咨询与建议

限定检索结果

文献类型

  • 4,517 篇 期刊文献
  • 1,827 篇 会议

馆藏范围

  • 6,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,831 篇 工学
    • 1,551 篇 计算机科学与技术...
    • 1,215 篇 软件工程
    • 496 篇 电子科学与技术(可...
    • 472 篇 化学工程与技术
    • 454 篇 电气工程
    • 443 篇 信息与通信工程
    • 355 篇 控制科学与工程
    • 340 篇 材料科学与工程(可...
    • 338 篇 力学(可授工学、理...
    • 264 篇 光学工程
    • 243 篇 生物工程
    • 242 篇 动力工程及工程热...
    • 237 篇 机械工程
    • 220 篇 核科学与技术
    • 200 篇 仪器科学与技术
    • 184 篇 冶金工程
    • 149 篇 土木工程
    • 148 篇 生物医学工程(可授...
    • 137 篇 水利工程
    • 116 篇 网络空间安全
  • 3,795 篇 理学
    • 2,296 篇 物理学
    • 1,377 篇 数学
    • 490 篇 化学
    • 393 篇 统计学(可授理学、...
    • 316 篇 生物学
    • 214 篇 系统科学
    • 158 篇 地球物理学
  • 524 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 139 篇 医学
  • 85 篇 农学
  • 68 篇 法学
  • 52 篇 经济学
  • 24 篇 军事学
  • 13 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 246 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 60 篇 relativistic hea...
  • 59 篇 feature extracti...
  • 58 篇 deep learning
  • 54 篇 semantics
  • 53 篇 w & z bosons
  • 51 篇 particle product...
  • 51 篇 computational mo...
  • 50 篇 training
  • 49 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 37 篇 quark & gluon je...
  • 35 篇 hadrons
  • 33 篇 security

机构

  • 1,031 篇 yerevan physics ...
  • 915 篇 centro brasileir...
  • 889 篇 charles universi...
  • 885 篇 university of de...
  • 885 篇 department of ph...
  • 869 篇 institute rudjer...
  • 862 篇 university of so...
  • 853 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 851 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 836 篇 indian institute...
  • 835 篇 university of cy...
  • 826 篇 institute of hig...
  • 823 篇 infn laboratori ...
  • 820 篇 national and kap...
  • 813 篇 universidad san ...
  • 807 篇 rwth aachen univ...
  • 803 篇 ghent university...

作者

  • 630 篇 waltenberger w.
  • 621 篇 lowette s.
  • 565 篇 tavernier s.
  • 537 篇 adam w.
  • 534 篇 lemaitre v.
  • 533 篇 skovpen k.
  • 533 篇 tytgat m.
  • 532 篇 schieck j.
  • 527 篇 sznajder a.
  • 525 篇 tumasyan a.
  • 522 篇 jeitler m.
  • 517 篇 vannerom d.
  • 517 篇 delaere c.
  • 513 篇 giammanco a.
  • 502 篇 carvalho w.
  • 497 篇 van mechelen p.
  • 495 篇 alves g.a.
  • 495 篇 delcourt m.
  • 490 篇 wulz c.-e.
  • 489 篇 chinellato j.

语言

  • 6,002 篇 英文
  • 190 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=the State Key Laboratory of Scientific and Engineering Computing"
6344 条 记 录,以下是161-170 订阅
排序:
An Abnormal Domain Name Generation Method Based on a Character-Level Model  4
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2022
作者: Wu, Chunbing Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli... 详细信息
来源: 评论
A Research and Verification of MFC Framework-aware Virus Infection Technology  3
A Research and Verification of MFC Framework-aware Virus Inf...
收藏 引用
3rd International Conference on Computer Vision, Image and Deep Learning and International Conference on Computer engineering and Applications, CVIDL and ICCEA 2022
作者: Guo, Wang Li, Yang Sha, Zihan Bu, Wenjuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Portable Executable (PE) virus technology is an important threat factor in the field of network security. With continuous upgrading of malware detection technology, virus infection technology will also gradually evolv... 详细信息
来源: 评论
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM  4
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Wang, Huanwei Tang, Yonghe Liu, Wei Xie, Jiangtao State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
A space-decoupling framework for optimization on bounded-rank matrices with orthogonally invariant constraints
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Yan Gao, Bin Yuan, Ya-Xiang State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences The University of Chinese Academy of Sciences Beijing China State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China
Imposing additional constraints on low-rank optimization has garnered growing interest. However, the geometry of coupled constraints hampers the well-developed low-rank structure and makes the problem intricate. To th... 详细信息
来源: 评论
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
Research on Memory Attacks and Defenses for Programmable Logic Controllers  4
Research on Memory Attacks and Defenses for Programmable Log...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Geng, Yangyang Liu, Ke Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Programmable logic controllers (PLCs) are the core of industrial control systems (ICS), which play an essential role in critical infrastructure. In recent years, significant real-world attacks against PLCs have emerge... 详细信息
来源: 评论
The influence of drag parameter on submerged vegetation flow simulation using a porous approach
收藏 引用
Journal of Hydrodynamics 2024年 第4期36卷 796-801页
作者: Meng-yang Liu Yi-sen Wang Yi-qing Gong Shu-xia Wang College of Water Conservancy and Hydropower Engineering Hohai UniversityNanjing 210098China State Key Laboratory of Water Resources Engineering and Management Wuhan UniversityWuhan 430072China River Research Department Changjiang River Scientific Research InstituteWuhan 430010China Key Laboratory of Hydrologic-Cycle and Hydrodynamic-System of Ministry of Water Resources Hohai UniversityNanjing 210098China Institute of Water Science and Technology Hohai UniversityNanjing 210098China
In simulating vegetated flows using the porous approach,the reasonableness of the drag coefficient significantly impacts the calculation *** study employs large eddy simulation(LES)to quantitatively investigate the ef... 详细信息
来源: 评论
Social User Geolocation Method Based on POI Location Feature Enhancement in Context  1
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Liu, Yu Qiao, Yaqiong Liu, Yimin Du, Shaoyong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China School of Information Engineering North China University of Water Resources and Electric Power Zhengzhou China
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In... 详细信息
来源: 评论
Energy Stable Nodal DG Methods for Maxwell’s Equations of Mixed-Order Form in Nonlinear Optical Media
收藏 引用
Communications on Applied Mathematics and Computation 2024年 第1期6卷 30-63页
作者: Maohui Lyu Vrushali A.Bokil Yingda Cheng Fengyan Li State Key Laboratory of Scientific and Engineering Computing(LSEC) Academy of Mathematics and System SciencesChinese Academy of SciencesBeijing100190China Department of Mathematics College of ScienceOregon State UniversityCorvallisOR97331USA Department of Mathematics Michigan State UniversityEast LansingMI48824USA Department of Computational Mathematics Science and EngineeringMichigan State UniversityEast LansingMI48824USA Department of Mathematical Sciences Rensselaer Polytechnic InstituteTroyNY12180USA
In this work,we develop energy stable numerical methods to simulate electromagnetic waves propagating in optical media where the media responses include the linear Lorentz dispersion,the instantaneous nonlinear cubic ... 详细信息
来源: 评论
Modified Model of Crack Tip Stress Field Considering Dislocation Slip Accumulation and Crack Tip Blunting
收藏 引用
Chinese Journal of Mechanical engineering 2023年 第2期36卷 327-340页
作者: Jian Li Bing Yang Shuancheng Wang M.N.James Shoune Xiao Tao Zhu Guangwu Yang State Key Laboratory of Traction Power Southwest Jiaotong UniversityChengdu 610031China School of Engineering Computing&MathematicsUniversity of PlymouthPlymouth PL48AAEngland Department of Mechanical Engineering Nelson Mandela UniversityPort Elizabeth 6001South Africa
This study uses the digital image correlation technique to measure the crack tip displacement field at various crack lengths in U71MnG rail steel,and the interpolated continuous displacement field was obtained by fitt... 详细信息
来源: 评论