咨询与建议

限定检索结果

文献类型

  • 332 篇 会议
  • 9 册 图书

馆藏范围

  • 337 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 336 篇 计算机科学与技术...
    • 107 篇 信息与通信工程
    • 18 篇 软件工程
  • 130 篇 理学
    • 130 篇 数学

主题

  • 12 篇 event-b
  • 10 篇 multi-objective ...
  • 8 篇 genetic programm...
  • 8 篇 evolutionary alg...
  • 7 篇 computers
  • 6 篇 refinement
  • 6 篇 formal methods
  • 6 篇 runtime analysis
  • 5 篇 reinforcement le...
  • 5 篇 approximation al...
  • 5 篇 robots
  • 5 篇 combinatorial op...
  • 5 篇 verification
  • 4 篇 graph algorithms
  • 4 篇 deep learning
  • 4 篇 model checking
  • 4 篇 abstract state m...
  • 4 篇 graph theory
  • 4 篇 theory
  • 4 篇 machine learning

机构

  • 6 篇 sorbonne univ li...
  • 5 篇 swiss fed inst t...
  • 5 篇 univ bergen dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ southampton...
  • 5 篇 zhejiang univ ui...
  • 4 篇 univ utrecht utr...
  • 4 篇 charles univ pra...
  • 4 篇 univ tokyo jfli ...
  • 4 篇 univ dusseldorf ...
  • 3 篇 tech univ darmst...
  • 3 篇 slovak acad sci ...
  • 3 篇 univ warsaw inst...
  • 3 篇 univ primorska f...
  • 3 篇 ryerson univ dep...
  • 3 篇 beijing univ tec...
  • 3 篇 univ milan dipar...
  • 3 篇 beijing univ tec...
  • 3 篇 warsaw univ tech...
  • 3 篇 itmo univ st pet...

作者

  • 6 篇 doerr carola
  • 6 篇 leuschel michael
  • 5 篇 schewe klaus-die...
  • 5 篇 doerr benjamin
  • 4 篇 neumann frank
  • 4 篇 coello carlos a....
  • 4 篇 butler michael
  • 4 篇 back thomas
  • 4 篇 liefooghe arnaud
  • 4 篇 hoang thai son
  • 4 篇 riccobene elvini...
  • 3 篇 neumann aneta
  • 3 篇 bloznelis mindau...
  • 3 篇 sudo yuichi
  • 3 篇 yao xin
  • 3 篇 ait-ameur yamine
  • 3 篇 taubenfeld gadi
  • 3 篇 bossek jakob
  • 3 篇 snook colin
  • 3 篇 paulusma daniel

语言

  • 336 篇 英文
  • 5 篇 中文
检索条件"丛书名=Lecture Notes in Computer Science - Theoretical Computer Science and General Issues"
341 条 记 录,以下是11-20 订阅
排序:
Labeling Schemes for Deterministic Radio Multi-broadcast  47th
Labeling Schemes for Deterministic Radio Multi-broadcast
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Krisko, Colin Miller, Avery Univ Manitoba Winnipeg MB Canada
We consider the multi-broadcast problem in arbitrary connected radio networks consisting of n nodes. There are k designated source nodes for some fixed k is an element of{1,..., n}, and each source node has a piece of... 详细信息
来源: 评论
Summarization Algorithms for News: A Study of the Coronavirus Theme and Its Impact on the News Extracting Algorithm  10th
Summarization Algorithms for News: A Study of the Coronaviru...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Gadasina, Lyudmila Veklenko, Vladislav Luukka, Pasi St Petersburg State Univ 7-9 Univ Skaya Nab St Petersburg 199034 Russia Moscow Inst Phys & Technol 9 Inst Skiy Per Dolgoprudnyi 141701 Moscow Region Russia LUT Univ Skinnarilankatu 34 Lappeenranta 53850 Finland
Extract summarization algorithms help identify significant information from the news by extracting meaningful sentences from the original text. The information background existing at the time of the news release often... 详细信息
来源: 评论
Verifying System-Level Security of a Smart Ballot Box  8th
Verifying System-Level Security of a Smart Ballot Box
收藏 引用
7th International Conference on Rigorous State-Based Methods (ABZ)
作者: Dghaym, Dana Hoang, Thai Son Butler, Michael Hu, Runshan Aniello, Leonardo Sassone, Vladimiro Univ Southampton ECS Southampton Hants England
Event-B, a refinement-based formal modelling language, has traditionally focused on safety, but now increasingly finds a new role in developing secure systems. In this paper we take a fresh look at security and focus ... 详细信息
来源: 评论
Detecting Hate Speech Contents Using Embedding Models  10th
Detecting Hate Speech Contents Using Embedding Models
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Duong, Phuc H. Chung, Cuong C. Vo, Loc T. Nguyen, Hien T. Ngo, Dat Ton Duc Thang Univ Artificial Intelligence Lab Fac Informat Technol Ho Chi Minh City Vietnam Banking Univ Ho Chi Minh City Dept Econ Math Ho Chi Minh City Vietnam New AI Res Ho Chi Minh City Vietnam
The rise of hate speech contents on social network platforms has recently become a topic of interest. There have been a lot of studies to develop systems that can automatically detect hate speech contents. In this pap... 详细信息
来源: 评论
Approximate Minimum Directed Spanning Trees Under Congestion  28th
Approximate Minimum Directed Spanning Trees Under Congestion
收藏 引用
28th International Colloquium on Structural Information and Communication Complexity (SIROCCO)
作者: Lenzen, Christoph Vahidi, Hossein MPI Informat Saarbrucken Germany Saarbrucken Grad Sch Comp Sci Saarbrucken Germany
The minimum directed spanning tree (MDST) problem has until recently not been studied in distributed computing models. This fundamental task generalizes the well-studied minimum spanning tree problem, by asking for a ... 详细信息
来源: 评论
On Subgraph Complementation to H-free Graphs  1
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Antony, Dhanyamol Garchar, Jay Pal, Sagartanu Sandeep, R. B. Sen, Sagnik Subashini, R. Natl Inst Technol Calicut Calicut Kerala India Indian Inst Technol Dharwad Dharwad Karnataka India
For a class G of graphs, the problem Subgraph Complement to G asks whether one can find a subset S of vertices of the input graph G such that complementing the subgraph induced by S in G results in a graph in G. We in... 详细信息
来源: 评论
Bears with Hats and Independence Polynomials  47th
Bears with Hats and Independence Polynomials
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Blazej, Vaclav Dvorak, Pavel Opler, Michal Czech Tech Univ Fac Informat Technol Prague Czech Republic Charles Univ Prague Fac Math & Phys Prague Czech Republic
Consider the following hat guessing game. A bear sits on each vertex of a graph G, and a demon puts on each bear a hat colored by one of h colors. Each bear sees only the hat colors of his neighbors. Based on this inf... 详细信息
来源: 评论
Graph Exploration by Energy-Sharing Mobile Agents  28th
Graph Exploration by Energy-Sharing Mobile Agents
收藏 引用
28th International Colloquium on Structural Information and Communication Complexity (SIROCCO)
作者: Czyzowicz, Jurek Dobrev, Stefan Killick, Ryan Kranakis, Evangelos Krizanc, Danny Narayanan, Lata Opatrny, Jaroslav Pankratov, Denis Shende, Sunil Univ Quebec Outaouais Dept Informat Gatineau PQ Canada Slovak Acad Sci Bratislava Slovakia Carleton Univ Sch Comp Sci Ottawa ON Canada Wesleyan Univ Dept Math & Comp Sci Middletown CT USA Concordia Univ Dept Comp Sci & Software Engn Montreal PQ Canada Rutgers State Univ Dept Comp Sci New Brunswick NJ USA
We consider the problem of collective exploration of a known n-node edge-weighted graph by k mobile agents that have limited energy but are capable of energy transfers. The agents are initially placed at an arbitrary ... 详细信息
来源: 评论
Formal Meta Engineering Event-B: Extension and Reasoning The EB4EB Framework  8th
Formal Meta Engineering Event-B: Extension and Reasoning The...
收藏 引用
7th International Conference on Rigorous State-Based Methods (ABZ)
作者: Riviere, Peter IRIT INPT ENSEEIHT 2 Rue Charles Camichel Toulouse F-31000 Toulouse France
State-based Formal methods have been used to design and verify the development of complex software systems for a long time. Such methods are underpinned with solid mathematical concepts. © 2021, Springer Nature S... 详细信息
来源: 评论
Completion to Chordal Distance-Hereditary Graphs: A Quartic Vertex-Kernel  1
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Crespelle, Christophe Gras, Benjamin Perez, Anthony Univ Lyon DANTE INRIA UCBL LIP UMR CNRS 5668 Lyon France Univ Trier Informat Wissensch Fachbereich 4 D-54296 Trier Germany Univ Orleans INSA Ctr Val Loire LIFO EA 4022 F-45067 Orleans France
Given a class of graphs G and a graph G = (V, E), the aim of the G-completion problem is to find a set of at most k non-edges whose addition in G results in a graph that belongs to G. Completion to chordal or to natur... 详细信息
来源: 评论