咨询与建议

限定检索结果

文献类型

  • 458 篇 会议
  • 24 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 499 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 254 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 52 篇 电气工程
    • 44 篇 信息与通信工程
    • 34 篇 土木工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 建筑学
    • 16 篇 材料科学与工程(可...
    • 15 篇 控制科学与工程
    • 13 篇 仪器科学与技术
    • 12 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 测绘科学与技术
    • 10 篇 生物工程
    • 6 篇 化学工程与技术
  • 113 篇 理学
    • 68 篇 数学
    • 22 篇 物理学
    • 20 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 化学
    • 7 篇 地质学
    • 7 篇 系统科学
    • 6 篇 地球物理学
  • 43 篇 管理学
    • 23 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 23 篇 医学
    • 18 篇 临床医学
    • 9 篇 特种医学
    • 7 篇 医学技术(可授医学...
  • 4 篇 农学
  • 3 篇 经济学
  • 3 篇 法学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 105 篇 data structures
  • 36 篇 data mining
  • 22 篇 computer science
  • 17 篇 clustering algor...
  • 12 篇 algorithms
  • 12 篇 internet
  • 12 篇 algorithm design...
  • 10 篇 structural healt...
  • 10 篇 classification a...
  • 10 篇 data models
  • 9 篇 computer archite...
  • 9 篇 image segmentati...
  • 9 篇 protocols
  • 9 篇 hardware
  • 9 篇 algorithm analys...
  • 9 篇 partitioning alg...
  • 8 篇 discrete mathema...
  • 8 篇 databases
  • 7 篇 scalability
  • 7 篇 deep learning

机构

  • 5 篇 fujian prov univ...
  • 5 篇 hubei univ techn...
  • 4 篇 microsoft resear...
  • 3 篇 chandigarh unive...
  • 3 篇 wuhan fiberhome ...
  • 2 篇 univ michigan an...
  • 2 篇 institute of aer...
  • 2 篇 engineer dxc tec...
  • 2 篇 fermilab natl ac...
  • 2 篇 southwest jiaoto...
  • 2 篇 department of co...
  • 2 篇 lovely professio...
  • 2 篇 univ maryland de...
  • 2 篇 int hellen univ ...
  • 2 篇 aeronautics-tech...
  • 2 篇 peking univ ctr ...
  • 2 篇 lloyd institute ...
  • 2 篇 nci frederick ca...
  • 2 篇 college of engin...
  • 2 篇 heriot watt univ...

作者

  • 5 篇 ye zhiwei
  • 3 篇 lehner wolfgang
  • 2 篇 shatsky maxim
  • 2 篇 monaco ernesto
  • 2 篇 montenegro manue...
  • 2 篇 catthoor francky
  • 2 篇 scholz sven-bodo
  • 2 篇 napoli amedeo
  • 2 篇 tjortjis christo...
  • 2 篇 chen chen
  • 2 篇 thiele maik
  • 2 篇 weifeng lv
  • 2 篇 fischer ulrike
  • 2 篇 yan lingyu
  • 2 篇 praveen
  • 2 篇 saxena sanjeev
  • 2 篇 dror oranit
  • 2 篇 tongyu zhu
  • 2 篇 wolfson haim j.
  • 2 篇 ouyang cheng

语言

  • 491 篇 英文
  • 4 篇 其他
  • 2 篇 俄文
  • 2 篇 中文
  • 1 篇 乌克兰文
检索条件"任意字段=10th International Workshop on Algorithms and Data Structures"
500 条 记 录,以下是121-130 订阅
排序:
Proving tree algorithms for succinct data structures  10
Proving tree algorithms for succinct data structures
收藏 引用
10th international Conference on Interactive theorem Proving, ITP 2019
作者: Affeldt, Reynald Garrigue, Jacques Qi, Xuanrui Tanaka, Kazunari National Institute of Advanced Industrial Science and Technology Tsukuba Japan Graduate School of Mathematics Nagoya University Japan Department of Computer Science Tufts University MedfordMA United States
Succinct data structures give space-efficient representations of large amounts of data without sacrificing performance. they rely on cleverly designed data representations and algorithms. We present here the formaliza... 详细信息
来源: 评论
Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm  10
Research on Network Intrusion Detection Based on Support Vec...
收藏 引用
10th IEEE international Conference on Intelligent data Acquisition and Advanced Computing Systems - Technology and Applications (IDAACS)
作者: Ye, Zhiwei Sun, Yiheng Sun, Shuang Zhan, Sikai Yu, Han Yao, Quanfeng Hubei Univ Technol Sch Comp Sci Wuhan Peoples R China Fujian Prov Key Lab Data Intens Comp Quanzhou Peoples R China Fujian Prov Univ Key Lab Intelligent Comp & Informat Proc Fuzhou Peoples R China Wuhan FiberHome Tech Serv Co Ltd Wuhan Peoples R China
As one of the most important parts of network security, more significance is attached to intrusion detection system (IDS). Numerous techniques including support vector machine (SVM) have been applied to the intrusion ... 详细信息
来源: 评论
Image Segmentation Using Fuzzy C-means Optimized by Ant Lion Optimization  10
Image Segmentation Using Fuzzy C-means Optimized by Ant Lion...
收藏 引用
10th IEEE international Conference on Intelligent data Acquisition and Advanced Computing Systems - Technology and Applications (IDAACS)
作者: Jin, Can Ye, Zhiwei Yan, Lingyu Cao, Ye Zhang, Aixin Ma, Lie Hu, Xiang Hu, Jiwei Hubei Univ Technol Sch Comp Sci Wuhan Peoples R China Wuhan Jingzhi Technol Co Ltd Wuhan Hubei Peoples R China Wuhan FiberHome Tech Serv Co Ltd Wuhan Peoples R China Fujian Prov Univ Fujian Prov Key Lab Data Intens Comp Fuzhou Peoples R China Fujian Prov Univ Key Lab Intelligent Comp & Informat Proc Fuzhou Peoples R China
Image segmentation is the indispensable part in the field of computer vision. there are tremendous methods for handling this task such as Otsu-thresholding and Fuzzy C-means (FCM). However, the segmentation results of... 详细信息
来源: 评论
A Learnable-by-Design (LEAD) Model for Designing Experiments for Computer Science Labs  10
A Learnable-by-Design (LEAD) Model for Designing Experiments...
收藏 引用
10th IEEE international Conference on Technology for Education, T4E 2019
作者: Kumar, Mrityunjay Choppella, Venkatesh Sunil, Sanjana Syed, Sumaid IIIT Hyderabad Hyderabad India
India graduates 1.5 million engineering students every year, majority of them from its Tier 2 and Tier 3 colleges where there is severe shortage of qualified faculty and lab infrastructure, and where English is second... 详细信息
来源: 评论
Intellectual analysis and basic modeling of complex threats  10
Intellectual analysis and basic modeling of complex threats
收藏 引用
10th Anniversary international Scientific and Technical Conference on Secure Information Technologies, BIT 2019
作者: Korneev, Nikolai Merkulov, Vyacheslav Faculty of Integrated Security of Fuel and Energy Complex Gubkin Russian State University of Oil and Gas National Research University Moscow Russia Department of Data Analysis Decision-Making and Financial Technology Financial University under the Government of the Russian Federation Moscow Russia
the paper describes the basic principles of complex threats modeling, and the task of complex threats detection is formalized. the proposed modeling principles are based on the idea of identifying the links between el... 详细信息
来源: 评论
Estimation of the delamination size of carbon fiber panels from the impact sound  12
Estimation of the delamination size of carbon fiber panels f...
收藏 引用
12th international workshop on Structural Health Monitoring: Enabling Intelligent Life-Cycle Health Management for Industry Internet of things (IIOT), IWSHM 2019
作者: Uriarte, Patrick Shah, Kumar Y. Tansel, Ibrahim Etienne, Kayla Florida International University Mechanical and Materials Engineering Department 10555 W. Flagler St. MiamiFL33174 United States
Large composite panels of airplanes are regularly inspected, and delaminated sections are repaired. Experienced technicians can detect the delaminated sections of composite panels from the sound created from a small i... 详细信息
来源: 评论
Clustering Alexa Internet data using Auto Encoder Network and Affinity Propagation
Clustering Alexa Internet Data using Auto Encoder Network an...
收藏 引用
international eConference on Computer and Knowledge Engineering (ICCKE)
作者: Ali Risheh Ashkan Goharfar Nastooh Taheri Javan Artificial Intelligence Laboratory AmirKabir university Tehran Iran
Non-linear mapping is one of the most popular solutions for complex data structures and distinct patterns to cluster data. Auto encoder Networks (AENs) are widely used in clustering as they improve data representation... 详细信息
来源: 评论
Make evolutionary multiobjective algorithms scale better with advanced data structures: Van emde boas tree for non-dominated sorting  10th
Make evolutionary multiobjective algorithms scale better wit...
收藏 引用
10th international Conference on Evolutionary Multi-Criterion Optimization, EMO 2019
作者: Buzdalov, Maxim ITMO University 49 Kronverkskiy Avenue Saint Petersburg197101 Russia
We improve the worst-case time complexity of non-dominated sorting, an operation frequently used in evolutionary multiobjective algorithms, to O(n·(log n)k-2 log log n), where n is the number of solutions, k is t... 详细信息
来源: 评论
Research On Short-term Electric Load Forecast Based On Grey Neural Network and Snap-drift Cuckoo Search Algorithm  10
Research On Short-term Electric Load Forecast Based On Grey ...
收藏 引用
10th IEEE international Conference on Intelligent data Acquisition and Advanced Computing Systems - Technology and Applications (IDAACS)
作者: Chen, Feng Ye, Zhiwei Su, Jun Lang, Haofeng Shi, Xiaoxiao Wang, Shuqing Hubei Univ Technol Sch Comp Sci Wuhan Peoples R China Fujian Prov Univ Fujian Prov Key Lab Data Intens Comp Fuzhou Fujian Peoples R China Fujian Prov Univ Key Lab Intelligent Comp & Informat Proc Fuzhou Fujian Peoples R China
In order to provide users with reliable and qualified power, it becomes an indispensable task to enhance the forecasting capability of the short-term power load. However, the existing approaches of short-term electric... 详细信息
来源: 评论
workshop on Microbiomics, Metagenomics, and Metabolomics  19
Workshop on Microbiomics, Metagenomics, and Metabolomics
收藏 引用
10th ACM international Conference on Bioinformatics, Computational Biology and Health Informatics (ACM-BCB)
作者: Hassoun, Soha El-Manzalawy, Yasser Gerber, Georg Koslicki, David Rosen, Gail Tufts Univ Dept Comp Sci Medford MA 02155 USA Geisinger Hlth Syst Dept Biomed & Translat Informat Danville PA USA Harvard Med Sch Dept Pathol Boston MA 02115 USA Penn State Univ Comp Sci & Engn Biol State Coll PA USA Drexel Univ Dept Elect & Comp Engn Philadelphia PA 19104 USA
the past decade has witnessed a revolution in microbiology through the advent microbiomics: investigating entire microbial ecosystems in and around us as opposed to studying single microbes in isolation. Recent techno... 详细信息
来源: 评论