咨询与建议

限定检索结果

文献类型

  • 4,529 篇 期刊文献
  • 1,827 篇 会议
  • 3 册 图书

馆藏范围

  • 6,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,841 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,215 篇 软件工程
    • 498 篇 电子科学与技术(可...
    • 472 篇 化学工程与技术
    • 454 篇 电气工程
    • 443 篇 信息与通信工程
    • 355 篇 控制科学与工程
    • 340 篇 材料科学与工程(可...
    • 338 篇 力学(可授工学、理...
    • 264 篇 光学工程
    • 243 篇 生物工程
    • 242 篇 动力工程及工程热...
    • 237 篇 机械工程
    • 220 篇 核科学与技术
    • 200 篇 仪器科学与技术
    • 184 篇 冶金工程
    • 149 篇 土木工程
    • 148 篇 生物医学工程(可授...
    • 137 篇 水利工程
    • 116 篇 网络空间安全
  • 3,795 篇 理学
    • 2,296 篇 物理学
    • 1,377 篇 数学
    • 490 篇 化学
    • 393 篇 统计学(可授理学、...
    • 316 篇 生物学
    • 214 篇 系统科学
    • 158 篇 地球物理学
  • 524 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 139 篇 医学
  • 85 篇 农学
  • 68 篇 法学
  • 52 篇 经济学
  • 24 篇 军事学
  • 13 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 246 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 60 篇 relativistic hea...
  • 59 篇 feature extracti...
  • 58 篇 deep learning
  • 54 篇 semantics
  • 53 篇 w & z bosons
  • 51 篇 particle product...
  • 51 篇 computational mo...
  • 50 篇 training
  • 49 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 37 篇 quark & gluon je...
  • 35 篇 hadrons
  • 33 篇 security

机构

  • 1,031 篇 yerevan physics ...
  • 915 篇 centro brasileir...
  • 889 篇 charles universi...
  • 885 篇 university of de...
  • 885 篇 department of ph...
  • 869 篇 institute rudjer...
  • 862 篇 university of so...
  • 853 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 851 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 836 篇 indian institute...
  • 835 篇 university of cy...
  • 826 篇 institute of hig...
  • 823 篇 infn laboratori ...
  • 820 篇 national and kap...
  • 813 篇 universidad san ...
  • 807 篇 rwth aachen univ...
  • 803 篇 ghent university...

作者

  • 630 篇 waltenberger w.
  • 621 篇 lowette s.
  • 565 篇 tavernier s.
  • 537 篇 adam w.
  • 534 篇 lemaitre v.
  • 533 篇 skovpen k.
  • 533 篇 tytgat m.
  • 532 篇 schieck j.
  • 527 篇 sznajder a.
  • 525 篇 tumasyan a.
  • 522 篇 jeitler m.
  • 517 篇 vannerom d.
  • 517 篇 delaere c.
  • 513 篇 giammanco a.
  • 502 篇 carvalho w.
  • 497 篇 van mechelen p.
  • 495 篇 alves g.a.
  • 495 篇 delcourt m.
  • 490 篇 wulz c.-e.
  • 489 篇 chinellato j.

语言

  • 6,017 篇 英文
  • 190 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=the State Key Laboratory of Scientific and Engineering Computing"
6359 条 记 录,以下是1-10 订阅
排序:
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
A Derivative-Free Optimization Algorithm Combining Line-Search and Trust-Region Techniques
收藏 引用
Chinese Annals of Mathematics,Series B 2023年 第5期44卷 719-734页
作者: Pengcheng XIE Ya-xiang YUAN State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematicsand Scientific/Engineering ComputingAcademy of Mathematics and Systems ScienceChinese Academy of SciencesUniversity of Chinese Academy of SciencesBeijing 100190China
The speeding-up and slowing-down(SUSD)direction is a novel direction,which is proved to converge to the gradient descent direction under some *** authors propose the derivative-free optimization algorithm SUSD-TR,whic... 详细信息
来源: 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 评论
CENTRAL LIMIT THEOREM FOR TEMPORAL AVERAGE OF BACKWARD EULER-MARUYAMA METHOD
收藏 引用
Journal of Computational Mathematics 2025年 第3期43卷 588-614页
作者: Diancong Jin School of Mathematics and Statistics Hubei Key Laboratory of Engineering Modeling and Scientific ComputingHuazhong University of Science and TechnologyWuhan 430074China
This work focuses on the temporal average of the backward Euler-Maruyama(BEM)method,which is used to approximate the ergodic limit of stochastic ordinary differential equations(SODEs).We give the central limit theorem... 详细信息
来源: 评论
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 694-707页
作者: Wangxin FENG Xiangyang LUO Tengyao LI Chunfang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net... 详细信息
来源: 评论
IP2vec:an IP node representation model for IP geolocation
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 189-204页
作者: Fan ZHANG Meijuan YIN Fenlin LIU Xiangyang LUO Shuodi ZU State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou 450001China
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ... 详细信息
来源: 评论
Adaptive cyclic gradient methods with interpolation
收藏 引用
Computational Optimization and Applications 2025年 1-25页
作者: Xie, Yixin Sun, Cong Yuan, Ya-Xiang Beijing100876 China Ministry of Education Beijing100876 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing100190 China
Gradient method is an important method for solving large scale problems. In this paper, a new gradient method framework for unconstrained optimization problem is proposed, where the stepsize is updated in a cyclic way... 详细信息
来源: 评论
Research Progress of Reverse Monte Carlo and Its Application in Josephson Junction Barrier Layer
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2077-2109页
作者: Junling Qiu Huihui Sun Shuya Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str... 详细信息
来源: 评论
Global Solvability for a Predator-Prey Model with Prey-Taxis and Rotational Flux Terms
收藏 引用
Chinese Annals of Mathematics,Series B 2024年 第2期45卷 297-318页
作者: Guoqiang REN Bin LIU School of Mathematics and Statistics Huazhong University of Science and Technology Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong Universityof Science and Technology
In this paper the author investigates the following predator-prey model with prey-taxis and rotational?ux terms■in a bounded domain with smooth *** presents the global existence of generalized solutions to the model... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论