咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 11 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 167 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 42 篇 信息与通信工程
    • 30 篇 电气工程
    • 21 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 5 篇 网络空间安全
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
  • 72 篇 理学
    • 47 篇 数学
    • 22 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 10 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 医学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 genetic algorith...
  • 8 篇 artificial intel...
  • 8 篇 constraint theor...
  • 6 篇 machine learning
  • 6 篇 game theory
  • 6 篇 clustering algor...
  • 5 篇 computer science
  • 5 篇 algorithm design...
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 4 篇 graph theory
  • 4 篇 computers
  • 4 篇 decision making
  • 4 篇 computer vision
  • 4 篇 computer network...
  • 3 篇 computer simulat...
  • 3 篇 object detection
  • 3 篇 systems engineer...
  • 3 篇 algorithms
  • 3 篇 computer communi...

机构

  • 3 篇 univ penn dept c...
  • 3 篇 electronics and ...
  • 3 篇 division of comp...
  • 2 篇 universitat jaum...
  • 2 篇 imdea software i...
  • 2 篇 ben-gurion unive...
  • 2 篇 univ cambridge 6...
  • 2 篇 university of na...
  • 2 篇 duke univ dept e...
  • 2 篇 tu wien austria
  • 2 篇 institute of sys...
  • 2 篇 bank of italy fr...
  • 2 篇 school of mathem...
  • 2 篇 university of al...
  • 2 篇 university of ca...
  • 2 篇 department of co...
  • 2 篇 johannes gutenbe...
  • 2 篇 los alamos natio...
  • 2 篇 university of cy...
  • 2 篇 scuola superiore...

作者

  • 3 篇 parlato gennaro
  • 3 篇 sokolsky oleg
  • 3 篇 park junkil
  • 3 篇 pajic miroslav
  • 3 篇 lee insup
  • 3 篇 la torre salvato...
  • 3 篇 fischer bernd
  • 2 篇 marta garcia-gas...
  • 2 篇 sarah neuwirth
  • 2 篇 holeman isaac
  • 2 篇 gracia ester mar...
  • 2 篇 mohd azlishah ot...
  • 2 篇 tomasco ermenegi...
  • 2 篇 inverso omar
  • 2 篇 segal michael
  • 2 篇 david e. singh
  • 2 篇 lengál ondřej
  • 2 篇 admela jukan
  • 2 篇 matteo nardelli
  • 2 篇 silvina caino-lo...

语言

  • 274 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"任意字段=1st International ICST Conference on Theory and Practice of Algorithms in Computer Systems"
278 条 记 录,以下是111-120 订阅
Rough Sets and Intelligent systems Paradigms: Second international conference, RSEISP 2014, Held as Part of JRS 2014, Granada and Madrid, Spain, July 9-13, 2014. Proceedings  1
收藏 引用
丛书名: Lecture Notes in computer Science 8537 Lecture Notes in Artificial Intelligence
2014年
作者: Marzena Kryszkiewicz, Chris Cornelis, Davide Ciucci, Jesús Medina-Moreno, Hiroshi Motoda, Zbigniew W. Raś (eds.)
This book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was h...
来源: 评论
PIC2LNT: Model Transformation for Model Checking an Applied Pi-Calculus
PIC2LNT: Model Transformation for Model Checking an Applied ...
收藏 引用
19th international conference on Tools and algorithms for the Construction and Analysis of systems (TACAS) Held as Part of the European Joint conferences on theory and practice of Software (ETAPS)
作者: Mateescu, Radu Salaun, Gwen Inria Grenoble Rhone Alpes Montbonnot St Martin France LIG CONVECS Team Montbonnot St Martin France Grenoble INP Grenoble France
The π-calculus [12] was proposed by Milner, Parrow, and Walker about twenty years ago for describing concurrent systems with mobile communication. The π-calculus is equipped with operational semantics defined in ter... 详细信息
来源: 评论
Bounds for the Security of the Vivaldi Network Coordinate System
Bounds for the Security of the Vivaldi Network Coordinate Sy...
收藏 引用
1st international conference on Networked systems (Netsys)
作者: Girlich, Franz Rossberg, Michael Schaefer, Guenter Boehme, Thomas Schreyer, Jens Ilmenau Univ Technol Telemat & Comp Networks Grp Ilmenau Germany Tech Univ Ilmenau Discrete Math & Algebra Grp Ilmenau Germany
Network coordinate systems have gained much attention as they allow for an elegant estimation of distances between nodes in distributed systems. Their most prominent representative is Vivaldi, which is using a mass-sp... 详细信息
来源: 评论
Greedy Embedding, Routing and Content Addressing for Darknets
Greedy Embedding, Routing and Content Addressing for Darknet...
收藏 引用
1st international conference on Networked systems (Netsys)
作者: Hoefer, Andreas Roos, stefanie strufe, Thorsten Tech Univ Darmstadt Peer To Peer Networks Grp Darmstadt Germany
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing schem... 详细信息
来源: 评论
Unsupervised 3D object classification from range image data by algorithmic information theory
Unsupervised 3D object classification from range image data ...
收藏 引用
2013 1st RSI/ISM international conference on Robotics and Mechatronics, ICRoM 2013
作者: Norouzzadeh Ravari, Alireza Taghirad, Hamid D. Faculty of Electrical and Computer Engineering K.N. Toosi University of Technology Tehran Iran
The problem of unsupervised classification of 3D objects from depth information is investigated in this paper. The range images are represented efficiently as sensor observations. Considering the high-dimensionality o... 详细信息
来源: 评论
Automatic clustering based on Cluster Nearest Neighbor Distance (CNND) algorithm
收藏 引用
1st international conference on Frontiers in Intelligent Computing: theory and Applications, FICTA 2012
作者: Sur, Arghya Chowdhury, Aritra Chowdhury, Jaydeep Ghosh Das, Swagatam Dept. of Electronics and Telecomunication Engg. Jadavpur University Kolkata 700032 India Electronics and Computer Sciences Unit Indian Statistical Institute Kolkata India
This article describes a simple and fast algorithm that can automatically detect any number of well separated clusters, which may be of any shape e.g. convex and/or non-convex. This is in contrast to most of the exist... 详细信息
来源: 评论
Automated design and optimization of combinational circuits using genetic algorithms
收藏 引用
1st international conference on Frontiers in Intelligent Computing: theory and Applications, FICTA 2012
作者: Sagar, K. Vathsal, S. Department of Computer Science and Engineering Chitanya Bharathi Institute of Technology Hyderabad India JBIET Moinabad Hyderabad India
We introduce a method, based on genetic algorithm to automate and optimize the design of combinational circuits. Usually, logic circuits are designed by human beings who have a specific repertoire of conventional desi... 详细信息
来源: 评论
Soft Set and genetic algorithms for association rule mining: A road map and direction for hybridization
收藏 引用
1st international conference on Frontiers in Intelligent Computing: theory and Applications, FICTA 2012
作者: Dash, Satya Ranjan Dehuri, Satchidananda School of Computer Application KIIT University Patia Bhubaneswar Odisha 751006 India Department of Information and Communication Technology Fakir Mohan University Vyasa Vihar Balasore Odisha 756019 India
Association rules have relied on user-specified threshold of support and confidence. With no prior/little domain knowledge, if the user is specifying threshold for the mining task;then there is a direct impact on qual... 详细信息
来源: 评论
Minimum spanning tree based clustering using partitional approach
收藏 引用
1st international conference on Frontiers in Intelligent Computing: theory and Applications, FICTA 2012
作者: Edla, Damodar Reddy Jana, Prasanta K. Department of Computer Science and Engineering Indian School of Mines Dhanbad Jharkhand 826 004 India
Graph-based clustering techniques have widely been researched in the literature. Mst-based clustering is the well known graph-based model in producing the clusters of arbitrary shapes. However, the Mst-based clusterin... 详细信息
来源: 评论
EOst-an access method for obfuscating spatio-temporal data in LBS
收藏 引用
1st international conference on Frontiers in Intelligent Computing: theory and Applications, FICTA 2012
作者: Gavali, Ashwini Limkar, Suresh Patil, Dnyanashwar Department of Computer Engineering GHRCEM Pune India Department of Computer Engineering AISSMS's IOIT Pune India Department of Computer Engineering DYPCOE Ambi Pune India
Most widely use of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based s... 详细信息
来源: 评论