咨询与建议

限定检索结果

文献类型

  • 458 篇 会议
  • 24 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 499 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 254 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 52 篇 电气工程
    • 44 篇 信息与通信工程
    • 34 篇 土木工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 建筑学
    • 16 篇 材料科学与工程(可...
    • 15 篇 控制科学与工程
    • 13 篇 仪器科学与技术
    • 12 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 测绘科学与技术
    • 10 篇 生物工程
    • 6 篇 化学工程与技术
  • 113 篇 理学
    • 68 篇 数学
    • 22 篇 物理学
    • 20 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 化学
    • 7 篇 地质学
    • 7 篇 系统科学
    • 6 篇 地球物理学
  • 43 篇 管理学
    • 23 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 9 篇 特种医学
    • 7 篇 医学技术(可授医学...
  • 4 篇 农学
  • 3 篇 经济学
  • 3 篇 法学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 105 篇 data structures
  • 36 篇 data mining
  • 22 篇 computer science
  • 17 篇 clustering algor...
  • 12 篇 algorithms
  • 12 篇 internet
  • 12 篇 algorithm design...
  • 10 篇 structural healt...
  • 10 篇 classification a...
  • 10 篇 data models
  • 9 篇 computer archite...
  • 9 篇 image segmentati...
  • 9 篇 protocols
  • 9 篇 hardware
  • 9 篇 algorithm analys...
  • 9 篇 partitioning alg...
  • 8 篇 discrete mathema...
  • 8 篇 databases
  • 7 篇 scalability
  • 7 篇 deep learning

机构

  • 5 篇 fujian prov univ...
  • 5 篇 hubei univ techn...
  • 4 篇 microsoft resear...
  • 3 篇 chandigarh unive...
  • 3 篇 wuhan fiberhome ...
  • 2 篇 univ michigan an...
  • 2 篇 institute of aer...
  • 2 篇 engineer dxc tec...
  • 2 篇 fermilab natl ac...
  • 2 篇 southwest jiaoto...
  • 2 篇 department of co...
  • 2 篇 lovely professio...
  • 2 篇 univ maryland de...
  • 2 篇 int hellen univ ...
  • 2 篇 aeronautics-tech...
  • 2 篇 peking univ ctr ...
  • 2 篇 lloyd institute ...
  • 2 篇 nci frederick ca...
  • 2 篇 college of engin...
  • 2 篇 heriot watt univ...

作者

  • 5 篇 ye zhiwei
  • 3 篇 lehner wolfgang
  • 2 篇 shatsky maxim
  • 2 篇 monaco ernesto
  • 2 篇 montenegro manue...
  • 2 篇 catthoor francky
  • 2 篇 scholz sven-bodo
  • 2 篇 napoli amedeo
  • 2 篇 tjortjis christo...
  • 2 篇 chen chen
  • 2 篇 thiele maik
  • 2 篇 weifeng lv
  • 2 篇 fischer ulrike
  • 2 篇 yan lingyu
  • 2 篇 praveen
  • 2 篇 saxena sanjeev
  • 2 篇 dror oranit
  • 2 篇 tongyu zhu
  • 2 篇 wolfson haim j.
  • 2 篇 ouyang cheng

语言

  • 491 篇 英文
  • 4 篇 其他
  • 2 篇 俄文
  • 2 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=10th International Workshop on Algorithms and Data Structures"
500 条 记 录,以下是1-10 订阅
排序:
algorithms and data structures - 10th international workshop, WADS 2007, Proceedings
收藏 引用
10th international workshop on algorithms and data structures, WADS 2007
the proceedings contain 56 papers. the topics discussed include: orthogonal range searching in linear and almost-linear space;spherical LSH for approximate nearest neighbor search on unit hypersphere;approximating the... 详细信息
来源: 评论
algorithms and data structures : 7th international workshop, WADS 2001, Providence, RI, USA, August
收藏 引用
2001年
作者: WADS 2001
来源: 内蒙古大学图书馆图书 评论
data structures Towards the Recognition of Fake News and Disinformation Written in Polish  19th
Data Structures Towards the Recognition of Fake News and ...
收藏 引用
19th international workshop on data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024
作者: Walczak, Mateusz Poniszewska-Marańda, Aneta Institute of Information Technology Lodz University of Technology Lodz Poland
Fake news and disinformation recognition has become a very important and simultaneously hot problem in our current life. this problem touches different countries and in consequence different national languages and sta... 详细信息
来源: 评论
Deep Learning for Network Anomaly Detection Under data Contamination: Evaluating Robustness and Mitigating Performance Degradation  19th
Deep Learning for Network Anomaly Detection Under Data Cont...
收藏 引用
19th international workshop on data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024
作者: Nkashama, D’Jeff K. Masakuna, Jordan F. Soltani, Arian Verdier, Jean-Charles Frappier, Marc Tardif, Pierre-Martin Kabanza, Froduald Université de Sherbrooke SherbrookeQCJ1K 2R1 Canada
Deep learning (DL) has emerged as a crucial tool in network anomaly detection (NAD) for cybersecurity. While DL models for anomaly detection excel at extracting features and learning patterns from data, they are vulne... 详细信息
来源: 评论
Benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains  19th
Benchmarking Post-quantum Cryptography in Ethereum-Based Bl...
收藏 引用
19th international workshop on data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024
作者: Juaristi, Patxi Agudo, Isaac Rios, Ruben Ricci, Laura Cloud Data Spaces Ikerlan Arrasate-Mondragón Spain NICS Lab Universidad de Málaga Málaga Spain Università di Pisa Pisa Italy
Blockchain technology has significantly transformed various industries by enabling secure and tamper-resistant transactions. However, the rise of quantum computing threatens the cryptographic foundations of blockchain... 详细信息
来源: 评论
Exploring Distribution Learning of Synthetic data Generators for Manifolds  19th
Exploring Distribution Learning of Synthetic Data Generator...
收藏 引用
19th international workshop on data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024
作者: Garg, Sonakshi Torra, Vicenç Umeå University Umeå Sweden
In the era of data protection regulations like GDPR, safeguarding sensitive information has become paramount, prompting the exploration of synthetic data generation as a privacy-preserving alternative. Generative Adve... 详细信息
来源: 评论
Special issue: 10th workshop on algorithms and data structures (WADS 2007) Editor Norbert Zeh
收藏 引用
COMPUTATIONAL GEOMETRY-thEORY AND APPLICATIONS 2010年 第4期43卷 329-330页
作者: Zeh, Norbert
来源: 评论
Largest bounding box, smallest diameter, and related problems on imprecise points
收藏 引用
COMPUTATIONAL GEOMETRY-thEORY AND APPLICATIONS 2010年 第4期43卷 419-433页
作者: Loffler, Maarten van Kreveld, Marc Univ Utrecht Dept Informat & Comp Sci NL-3508 TC Utrecht Netherlands
Imprecision of input data is one of the main obstacles that prevent geometric algorithms from being used in practice. We model an imprecise point by a region in which the point must lie. Given a set of imprecise point... 详细信息
来源: 评论
Teaching algorithms and data structures with a Proof Assistant  2021
Teaching Algorithms and Data Structures with a Proof Assista...
收藏 引用
10th ACM SIGPLAN international Conference on Certified Programs and Proofs (CPP)
作者: Nipkow, Tobias Tech Univ Munich Munich Germany
We report on a new course Verified Functional data structures and algorithms taught at the Technical University of Munich. the course first introduces students to interactive theorem proving with the Isabelle proof as... 详细信息
来源: 评论
Space-efficient straggler identification in round-trip data streams via Newton's identities and invertible bloom filters
收藏 引用
10th international workshop on algorithms and data structures
作者: Eppstein, David Goodrich, Michael T. Univ Calif Irvine Dept Comp Sci Irvine CA 92697 USA
We study the straggler identification problem, in which an algorithm must determine the identities of the remaining members of a set after it has had a large number of insertion and deletion operations performed on it... 详细信息
来源: 评论