咨询与建议

限定检索结果

文献类型

  • 565 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 572 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 176 篇 工学
    • 173 篇 计算机科学与技术...
    • 108 篇 电气工程
    • 28 篇 软件工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 59 篇 理学
    • 59 篇 数学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 19 篇 经济学
    • 18 篇 理论经济学
    • 1 篇 应用经济学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 290 篇 scientific compu...
  • 91 篇 computer science
  • 64 篇 cloud computing
  • 51 篇 computational mo...
  • 36 篇 polynomials
  • 34 篇 algorithm design...
  • 28 篇 algebra
  • 27 篇 computer archite...
  • 25 篇 mathematics
  • 25 篇 testing
  • 22 篇 software algorit...
  • 22 篇 complexity theor...
  • 21 篇 electronic mail
  • 20 篇 monitoring
  • 20 篇 standards
  • 19 篇 grid computing
  • 19 篇 semantics
  • 18 篇 application soft...
  • 18 篇 distributed comp...
  • 17 篇 concurrent compu...

机构

  • 10 篇 research institu...
  • 8 篇 tech univ cluj n...
  • 7 篇 department of co...
  • 7 篇 faculty of infor...
  • 6 篇 faculty of mathe...
  • 6 篇 department of co...
  • 6 篇 faculty of compu...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 computer science...
  • 4 篇 department of co...
  • 4 篇 nicolaus coperni...
  • 4 篇 research institu...
  • 4 篇 institute e-aust...
  • 4 篇 department of co...
  • 4 篇 romanian acad in...
  • 4 篇 computer science...
  • 4 篇 faculty of autom...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 9 篇 gabriel ciobanu
  • 8 篇 adina magda flor...
  • 7 篇 petcu dana
  • 7 篇 james h. davenpo...
  • 7 篇 jebelean tudor
  • 7 篇 eneia nicolae to...
  • 7 篇 nebojsa bacanin
  • 7 篇 tudor jebelean
  • 6 篇 catalin stoean
  • 6 篇 ciobanu gabriel
  • 6 篇 nicolae tapus
  • 6 篇 valentin cristea
  • 5 篇 mugurel ionut an...
  • 5 篇 dorel lucanu
  • 5 篇 ardagna danilo
  • 5 篇 ciprian dobre
  • 5 篇 ruxandra stoean
  • 5 篇 stephen m. watt
  • 5 篇 florin pop
  • 5 篇 simson daniel

语言

  • 572 篇 英文
检索条件"任意字段=7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing"
572 条 记 录,以下是91-100 订阅
排序:
Semi-Supervised Pipeline for Human Sprites Neural Rendering
Semi-Supervised Pipeline for Human Sprites Neural Rendering
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Alexandru Ionascu Sebastian Stefaniga Department of Computer Science West University of Timisoara Timisoara Romania
In this paper we are discussing the possibility of a hybrid approach in renderable scenes. the main idea of the presented experiment is to render the human actors by using existing videos of the characters. the input ... 详细信息
来源: 评论
Preemptive Phased Execution Models with Scratchpad Memory Requirements
Preemptive Phased Execution Models with Scratchpad Memory Re...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Vlad Rădulescu Albert M.K. Cheng Ştefan Andrei Department of Computer Science A. I. Cuza University of Iaşi Iaşi Romania Department of Computer Science University of Houston Houston TX USA
there is currently a widespread interest in using phased execution models in the design of real-time systems, stimulated by their ability to reduce contention in accessing shared resources. the main beneficiary of suc... 详细信息
来源: 评论
Empirical evaluation of LZW-Compressed Multiple Pattern Matching algorithms
Empirical evaluation of LZW-Compressed Multiple Pattern Matc...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Mario Reja Faculty of Mathematics and Informatics West University of Timisoara Timisoara Romania
Data compression is used to reduce the cost of storing and transmitting increasingly large datasets in various domains ranging from bioinformatics to particle physics and general purpose computing. Most of these areas... 详细信息
来源: 评论
Advantages of a neuro-symbolic solution for monitoring IT infrastructures alerts
Advantages of a neuro-symbolic solution for monitoring IT in...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Darian M. Onchis Codruta Istin Hogea Eduard-Florin Department of Computer Science West University of Timisoara Timisoara Romania Department of Computers and IT Politehnica University of Timisoara Timisoara Romania
the classification and at the same time the inter-active characterization of both bad connections, called alerts or attacks, as well as normal connections, is a must for monitoring network traffic. For this specific t... 详细信息
来源: 评论
Artificial Conflict Sampling for Real Satisfiability Problems
Artificial Conflict Sampling for Real Satisfiability Problem...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: James H. Davenport Ali K. Uncu Department of Computer Science University of Bath Bath UK RICAM Austrian Academy of Sciences & University of Bath Linz AT & Bath UK
We outline some preliminary ideas on a guided theory assignment of variables in a real (QF_NRA) satisfiability problem. One objective of this approach is to mix the topdown approach of cylindric algebraic decompositio... 详细信息
来源: 评论
Improving the Diagnostic of Contrast Enhanced Ultrasound Imaging using Optical Flow for Focal Liver Lesion Detection
Improving the Diagnostic of Contrast Enhanced Ultrasound Ima...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Cristina Laura Sîrbu Georgiana Simion Cătălin Daniel Căleanu Faculty of Electronics Telecommunications and Information Technologies Politehnica University of Timișoara Timișoara Romania
Our proposal aims an automatic method used for obtaining the ultrasound image of a region of interest based on the optical flow computation. Combined with a kernel correlation filter tracking algorithm and a Xception ... 详细信息
来源: 评论
On Measuring the Dissimilarity between Biological Sequences
On Measuring the Dissimilarity between Biological Sequences
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Alina Cărunta Mihai Pleşu Department of Computer Science West University of Timisoara Timisoara Romania
the antimicrobial resistance (AMR) of bacteria to antibiotics is tightly connected with their genetic structure changes. Many methods belonging to various disciplines are applied to analyze these genetic changes. the ... 详细信息
来源: 评论
Homotopy Techniques for Analytic Combinatorics in Several Variables
Homotopy Techniques for Analytic Combinatorics in Several Va...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Kisun Lee Stephen Melczer Josip Smolčić Department of Mathematics University of California San Diego La Jolla CA USA Dept. of Combinatorics and Optimization University of Waterloo Waterloo Canada
We combine tools from homotopy continuation solvers with the methods of analytic combinatorics in several variables to give the first practical algorithm and implementation for the asymptotics of multivariate rational... 详细信息
来源: 评论
Reducing Adversarial Vulnerability Using GANs
Reducing Adversarial Vulnerability Using GANs
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Ciprian-Alin Simion Bitdefender Laboratory "Al.I. Cuza" University - Faculty of Computer Science Iaşi România
the Cyber-threat industry is ever-growing and it is very likely that malware creators are using generative methods to create new malware as these algorithms prove to be very potent. As the majority of researchers in t... 详细信息
来源: 评论
Using N-Gram Variations in Static Analysis for Malware Detection
Using N-Gram Variations in Static Analysis for Malware Detec...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Marco Radovancovici Darius Galiş Ciprian Pungilă Faculty of Mathematics and Informatics West University of Timişoara Timişoara Romania
Most of intrusion detection systems nowadays employ signature based analysis that often fails when newer or modified malware versions are brought into play. Intrusion detection systems working with cryptanalysis would... 详细信息
来源: 评论