z.

语言

  • 1,457 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1589 条 记 录,以下是361-370 订阅
排序:
A BOW-Based Sentence Embedding Method for Chinese Event Identification  4
A BOW-Based Sentence Embedding Method for Chinese Event Iden...
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Gao, Lizheng Zhou, Gang Luo, Junyong State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which... 详细信息
来源: 评论
Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model  7
Moving Target Defense Decision-Making Method: A Dynamic Mark...
收藏 引用
7th ACM Workshop on Moving Target Defense, MTD 2020
作者: Zhang, Hengwei Tan, Jinglei Liu, Xiaohu Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment  6
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Wang, Can Liu, Xiaonan Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph  6
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Gu, Yanyang Zhang, Ping Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Full description of dipole orientation in organic light-emitting diodes
收藏 引用
Chinese Optics Letters 2023年 第2期21卷 92-98页
作者: 范灵杰 赵茂雄 楚娇 沈唐尧 郑敏嘉 关放 殷海玮 石磊 资剑 Department of Physics Key Laboratory of Micro-and Nano-Photonic Structures(Ministry of Education)and State Key Laboratory of Surface PhysicsFudan UniversityShanghai 200433China Shanghai Engineering Research Center of Optical Metrology for Nano-fabrication(SERCOM) Shanghai 200433China Institute for Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200438China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China
Considerable progress has been made in organic light-emitting diodes(OLEDs)to achieve high external quantum efficiency,among which dipole orientation has a remarkable *** most cases,the radiation of the dipoles in OLE... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zhaorui Ma Shicheng Zhang Yiheng Chang Qinglei Zhou Xinhao Hu Xia Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Heng Jiang Lichun Li Hailong Zhang Hongyi Pan Xue Li College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
On the Sharing-Based Model of Steganography  19th
On the Sharing-Based Model of Steganography
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Xianfeng Yang, Chunfang Liu, Fenlin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Steganography has long been considered as a way of hiding the fact of secret communication. However, the fact that a message sender and a receiver communicated with each other is seldom protected. It can be dangerous ... 详细信息
来源: 评论
Hot Spot Locating and Optimization of Calculation Errors in Arithmetic Expressions  7
Hot Spot Locating and Optimization of Calculation Errors in ...
收藏 引用
7th International Symposium on Advances in Electrical, Electronics, and Computer engineering
作者: Jinchen, Xu Yuanyuan, Xia Jiangwei, Hao Hao, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing No. 62 Science Avenue High-Tech Zone Henan Zhengzhou450001 China National Key Laboratory of Science and Technology on Integrated Information Systems Technology Institute of Software Chinese Academy of Sciences No. 4 Zhongguancun South Fourth Street Haidian District Beijing10190 China
Error analysis is an important support for improving the precision of floating-point calculations. However, the floating-point error distribution does not have dominant characteristics, making it difficult to optimize... 详细信息
来源: 评论