咨询与建议

限定检索结果

文献类型

  • 199 篇 会议
  • 10 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 132 篇 工学
    • 116 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 27 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 生物工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 1 篇 机械工程
    • 1 篇 光学工程
  • 39 篇 理学
    • 30 篇 数学
    • 6 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 4 篇 物理学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 14 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 6 篇 医学
    • 5 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 艺术学

主题

  • 21 篇 evolutionary com...
  • 11 篇 optimization
  • 10 篇 computation theo...
  • 10 篇 computational mo...
  • 8 篇 algorithms
  • 8 篇 heuristic algori...
  • 7 篇 signal processin...
  • 6 篇 convergence
  • 6 篇 genetic algorith...
  • 6 篇 machine learning
  • 6 篇 clustering algor...
  • 6 篇 data structures
  • 5 篇 statistics
  • 5 篇 resource managem...
  • 5 篇 servers
  • 5 篇 algorithm design...
  • 5 篇 artificial intel...
  • 5 篇 edge computing
  • 4 篇 computer science
  • 4 篇 theory of comput...

机构

  • 2 篇 univ bonn bonn
  • 2 篇 univ manitoba de...
  • 2 篇 hunan univ coll ...
  • 2 篇 college of infor...
  • 2 篇 bangladesh univ ...
  • 2 篇 department of el...
  • 2 篇 qingdao univ col...
  • 2 篇 peng cheng labor...
  • 2 篇 suny coll new pa...
  • 2 篇 polytechnic inst...
  • 2 篇 univ jember jemb...
  • 2 篇 college of compu...
  • 2 篇 national univers...
  • 2 篇 school of commun...
  • 2 篇 dipartimento di ...
  • 2 篇 key laboratory o...
  • 2 篇 beijing universi...
  • 2 篇 college of compu...
  • 2 篇 zhejiang univ te...
  • 1 篇 ramrao adik inst...

作者

  • 3 篇 jiang fan
  • 3 篇 slamin
  • 2 篇 wang lei
  • 2 篇 wu yuan
  • 2 篇 rahman md. saidu...
  • 2 篇 li kenli
  • 2 篇 mutzel petra
  • 2 篇 leung carson kai...
  • 2 篇 yu jie
  • 2 篇 li hao
  • 2 篇 jiao licheng
  • 2 篇 li keqin
  • 2 篇 pazdor adam g. m...
  • 2 篇 peddle aaron m.
  • 2 篇 zhang qi
  • 2 篇 peng jiwu
  • 1 篇 frangu laurentiu
  • 1 篇 becchetti luca
  • 1 篇 ha yajun
  • 1 篇 jizhao yin

语言

  • 211 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"任意字段=16th International Conference and Workshops on Algorithms and Computation"
216 条 记 录,以下是81-90 订阅
排序:
Faster Privacy-Preserving computation of Edit Distance with Moves  14th
Faster Privacy-Preserving Computation of Edit Distance with ...
收藏 引用
14th international conference and workshops on algorithms and computation (WALCOM)
作者: Yoshimoto, Yohei Kataoka, Masaharu Takabatake, Yoshimasa Tomohiro, I Shin, Kilho Sakamoto, Hiroshi Kyushu Inst Technol 680-4 Kawazu Iizuka Fukuoka 8208502 Japan Gakushuin Univ Toshima Ku 1-5-1 Mejiro Tokyo 1718588 Japan
We consider an efficient two-party protocol for securely computing the similarity of strings w.r.t. an extended edit distance measure. Here, two parties possessing strings x and y, respectively, want to jointly comput... 详细信息
来源: 评论
Business Process Management workshops  1
收藏 引用
丛书名: Lecture Notes in Business Information Processing
1000年
作者: Jochen De Weerdt Luise Pufahl
this book constitutes revised papers from the international workshops held at the 21st international conference on Business Process Management, BPM 2023, in Utrecht, the Netherlands, during September 2023.;Papers from... 详细信息
来源: 评论
Optimal Multi-access computation Offloading for Mobile Blockchain  16
Optimal Multi-access Computation Offloading for Mobile Block...
收藏 引用
16th IEEE international conference on Communication Systems (IEEE ICCS)
作者: Wu, Yuan Shi, Jiajun Chen, Xiangxu Ni, Kejie Qian, Li Ping Zhang, Kuan Zhejiang Univ Technol Coll Informat Engn Hangzhou 310023 Zhejiang Peoples R China Univ Nebraska Dept Elect & Comp Engn Lincoln NE USA
Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. the mining process of blockchain, however, requires to consume heavy computation-resources to solve the pr... 详细信息
来源: 评论
A Novel Lightweight and Robust Source-Channel Coding Solution for MIoT Communication Based on DL Denoising/Super Resolution Model  16
A Novel Lightweight and Robust Source-Channel Coding Solutio...
收藏 引用
16th international conference on Signal-Image Technology and Internet-Based Systems (SITIS)
作者: Noura, Hassan Azar, Joseph Couturier, Raphael Salman, Ola UFC FEMTO ST Inst CNRS Belfort France Amer Univ Beirut Elect & Comp Engn Dept Beirut 11072020 Lebanon
Multimedia Internet of things (MIoT) network is prone to a variety of challenging constraints, especially in terms of performance and security. Employed MIoT devices can be limited in terms of power, computation, and ... 详细信息
来源: 评论
Computing Morse Decompositions for Triangulated Terrains: An Analysis and an Experimental Evaluation
收藏 引用
16th international conference on Image Analysis and Processing (ICIAP)
作者: Vitali, Maria De Floriani, Leila Magillo, Paola Univ Genoa Genoa Italy
We consider the problem of extracting the morphology of a terrain discretized as a triangle mesh. We discuss first how to transpose Morse theory to the discrete case in order to describe the morphology of triangulated... 详细信息
来源: 评论
An efficient algorithm for approximate biased quantile computation in data streams
An efficient algorithm for approximate biased quantile compu...
收藏 引用
16th ACM conference on Information and Knowledge Management, CIKM 2007
作者: Zhang, Qi Wang, Wei University of North Carolina Chapel Hill United States
We propose an efficient algorithm for approximate biased quantile computation in large data streams. Our algorithm computes decomposable biased quantile summaries on fixed sized blocks and dynamically maintains the bi... 详细信息
来源: 评论
Financial Cryptography and Data Security - FC 2013 workshops, USEC and WAHC 2013, Revised Selected Papers
Financial Cryptography and Data Security - FC 2013 Workshops...
收藏 引用
16th international conference on Financial Cryptography and Data Security, FC 2013
the proceedings contain 16 papers. the topics discussed include: the impact of length and mathematical operators on the usability and security of system-assigned one-time PINs;QRishing: the susceptibility of smartphon...
来源: 评论
16th international Workshop on algorithms in Bioinformatics, WABI 2016
16th International Workshop on Algorithms in Bioinformatics,...
收藏 引用
16th international Workshop on algorithms in Bioinformatics, WABI 2016
the proceedings contain 25 papers. the special focus in this conference is on algorithms in Bioinformatics. the topics include: Optimal computation of avoided words;a biclique approach to reference anchored gene block...
来源: 评论
A Verifiable Federated Learning Scheme Based on Secure Multi-party computation  16th
A Verifiable Federated Learning Scheme Based on Secure Multi...
收藏 引用
16th international conference on Wireless algorithms, Systems, and Applications (WASA)
作者: Mou, Wenhao Fu, Chunlei Lei, Yan Hu, Chunqiang Chongqing Univ Sch Big Data & Software Engn Chongqing Peoples R China
Federated learning ensures that the quality of the model is uncompromised while the resulting global model is consistent with the model trained by directly collecting user data. However, the risk of inferring data con... 详细信息
来源: 评论
Applying OpenMP-based Parallel Implementations of NSGA-II and SPEA2 to Study Phylogenetic Relationships  16
Applying OpenMP-based Parallel Implementations of NSGA-II an...
收藏 引用
16th IEEE international conference on Cluster Computing (CLUSTER)
作者: Santander-Jimenez, Sergio Vega-Rodriguez, Miguel A. Univ Extremadura Dept Technol Comp & Commun Caceres Spain
throughout the years, biological processing demands have been addressed by relying on the design of algorithmic approaches for parallel architectures. By taking advantage of multicore processor systems, we can deal wi... 详细信息
来源: 评论