咨询与建议

限定检索结果

文献类型

  • 4,529 篇 期刊文献
  • 1,827 篇 会议
  • 3 册 图书

馆藏范围

  • 6,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,841 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,215 篇 软件工程
    • 498 篇 电子科学与技术(可...
    • 472 篇 化学工程与技术
    • 454 篇 电气工程
    • 443 篇 信息与通信工程
    • 355 篇 控制科学与工程
    • 340 篇 材料科学与工程(可...
    • 338 篇 力学(可授工学、理...
    • 264 篇 光学工程
    • 243 篇 生物工程
    • 242 篇 动力工程及工程热...
    • 237 篇 机械工程
    • 220 篇 核科学与技术
    • 200 篇 仪器科学与技术
    • 184 篇 冶金工程
    • 149 篇 土木工程
    • 148 篇 生物医学工程(可授...
    • 137 篇 水利工程
    • 116 篇 网络空间安全
  • 3,795 篇 理学
    • 2,296 篇 物理学
    • 1,377 篇 数学
    • 490 篇 化学
    • 393 篇 统计学(可授理学、...
    • 316 篇 生物学
    • 214 篇 系统科学
    • 158 篇 地球物理学
  • 524 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 139 篇 医学
  • 85 篇 农学
  • 68 篇 法学
  • 52 篇 经济学
  • 24 篇 军事学
  • 13 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 246 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 60 篇 relativistic hea...
  • 59 篇 feature extracti...
  • 58 篇 deep learning
  • 54 篇 semantics
  • 53 篇 w & z bosons
  • 51 篇 particle product...
  • 51 篇 computational mo...
  • 50 篇 training
  • 49 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 37 篇 quark & gluon je...
  • 35 篇 hadrons
  • 33 篇 security

机构

  • 1,031 篇 yerevan physics ...
  • 915 篇 centro brasileir...
  • 889 篇 charles universi...
  • 885 篇 university of de...
  • 885 篇 department of ph...
  • 869 篇 institute rudjer...
  • 862 篇 university of so...
  • 853 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 851 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 836 篇 indian institute...
  • 835 篇 university of cy...
  • 826 篇 institute of hig...
  • 823 篇 infn laboratori ...
  • 820 篇 national and kap...
  • 813 篇 universidad san ...
  • 807 篇 rwth aachen univ...
  • 803 篇 ghent university...

作者

  • 630 篇 waltenberger w.
  • 621 篇 lowette s.
  • 565 篇 tavernier s.
  • 537 篇 adam w.
  • 534 篇 lemaitre v.
  • 533 篇 skovpen k.
  • 533 篇 tytgat m.
  • 532 篇 schieck j.
  • 527 篇 sznajder a.
  • 525 篇 tumasyan a.
  • 522 篇 jeitler m.
  • 517 篇 vannerom d.
  • 517 篇 delaere c.
  • 513 篇 giammanco a.
  • 502 篇 carvalho w.
  • 497 篇 van mechelen p.
  • 495 篇 alves g.a.
  • 495 篇 delcourt m.
  • 490 篇 wulz c.-e.
  • 489 篇 chinellato j.

语言

  • 6,017 篇 英文
  • 190 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=the State Key Laboratory of Scientific and Engineering Computing"
6359 条 记 录,以下是251-260 订阅
排序:
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
A Causal Adversarial Graph Neural Network for Multi-Center Autism Spectrum Disorder Identification
SSRN
收藏 引用
SSRN 2025年
作者: Zhang, Zhuan Wang, Lihui Chen, Qijian Wang, Li Jian, Caiqing Zhu, Yue-Min Wei, Hongjiang Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China University Lyon INSA Lyon CNRS Inserm IRP Metislab CREATIS UMR5220 U1206 Lyon69621 France
Due to the heterogeneous distributions of multi-center rs-fMRI data, currently it is still challenging to identify accurately autism spectrum disorder (ASD) patients from these heterogenous data. To deal with the infl... 详细信息
来源: 评论
Three-dimensional large eddy simulation and vorticity analysis of unsteady cavitating flow around a twisted hydrofoil
收藏 引用
Journal of Hydrodynamics 2013年 第4期25卷 510-519页
作者: 季斌 罗先武 彭晓星 吴玉林 State Key Laboratory of Hydroscience and Engineering Tsinghua University China Ship Scientific Research Center
Large Eddy Simulation (LES) was coupled with a mass transfer cavitation model to predict unsteady 3-D turbulent cavita- ting flows around a twisted hydrofoil. The wall-adapting local eddy-viscosity (WALE) model wa... 详细信息
来源: 评论
Manufacturing of lithium battery toward deep-sea environment
收藏 引用
International Journal of Extreme Manufacturing 2025年 第2期 314-340页
作者: Yaohua Zhao Nan Li keyu Xie Chuan Wang Sisi Zhou Xianggong Zhang Cong Ye State Key Laboratory of Solidification Processing Center for Nano Energy Materials School of Materials Science and Engineering Northwestern Polytechnical University and Shaanxi Joint Laboratory of Graphene (NPU) Wuhan Institute of Marine Electric Propulsion China State Shipbuilding Corporation Limited China Ship Scientific Research Center China State Shipbuilding Corporation Limited
The operation of deep-sea underwater vehicles relies entirely on onboard ***,the extreme deep-sea conditions,characterized by ultrahigh hydraulic pressure,low temperature,and seawater conductivity,pose significant cha...
来源: 评论
On the regularity of trust region-cg algorithm: With application to deconvolution problem
收藏 引用
Science China Mathematics 2003年 第3期46卷 312-325页
作者: 王彦飞 Laboratory of Remote Sensing Information Sciences Institute of Remote Sensing ApplicationsChinese Academy of Sciences State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematicsand Scientific/Engineering ComputingAcademy of Mathematics and System SciencesChinese Academy of SciencesBeijing 100080China
Deconvolution problem is a main topic in signal processing. Many practical applications are re-quired to solve deconvolution problems. An important example is image reconstruction. Usually, researcherslike to use regu... 详细信息
来源: 评论
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
Stego key searching for LSB steganography on JPEG decompressed image
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 60-74页
作者: Jiufen LIU Yuguo TIAN Tao HAN Junchao WANG Xiangyang LUO Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
At present, steganalysis research focuses on detecting the existence of a hidden message. However,extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer f... 详细信息
来源: 评论
THE GLOBAL ATTRACTOR FOR A VISCOUS WEAKLY DISSIPATIVE GENERALIZED TWO-COMPONENT μ-HUNTER-SAXTON SYSTEM
收藏 引用
Acta Mathematica Scientia 2018年 第2期38卷 651-672页
作者: 张磊 刘斌 School of Mathematics and Statistics Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology
This article is concerned with the existence of global attractor of a weakly dissipative generalized two-component μ-Hunter-Saxton (gμHS2) system with viscous terms. Under the period boundary conditions and with t... 详细信息
来源: 评论
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论
Cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 评论