咨询与建议

限定检索结果

文献类型

  • 332 篇 会议
  • 9 册 图书

馆藏范围

  • 337 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 336 篇 计算机科学与技术...
    • 107 篇 信息与通信工程
    • 18 篇 软件工程
  • 130 篇 理学
    • 130 篇 数学

主题

  • 12 篇 event-b
  • 10 篇 multi-objective ...
  • 8 篇 genetic programm...
  • 8 篇 evolutionary alg...
  • 7 篇 computers
  • 6 篇 refinement
  • 6 篇 formal methods
  • 6 篇 runtime analysis
  • 5 篇 reinforcement le...
  • 5 篇 approximation al...
  • 5 篇 robots
  • 5 篇 combinatorial op...
  • 5 篇 verification
  • 4 篇 graph algorithms
  • 4 篇 deep learning
  • 4 篇 model checking
  • 4 篇 abstract state m...
  • 4 篇 graph theory
  • 4 篇 theory
  • 4 篇 machine learning

机构

  • 6 篇 sorbonne univ li...
  • 5 篇 swiss fed inst t...
  • 5 篇 univ bergen dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ southampton...
  • 5 篇 zhejiang univ ui...
  • 4 篇 univ utrecht utr...
  • 4 篇 charles univ pra...
  • 4 篇 univ tokyo jfli ...
  • 4 篇 univ dusseldorf ...
  • 3 篇 tech univ darmst...
  • 3 篇 slovak acad sci ...
  • 3 篇 univ warsaw inst...
  • 3 篇 univ primorska f...
  • 3 篇 ryerson univ dep...
  • 3 篇 beijing univ tec...
  • 3 篇 univ milan dipar...
  • 3 篇 beijing univ tec...
  • 3 篇 warsaw univ tech...
  • 3 篇 itmo univ st pet...

作者

  • 6 篇 doerr carola
  • 6 篇 leuschel michael
  • 5 篇 schewe klaus-die...
  • 5 篇 doerr benjamin
  • 4 篇 neumann frank
  • 4 篇 coello carlos a....
  • 4 篇 butler michael
  • 4 篇 back thomas
  • 4 篇 liefooghe arnaud
  • 4 篇 hoang thai son
  • 4 篇 riccobene elvini...
  • 3 篇 neumann aneta
  • 3 篇 bloznelis mindau...
  • 3 篇 sudo yuichi
  • 3 篇 yao xin
  • 3 篇 ait-ameur yamine
  • 3 篇 taubenfeld gadi
  • 3 篇 bossek jakob
  • 3 篇 snook colin
  • 3 篇 paulusma daniel

语言

  • 336 篇 英文
  • 5 篇 中文
检索条件"丛书名=Lecture Notes in Computer Science - Theoretical Computer Science and General Issues"
341 条 记 录,以下是31-40 订阅
排序:
Streaming Algorithms for Maximizing Non-submodular Functions on the Integer Lattice  10th
Streaming Algorithms for Maximizing Non-submodular Functions...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Liu, Bin Chen, Zihan Wang, Huijuan Wu, Weili Ocean Univ China Sch Math Sci Qingdao Peoples R China Qingdao Univ Sch Math & Stat Qingdao Peoples R China Univ Texas Dallas Dept Comp Sci Dallas TX 75080 USA
Submodular functions play a key role in combinatorial optimization field. The problem of maximizing submodular and nonsubmodular functions on the integer lattice has received a lot of recent attention. In this paper, ... 详细信息
来源: 评论
On Additive Spanners in Weighted Graphs with Local Error  47th
On Additive Spanners in Weighted Graphs with Local Error
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Ahmed, Reyan Bodwin, Greg Hamm, Keaton Kobourov, Stephen Spence, Richard Univ Arizona Dept Comp Sci Tucson AZ 85721 USA Univ Michigan Dept Comp Sci Ann Arbor MI USA Univ Texas Arlington Dept Math Arlington TX 76019 USA
An additive +ss spanner of a graph G is a subgraph which preserves distances up to an additive +ss error. Additive spanners are well-studied in unweighted graphs but have only recently received attention in weighted g... 详细信息
来源: 评论
Towards ASM-Based Automated Formal Verification of Security Protocols  8th
Towards ASM-Based Automated Formal Verification of Security ...
收藏 引用
7th International Conference on Rigorous State-Based Methods (ABZ)
作者: Braghin, Chiara Lilli, Mario Riccobene, Elvinia Univ Milan Comp Sci Dept Via Celoria 18 Milan Italy
In the security protocols domain, formal verification is more and more highly demanded to guarantee security assurance: humans increasingly depend on the use of connected devices in their daily life, so they must be p... 详细信息
来源: 评论
Can Romeo and Juliet Meet? or Rendezvous Games with Adversaries on Graphs  47th
Can Romeo and Juliet Meet? or Rendezvous Games with Adversar...
收藏 引用
47th International Workshop on Graph-Theoretic Concepts in computer science (WG)
作者: Fomin, Fedor, V Golovach, Petr A. Thilikos, Dimitrios M. Univ Bergen Dept Informat Bergen Norway Univ Montpellier CNRS LIRMM Montpellier France
We introduce the rendezvous game with adversaries. In this game, two players, Facilitator and Divider, play against each other on a graph. Facilitator has two agents, and Divider has a team of k agents located in some... 详细信息
来源: 评论
Mean User-Text Agglomeration (MUTA): Practical User Representation and Visualization for Detection of Online Influence Operations  10th
Mean User-Text Agglomeration (MUTA): Practical User Represen...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Crothers, Evan Viktor, Herna Japkowicz, Nathalie Univ Ottawa Ottawa ON Canada Amer Univ Washington DC 20016 USA
Online influence operations (OIOs) present a serious threat to the integrity of online social spaces and to real-world democratic elections. While many OIO detection approaches have focused on classification algorithm... 详细信息
来源: 评论
Comparing Community-Aware Centrality Measures in Online Social Networks  10th
Comparing Community-Aware Centrality Measures in Online Soci...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Rajeh, Stephany Savonnet, Marinette Leclercq, Eric Cherifi, Hocine Univ Burgundy Lab Informat Bourgogne Dijon France
Identifying key nodes is crucial for accelerating or impeding dynamic spreading in a network. Community-aware centrality measures tackle this problem by exploiting the community structure of a network. Although there ... 详细信息
来源: 评论
Extending ASMETA with Time Features  8th
Extending ASMETA with Time Features
收藏 引用
7th International Conference on Rigorous State-Based Methods (ABZ)
作者: Bombarda, Andrea Bonfanti, Silvia Gargantini, Angelo Riccobene, Elvinia Univ Bergamo Dipartimento Ingn Gest Informaz & Prod Bergamo Italy Univ Milan Dipartimento Informat Milan Italy
ASMs and the ASMETA framework can be used to model and analyze a variety of systems, and many of them rely on time constraints. In this paper, we present the ASMETA extension to deal with model time features.
来源: 评论
Approximation Algorithm for Maximizing Nonnegative Weakly Monotonic Set Functions  10th
Approximation Algorithm for Maximizing Nonnegative Weakly Mo...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Cui, Min Du, Donglei Xu, Dachuan Yang, Ruiqi Beijing Univ Technol Dept Operat Res & Informat Engn Beijing 100124 Peoples R China Univ New Brunswick Fac Management Fredericton NB E3B 5A3 Canada Beijing Univ Technol Beijing Inst Sci & Engn Comp Beijing 100124 Peoples R China Univ Chinese Acad Sci Sch Math Sci Beijing 100049 Peoples R China
In recent years, submodularity has been found in a wide range of connections and applications with different scientific fields. However, many applications in practice do not fully meet the characteristics of diminishi... 详细信息
来源: 评论
Collecting Coupons is Faster with Friends  28th
Collecting Coupons is Faster with Friends
收藏 引用
28th International Colloquium on Structural Information and Communication Complexity (SIROCCO)
作者: Alistarh, Dan Davies, Peter Inst Sci & Technol Austria IST Austria Campus 1 A-3400 Klosterneuburg Austria
In this note, we introduce a distributed twist on the classic coupon collector problem: a set of m collectors wish to each obtain a set of n coupons;for this, they can each sample coupons uniformly at random, but can ... 详细信息
来源: 评论
Target Set Selection in Social Networks with Influence and Activation Thresholds  10th
Target Set Selection in Social Networks with Influence and A...
收藏 引用
10th International Conference on Computational Data and Social Networks (CSoNet)
作者: Qiang, Zhecheng Pasiliao, Eduardo L. Zheng, Qipeng P. Univ Cent Florida Dept Ind Engn & Management Syst Orlando FL 32816 USA Air Force Res Lab Munit Directorate Shalimar FL USA
Social media networks have gradually become the major venue for broadcasting and relaying information, thereafter making great influences in many aspects of our daily lives. With the mass adoption of the internet and ... 详细信息
来源: 评论