咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 17 册 图书
  • 9 篇 期刊文献

馆藏范围

  • 488 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 151 篇 计算机科学与技术...
    • 57 篇 电气工程
    • 52 篇 信息与通信工程
    • 51 篇 软件工程
    • 17 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 6 篇 动力工程及工程热...
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 测绘科学与技术
    • 4 篇 生物工程
    • 3 篇 化学工程与技术
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
  • 72 篇 理学
    • 53 篇 数学
    • 13 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 6 篇 生物学
    • 2 篇 化学
    • 2 篇 地球物理学
  • 17 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 109 篇 complexity theor...
  • 100 篇 computational co...
  • 33 篇 time complexity
  • 28 篇 algorithm design...
  • 25 篇 computational mo...
  • 23 篇 heuristic algori...
  • 22 篇 prediction algor...
  • 22 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 classification a...
  • 18 篇 clustering algor...
  • 18 篇 partitioning alg...
  • 17 篇 encoding
  • 16 篇 approximation al...
  • 15 篇 optimization
  • 15 篇 signal processin...
  • 14 篇 decoding
  • 14 篇 genetic algorith...
  • 14 篇 algorithm analys...
  • 12 篇 detectors

机构

  • 4 篇 university of pi...
  • 3 篇 inria rennes
  • 2 篇 vienna universit...
  • 2 篇 school of comput...
  • 2 篇 computer network...
  • 2 篇 tu münchen garch...
  • 2 篇 computer science...
  • 2 篇 faculty of engin...
  • 2 篇 isislab - dipart...
  • 2 篇 key laboratory o...
  • 2 篇 tennessee tech u...
  • 2 篇 rwth aachen univ...
  • 2 篇 department of co...
  • 2 篇 universitat poli...
  • 2 篇 vilnius universi...
  • 2 篇 cracs/inesc-tec ...
  • 2 篇 beihang universi...
  • 2 篇 tech univ munich...
  • 2 篇 tu dortmund info...
  • 2 篇 universidad carl...

作者

  • 4 篇 dell'orletta fel...
  • 3 篇 liu yang
  • 3 篇 tingting yang
  • 3 篇 carlos a. coello...
  • 2 篇 ming li
  • 2 篇 yuhui shi
  • 2 篇 michael alexande...
  • 2 篇 holzapfel klaus
  • 2 篇 zhiyang li
  • 2 篇 roberto g. casce...
  • 2 篇 bollig beate
  • 2 篇 geyong min
  • 2 篇 zorzi michele
  • 2 篇 wanlei zhou
  • 2 篇 ali hamzeh
  • 2 篇 strada roberto
  • 2 篇 alexandru costan
  • 2 篇 luís lopes
  • 2 篇 brunato dominiqu...
  • 2 篇 emmanuel jeannot

语言

  • 484 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=5th Italian Conference on Algorithms and Complexity"
488 条 记 录,以下是41-50 订阅
排序:
Overcoming complexity of (Cyber) war: the logic of useful fiction in cyber exercises scenarios  5
Overcoming complexity of (Cyber) war: The logic of useful fi...
收藏 引用
5th italian conference on Cybersecurity, ITASEC 2021
作者: Di Feo, Marzio
the paper is an attempt to analyze the logic and the impact of "useful fiction" (or "fictional intelligence") in cyber exercises scenarios as an approach to prepare for future conflicts. Cyberspace... 详细信息
来源: 评论
Dual-LightGCN+: Enhanced Dual Light Graph Convolutional Network for Discriminative Recommendation
Dual-LightGCN+: Enhanced Dual Light Graph Convolutional Netw...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International conference on
作者: Zhidong Xie Ning Zhang School of Computer Science and Technology Dongguan University of Technology Dongguan China
the Dual-LightGCN has shown promise in recommendation systems but faces limitations in explicitly modeling similarity signals between users and items, which restricts its ability to uncover potential relationships and... 详细信息
来源: 评论
AI Driven Innovation for Boosting Performance and efficiency in Mobile and Wireless Networks
AI Driven Innovation for Boosting Performance and efficiency...
收藏 引用
Communications, Information, Electronic and Energy Systems (CIEES), International conference on
作者: Arjola Biti Olimpjon Shurdi Luan Ruci Dept. of Electronics and Telecommunications Faculty of Information Technology Polytechnic University of Tirana Tirana Albania RAN Department Espo Nokia Oslo Norway
the escalating complexity and data volume in today’s digital networks demands innovative strategies to enhance performance and efficiency. this survey explores the possibilities of optimization techniques powered by ... 详细信息
来源: 评论
Colored Token Swapping Using Broom
Colored Token Swapping Using Broom
收藏 引用
Global conference for Advancement in Technology (GCAT)
作者: Ajila L Indulekha T S G Anuja Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kerala India
Token swapping, a fundamental problem in computational graph theory involves rearranging tokens at graph vertices through minimal swaps to achieve a desired configuration. this problem finds applications in various fi... 详细信息
来源: 评论
An Improved Mobilenetv3-Yolov5 Infrared Target Detection Algorithm Based on Attention Distillation  5th
An Improved Mobilenetv3-Yolov5 Infrared Target Detection Alg...
收藏 引用
5th EAI International conference on Advanced Hybrid Information Processing (ADHIP)
作者: Jin, Ronglu Xu, Yidong Xue, Wei Li, Beiming Yang, Yingwei Chen, Wenjian Harbin Engn Univ Coll Informat & Commun Engn Harbin 150001 Peoples R China Harbin Engn Univ Coll Underwater Acoust Engn Harbin 150001 Peoples R China
Most current target detection algorithms have problems such as high computational complexity and poor adaptability, which are difficult to meet actual application requirements and are deployed on mobile embedded platf... 详细信息
来源: 评论
Research on lightweight algorithm for smoking detection based on improved YOLOv8
Research on lightweight algorithm for smoking detection base...
收藏 引用
Electronic Communication and Artificial Intelligence (IWECAI), International Workshop on
作者: Guorui Zhou Xingjian Wang Northeast Forestry University College of Computer And Control Engineering Harbin China
In response to the issues of high computation and large model parameters in current smoking detection algorithms, making them difficult to deploy on edge devices, this paper proposes an improved lightweight YOLOv8 alg... 详细信息
来源: 评论
Design Of A Framework For Optimizing Bandwidth Allocation Of Video In Wireless Networks Using Hybrid Meta Heuristic Algorithm
Design Of A Framework For Optimizing Bandwidth Allocation Of...
收藏 引用
IEEE International conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Oluwole Akinyokun Abejide Adegoke Bidemi Ashade Joy Achas Olagunju Anuoluwapo Temitope Ogunbiyi Department of Software Engineering Federal University of Technology Akure Ondo State Nigeria Department of Computer Science and Information Technology Bells University of Technology Ota Ogun State Nigeria
Video transmission in wireless network poses several challenges such as latency, delayed throughput, slow convergence rate, high error rates, packet losses and many others which make it impossible for users to enjoy Q... 详细信息
来源: 评论
AI-Optimized Genetic Algorithm for Enhancing Resource Recovery in the Circular Economy
AI-Optimized Genetic Algorithm for Enhancing Resource Recove...
收藏 引用
Innovative Research in Applied Science, Engineering and Technology (IRASET),conference on
作者: Abderrahman Mansouri Bellat Abdelouahad Idriss Bennis Ali Siadat Fatiha Akef Modeling and Simulation of Intelligent Industrial Systems Laboratory (M2S2I) ENSET Mohammedia Hassan II University Casablanca Morocco Laboratory of Design Manufacturing and Control Arts et Metiers ParisTech Metz France Laboratory of Mechanical and Thermal Processes and Control (PCMT) ENSAM Rabat Mohammed V University in Rabat Morocco
this paper presents a Genetic Algorithm (GA)- based optimization approach aimed at improving circular economy strategies by optimizing recyclability and economic value, while minimizing disassembly complexity and envi... 详细信息
来源: 评论
A Regression-Based Optimal Scaling Factor Scheme for 5G LDPC Codes with MIMO Systems
A Regression-Based Optimal Scaling Factor Scheme for 5G LDPC...
收藏 引用
Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM), 2020 3rd International conference on
作者: Madhavsingh Indoonundon Tulsi Pawan Fowdur Department of Electrical and Electronic Engineering University of Mauritius Reduit Mauritius
Low-Density Parity Check (LDPC) codes are powerful forward error correction (FEC) codes which achieve near-channel capacity performances. they have been adopted in several technologies, such as WiFi and 5G NR, and the... 详细信息
来源: 评论
Robust Principal Component Analysis Based on Globally-convergent Iteratively Reweighted Least Squares  5
Robust Principal Component Analysis Based on Globally-conver...
收藏 引用
5th International conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Li, Weihao Fan, Jiulun Zhi, Xiaobin Luo, Xurui Xi'an University of Posts and Telecommunications Xi'an710121 China
Classical Robust Principal Component Analysis (RPCA) uses the singular value threshold operator (SVT) to solve for the convex approximation of the nuclear norm with respect to the rank of a matrix. However, when the m... 详细信息
来源: 评论