咨询与建议

限定检索结果

文献类型

  • 4,622 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,909 篇 工学
    • 1,587 篇 计算机科学与技术...
    • 1,226 篇 软件工程
    • 509 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 468 篇 电气工程
    • 454 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 352 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 267 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 机械工程
    • 241 篇 动力工程及工程热...
    • 217 篇 核科学与技术
    • 204 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 138 篇 水利工程
    • 117 篇 网络空间安全
  • 3,831 篇 理学
    • 2,315 篇 物理学
    • 1,381 篇 数学
    • 502 篇 化学
    • 391 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 162 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 142 篇 医学
  • 88 篇 农学
  • 68 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 62 篇 deep learning
  • 61 篇 feature extracti...
  • 60 篇 relativistic hea...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 837 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 529 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 522 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 6,004 篇 英文
  • 315 篇 其他
  • 150 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=the State Key Laboratory of Scientific and Engineering Computing"
6475 条 记 录,以下是481-490 订阅
排序:
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qiankun Pi Jicang Lu Yepeng Sun Qinlong Fan Xukun Zhou Shouxin Shang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
Research on key Technology of Industrial Network Boundary Protection based on Endogenous Security  4
Research on Key Technology of Industrial Network Boundary Pr...
收藏 引用
4th IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Yu, Fei Wei, Qiang Geng, Yangyang Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy... 详细信息
来源: 评论
Network Device Identification Based on MAC Boundary Inference  7th
Network Device Identification Based on MAC Boundary Inferenc...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Guo, Xinmiao Li, Xiangnan Li, Ruixiang Wang, Xiuting Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely... 详细信息
来源: 评论
IPv6 Landmark Mining Based on Domain Name Screening and IPv4-IPv6 Connection  21
IPv6 Landmark Mining Based on Domain Name Screening and IPv4...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Liu, Minghao Sun, Yuchen Liu, Chong Zu, Shuodi Zhang, Fan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th... 详细信息
来源: 评论
OpenMP automatic translation framework for Sunway TaihuLight  3
OpenMP automatic translation framework for Sunway TaihuLight
收藏 引用
3rd IEEE International Conference on Communications, Information System and Computer engineering, CISCE 2021
作者: Li, Mingliang Pang, Jianmin Yue, Feng Wang, Qihan State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
The Sunway processor is a unique heterogeneous many-core processor used by Sunway TaihuLight supercomputer. However, developing parallel programs on the Sunway processor is still complex. In this paper, a source-to-so... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
LENSER: A Channel state Information Based Indoor Localization Scheme for Malicious Devices
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yongqiang Ma Xiangyang Luo Ruixiang Li Shaoyong Du Wenyan Liu Key Laboratory of Cyberspace Situation Awareness of Henan Province State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e...
来源: 评论
Towards Fully Decoupled End-to-End Person Search
Towards Fully Decoupled End-to-End Person Search
收藏 引用
2023 International Conference on Digital Image computing: Techniques and Applications, DICTA 2023
作者: Zhang, Pengcheng Bai, Xiao Zheng, Jin Ning, Xin Jiangxi Research Institute Beihang University School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beijing China Institute of Semiconductors Chinese Academy of Sciences Cognitive Computing Technology Joint Laboratory Wave Group Beijing China
End-to-end person search aims to jointly detect and re-identify a target person in raw scene images with a unified model. The detection task unifies all persons while the re-id task discriminates different identities,... 详细信息
来源: 评论
tSS-BO: Scalable Bayesian Optimization for Analog Circuit Sizing via Truncated Subspace Sampling
tSS-BO: Scalable Bayesian Optimization for Analog Circuit Si...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Tianchen Gu Jiaqi Wang Zhaori Bi Changhao Yan Fan Yang Yajie Qin Tao Cui Xuan Zeng State Key Laboratory of Integrated Chips and Systems School of Microelectronics Fudan University Shanghai China State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences & University of Chinese Academy of Sciences Beijing China State Key Laboratory of Integrated Chips and Systems School of Information Science and Technology Fudan University Shanghai China
We propose a novel scalable Bayesian optimization method with truncated subspace sampling (tSS-BO) to tackle high-dimensional optimization challenges for large-scale analog circuit sizing. To address the high-dimensio... 详细信息
来源: 评论
Noise model and suppression algorithm for high-precision wavefront detection  14
Noise model and suppression algorithm for high-precision wav...
收藏 引用
Optical Design and Testing XIV 2024
作者: Shao, Yuqi Shi, Runzhou Li, Yuejia Liu, Huiwen Zhang, Tian Bai, Jian College of Optical Science and Engineering Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou311215 China State Key Laboratory of Extreme Photonics and Instrumentation Zhejiang University Hangzhou310027 China
Wavefront aberration is a crucial metric for evaluating the imaging quality of an optical system and enhancing the accuracy of wavefront detection is of significant importance. Noise is a critical factor that affects ... 详细信息
来源: 评论