咨询与建议

限定检索结果

文献类型

  • 5,820 篇 期刊文献
  • 291 篇 会议

馆藏范围

  • 6,111 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,304 篇 工学
    • 3,129 篇 计算机科学与技术...
    • 1,839 篇 电气工程
    • 1,511 篇 控制科学与工程
    • 1,485 篇 信息与通信工程
    • 1,442 篇 材料科学与工程(可...
    • 1,380 篇 电子科学与技术(可...
    • 1,377 篇 软件工程
    • 1,039 篇 机械工程
    • 698 篇 网络空间安全
    • 537 篇 仪器科学与技术
    • 532 篇 化学工程与技术
    • 525 篇 力学(可授工学、理...
    • 367 篇 动力工程及工程热...
    • 296 篇 生物医学工程(可授...
    • 208 篇 航空宇航科学与技...
    • 207 篇 光学工程
    • 188 篇 环境科学与工程(可...
    • 174 篇 生物工程
  • 3,957 篇 理学
    • 1,908 篇 数学
    • 1,347 篇 物理学
    • 698 篇 天文学
    • 580 篇 化学
    • 399 篇 生物学
    • 216 篇 地球物理学
    • 173 篇 系统科学
    • 164 篇 统计学(可授理学、...
    • 148 篇 地质学
  • 1,186 篇 管理学
    • 947 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
  • 320 篇 医学
    • 205 篇 临床医学
  • 193 篇 农学
  • 101 篇 军事学
  • 95 篇 艺术学
  • 94 篇 经济学
  • 84 篇 法学
  • 77 篇 文学
  • 38 篇 教育学
  • 13 篇 哲学
  • 3 篇 历史学

主题

  • 113 篇 deep learning
  • 73 篇 blockchain
  • 67 篇 computing
  • 49 篇 cloud computing
  • 41 篇 quantum computin...
  • 40 篇 neuromorphic com...
  • 40 篇 network
  • 40 篇 machine learning
  • 38 篇 mobile edge comp...
  • 37 篇 artificial intel...
  • 34 篇 optimization
  • 33 篇 memristor
  • 33 篇 cryptography
  • 32 篇 model
  • 29 篇 internet of thin...
  • 27 篇 reinforcement le...
  • 26 篇 simulation
  • 24 篇 image
  • 24 篇 convergence
  • 23 篇 artificial

机构

  • 181 篇 university of ch...
  • 77 篇 university of ch...
  • 51 篇 shanghai key lab...
  • 47 篇 ieee
  • 43 篇 shanghai key lab...
  • 43 篇 state key labora...
  • 39 篇 state key labora...
  • 37 篇 institute of com...
  • 36 篇 state key labora...
  • 30 篇 state key labora...
  • 29 篇 national astrono...
  • 25 篇 state key labora...
  • 24 篇 state key labora...
  • 23 篇 college of intel...
  • 21 篇 school of comput...
  • 21 篇 institute of com...
  • 18 篇 school of mathem...
  • 18 篇 beijing academy ...
  • 18 篇 institute for na...
  • 17 篇 key laboratory o...

作者

  • 27 篇 wei wang
  • 27 篇 wei li
  • 24 篇 qi liu
  • 22 篇 xin liu
  • 22 篇 fei-yue wang
  • 20 篇 ping xu
  • 16 篇 xiangyang luo
  • 16 篇 hai jin
  • 16 篇 lei zhang
  • 15 篇 qiang li
  • 15 篇 陈勇
  • 14 篇 jun wang
  • 14 篇 wei liu
  • 13 篇 jing wang
  • 13 篇 yuefei sui
  • 13 篇 min chen
  • 13 篇 yi zhang
  • 13 篇 jie zhang
  • 13 篇 yi liu
  • 12 篇 shuiying xiang

语言

  • 5,640 篇 英文
  • 471 篇 中文
检索条件"机构=Key Laboratory of Pervasive Computing"
6111 条 记 录,以下是11-20 订阅
排序:
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
收藏 引用
China Communications 2024年 第7期21卷 212-223页
作者: Wang Shuo Chu Jiang Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge State key laboratory of Astronautic Dynamics Xi’an Satellite Control CenterXi’an 710043China State key laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China Shaanxi key laboratory of Blockchain and Secure computing Xidian UniversityXi’an 710071China
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching *** reverse this asymmetric advantage,a new defense idea,called Moving T... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The quantum Ising model for perfect matching and solving it with variational quantum eigensolver
收藏 引用
Science China(Information Sciences) 2024年 第9期67卷 306-320页
作者: Qilin ZHENG Pingyu ZHU Chao WU Miaomiao YU Weihong LUO Ping XU Institute for Quantum Information and State key laboratory of High Performance computing College of Computer Science and Technology National University of Defense Technology Hefei National laboratory
Obtaining all perfect matchings of a graph is a tough problem in graph theory, and its complexity belongs to the #P-Complete class. The problem is closely related to combinatorics, marriage matching problems, dense su... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2625-2646页
作者: Mingliang Sun Jie Yuan Xiaoyong Li Dongxiao Liu key laboratory of Trustworthy Distributed computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On Isodual Double Toeplitz Codes
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2196-2206页
作者: SHI Minjia XU Li SOLé Patrick key laboratory of Intelligent computing and Signal Processing Ministry of Education School of Mathematical Sciences Anhui University State key laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences CNRS University of Aix Marseille Centrale Marseille
Double Toeplitz(shortly DT) codes are introduced here as a generalization of double circulant codes. The authors show that such a code is isodual, hence formally self-dual(FSD). FSD codes form a far-reaching gener... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Contact engineering for temperature stability improvement of Bi-contacted MoS2 field effect transistors
收藏 引用
Science China(Information Sciences) 2024年 第06期67卷 172-179页
作者: Zizheng LIU Qing ZHANG Xiaohe HUANG Chunsen LIU Peng ZHOU State key laboratory of Integrated Chip and Systems School of MicroelectronicsZhangjiang Fudan International Innovation CenterFudan University Frontier Institute of Chip and System Shanghai Key Lab for Future Computing Hardware and SystemFudan University Shaoxin laboratory
Semimetallic bismuth(Bi) is one of the most effective strategies for reducing the contact resistance of two-dimensional transition metal dichalcogenide field effect transistors(FETs). However, the low melting poin... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 231-233页
作者: Haifeng QIAN Cheng LIN Qiaohan CHU Jie CHEN Shanghai key laboratory of Trustworthy computing Software Engineering InstituteEast China Normal UniversityShanghai 200062China
1 Introduction Boneh et al.[1]first systematically introduce the concept of Functional Encryption(FE)which overcomes all-or-nothing limitation of traditional public key ***,FE hides a potential problem:even if the sec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi key laboratory for Network computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security proble... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 363-383页
作者: Liang Chen Jingbo Zhang Linjie Wu Xingjuan Cai Yubin Xu Shanxi key laboratory of Big Data Analysis and Parallel computing Taiyuan University of Science and TechnologyTaiyuan030024China School of State key laboratory of Novel Software Technology Nanjing UniversityNanjing210008China
The large-scale multi-objective optimization algorithm(LSMOA),based on the grouping of decision variables,is an advanced method for handling high-dimensional decision ***,in practical problems,the interaction among de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Multi-objective Approach Based on Golden Jackal Search for Dynamic Economic Emission Dispatch
收藏 引用
Journal of Bionic Engineering 2024年 第3期21卷 1541-1566页
作者: keyu Zhong Fen Xiao Xieping Gao key laboratory of computing and Stochastic Mathematics of Ministry of Education Hunan Normal UniversityChangsha410081China School of Mathematics and Statistics Hunan Normal UniversityChangsha410081China School of Computer Science Xiangtan UniversityXiangtan411105China Hunan Provincial key laboratory of Intelligent computing and Language Information Processing Hunan Normal UniversityChangsha410081China
Dynamic Economic Emission Dispatch(DEED)aims to optimize control over fuel cost and pollution emission,two conflicting objectives,by scheduling the output power of various units at specific *** many methods well-perfo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
APFA:Ameliorated Pathfinder Algorithm for Engineering Applications
收藏 引用
Journal of Bionic Engineering 2024年 第3期21卷 1592-1616页
作者: keyu Zhong Fen Xiao Xieping Gao key laboratory of computing and Stochastic Mathematics of Ministry of Education Hunan Normal UniversityChangsha410081China School of Mathematics and Statistics Hunan Normal UniversityChangsha410081China School of Computer Science Xiangtan UniversityXiangtan411105China Hunan Provincial key laboratory of Intelligent computing and Language Information Processing Hunan Normal UniversityChangsha410081China
Pathfinder algorithm(PFA)is a swarm intelligent optimization algorithm inspired by the collective activity behavior of swarm animals,imitating the leader in the population to guide followers in finding the best food *... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论