咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 11 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 167 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 42 篇 信息与通信工程
    • 30 篇 电气工程
    • 21 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 5 篇 网络空间安全
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
  • 72 篇 理学
    • 47 篇 数学
    • 22 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 10 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 医学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 genetic algorith...
  • 8 篇 artificial intel...
  • 8 篇 constraint theor...
  • 6 篇 machine learning
  • 6 篇 game theory
  • 6 篇 clustering algor...
  • 5 篇 computer science
  • 5 篇 algorithm design...
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 4 篇 graph theory
  • 4 篇 computers
  • 4 篇 decision making
  • 4 篇 computer vision
  • 4 篇 computer network...
  • 3 篇 computer simulat...
  • 3 篇 object detection
  • 3 篇 systems engineer...
  • 3 篇 algorithms
  • 3 篇 logic gates

机构

  • 3 篇 univ penn dept c...
  • 3 篇 electronics and ...
  • 3 篇 division of comp...
  • 2 篇 ben-gurion unive...
  • 2 篇 univ cambridge 6...
  • 2 篇 duke univ dept e...
  • 2 篇 tu wien austria
  • 2 篇 institute of sys...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 dacya complutens...
  • 2 篇 med mobile 535 2...
  • 2 篇 college of compu...
  • 2 篇 deis universit d...
  • 2 篇 school of comput...
  • 1 篇 lahore pakistan
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 dept. of mechani...
  • 1 篇 key laboratory o...

作者

  • 3 篇 parlato gennaro
  • 3 篇 sokolsky oleg
  • 3 篇 park junkil
  • 3 篇 pajic miroslav
  • 3 篇 lee insup
  • 3 篇 la torre salvato...
  • 3 篇 fischer bernd
  • 2 篇 holeman isaac
  • 2 篇 mohd azlishah ot...
  • 2 篇 tomasco ermenegi...
  • 2 篇 inverso omar
  • 2 篇 segal michael
  • 2 篇 lengál ondřej
  • 2 篇 ross peter
  • 2 篇 hamzah asyrani s...
  • 2 篇 yahaya abd rahim
  • 2 篇 mohd fairuz iska...
  • 2 篇 marchetti-spacca...
  • 2 篇 corne david
  • 1 篇 roihan ahmad

语言

  • 275 篇 英文
  • 2 篇 中文
检索条件"任意字段=1st International ICST Conference on Theory and Practice of Algorithms in Computer Systems"
276 条 记 录,以下是241-250 订阅
排序:
Partial arc consistency
Partial arc consistency
收藏 引用
Workshop on Over-Constrained systems, held as part of 1st international conference on Principles and practice of Constraint Programming, CP 1995
作者: Dendris, Nick D. Kirousis, Lefteris M. stamatiou, Yannis C. Thilikos, Dimitris M. Department of Computer Engineering and Informatics Patras University Rio Patras265 00 Greece
A constraint network is arc consistent if any value of its variables is compatible with at least one value of any other variable. Enforcing arc consistency in a constraint network is a commonly used preprocessing step... 详细信息
来源: 评论
Rough inference system for automated failure prediction in cooling devices
Rough inference system for automated failure prediction in c...
收藏 引用
Optimization Techniques for Learning (ICOTL), international conference on
作者: Zbigniew Kokosiński Piotr Szydłowski Department of Automatic Control and Computer Engineering Cracow University of Technology Kraków Poland Efento Sp. z o.o. Kraków Poland
This article presents a versatile model of failure prediction in control systems of objects with large time constants. The basic model of a control unit consists of deterministic finite automaton (DFA) which states co...
来源: 评论
A novel automatic step-size adjustment approach in the LMS algorithm
A novel automatic step-size adjustment approach in the LMS a...
收藏 引用
international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology (Wireless VITAE)
作者: Peijie Wang Pooi Yuen Kam Meng Wah Chia Department of Electrical and Computer Engineering National University of Singapore Singapore
A variable step-size is necessary in the least-mean-square (LMS) algorithm to achieve both fast convergence and a small final excess mean-square estimation error. As a well-studied area, many variations of the LMS alg... 详细信息
来源: 评论
On the effectiveness and efficiency of computing bounds on the support of item-sets in the frequent item-sets mining problem
On the effectiveness and efficiency of computing bounds on t...
收藏 引用
1st international Workshop on Open Source Data Mining: Frequent Pattern Mining Implementations, OSDM 2005, held in conjunction with the 11th ACM SIGKDD international conference on Knowledge Discovery and Data Mining
作者: Sayrafi, Bassem Van Gucht, Dirk Purdom, Paul W. Computer Science Department Indiana University Lindley Hall 215 Bloomington IN 47405 United States
We study the relative effectiveness and the efficiency of computing support-bounding rules that can be used to prune the search space in algorithms to solve the frequent item-sets mining problem (FIM). We develop a fo... 详细信息
来源: 评论
Machine Learning-Based Hybrid Feature Selection for Improvised Network Intrusion Detection  1st
Machine Learning-Based Hybrid Feature Selection for Improvis...
收藏 引用
1st international conference on Innovations in Intelligent Computing and Communication, ICIICC 2021
作者: Satapathy, Pritimayee Behera, Prafulla Kumar Department of Computer Science and Applications Utkal University Vani Vihar Odisha Bhubaneswar751004 India
With the expeditious development of network-based applications, unusual threats erupt. Therefore, distinctive security components are required so that they can boost the existing security mechanism. Network administra... 详细信息
来源: 评论
Prediction and management in energy harvested wireless sensor nodes
Prediction and management in energy harvested wireless senso...
收藏 引用
international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology (Wireless VITAE)
作者: Joaquin Recas Piorno Carlo Bergonzini David Atienza Tajana Simunic Rosing DACYA Complutense University of Madrid Spain DEIS Universit degli Studi di Bologna Italy Embedded Systems Laboratory Ecole Polytechnique Fédérale de Lausanne Switzerland Computer Science and Engineering University of California San Diego USA
Solar panels are frequently used in wireless sensor nodes because they can theoretically provide quite a bit of harvested energy. However, they are not a reliable, consistent source of energy because of the Sun's ... 详细信息
来源: 评论
Issues with Path Representation in Transition systems
Issues with Path Representation in Transition Systems
收藏 引用
international conference on Applied Computing and Information Technology
作者: Yi Zheng Chi-Chang Chang Pei He Yafen Liu School of Computer Science and Educational Software Guangzhou University School of Medical Informatics Chung Shan Medical University
structured analysis of transition systems concerns paths, building blocks, representations, and effective computations of semantics, thus having significant influence on practical applications of graph theory. For ins... 详细信息
来源: 评论
Combining unification algorithms for confined regular equational theories  1st
Combining unification algorithms for confined regular equati...
收藏 引用
1st international conference on Rewriting Techniques and Applications, RTA 1985
作者: Yelick, Kathy Laboratory for Computer Science Massachusetts Institute of Technology United States MIT Laboratory for Computer Science 545 Technology Square CambridgeMA02139 United States
This paper presents a method for combining equational unification algorithms to handle terms containing "mixed" sets of function symbols. For example, given one algorithm for unifying associative-commutative... 详细信息
来源: 评论
Energy devices for sensor networks: Properties for simulation and deployment
Energy devices for sensor networks: Properties for simulatio...
收藏 引用
international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology (Wireless VITAE)
作者: Alex S. Weddell Geoff V. Merrett Nick R. Harris Neil M. White Pervasive Systems Centre School of Electronics and Computer Science University of Southampton Southampton UK
Recent developments in microcontroller, radio transceiver, and energy harvesting device design now permit wireless sensor nodes to operate indefinitely from power scavenged from their environment. Many algorithms for ... 详细信息
来源: 评论
Code-based test generation for validation of functional processor descriptions
Code-based test generation for validation of functional proc...
收藏 引用
9th international conference on Tools and algorithms for the Construction and Analysis of systems, TACAS 2003 Held as Part of the Joint European conferences on theory and practice of Software, ETAPS 2003
作者: Baray, Fabrice Codognet, Philippe Diaz, Daniel Michel, Henri ST-Microelectronics Central R and D France University of Paris 6 LIP6 France University of Paris 1 France
Microprocessor design deals with many types of specifications: from functional models (SystemC or proprietary languages) to hardware description languages such as VHDL or Verilog. Functional descriptions are key to th... 详细信息
来源: 评论