咨询与建议

限定检索结果

文献类型

  • 565 篇 会议
  • 7 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 176 篇 工学
    • 173 篇 计算机科学与技术...
    • 108 篇 电气工程
    • 28 篇 软件工程
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 59 篇 理学
    • 59 篇 数学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 19 篇 经济学
    • 18 篇 理论经济学
    • 1 篇 应用经济学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 290 篇 scientific compu...
  • 91 篇 computer science
  • 64 篇 cloud computing
  • 51 篇 computational mo...
  • 36 篇 polynomials
  • 34 篇 algorithm design...
  • 28 篇 algebra
  • 27 篇 computer archite...
  • 25 篇 mathematics
  • 25 篇 testing
  • 22 篇 software algorit...
  • 22 篇 complexity theor...
  • 21 篇 electronic mail
  • 20 篇 monitoring
  • 20 篇 standards
  • 19 篇 grid computing
  • 19 篇 semantics
  • 18 篇 application soft...
  • 18 篇 distributed comp...
  • 17 篇 concurrent compu...

机构

  • 10 篇 research institu...
  • 8 篇 tech univ cluj n...
  • 7 篇 department of co...
  • 7 篇 faculty of infor...
  • 6 篇 faculty of mathe...
  • 6 篇 department of co...
  • 6 篇 faculty of compu...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 computer science...
  • 4 篇 department of co...
  • 4 篇 nicolaus coperni...
  • 4 篇 research institu...
  • 4 篇 institute e-aust...
  • 4 篇 department of co...
  • 4 篇 romanian acad in...
  • 4 篇 computer science...
  • 4 篇 faculty of autom...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 9 篇 gabriel ciobanu
  • 8 篇 adina magda flor...
  • 7 篇 petcu dana
  • 7 篇 james h. davenpo...
  • 7 篇 jebelean tudor
  • 7 篇 eneia nicolae to...
  • 7 篇 nebojsa bacanin
  • 7 篇 tudor jebelean
  • 6 篇 catalin stoean
  • 6 篇 ciobanu gabriel
  • 6 篇 nicolae tapus
  • 6 篇 valentin cristea
  • 5 篇 mugurel ionut an...
  • 5 篇 dorel lucanu
  • 5 篇 ardagna danilo
  • 5 篇 ciprian dobre
  • 5 篇 ruxandra stoean
  • 5 篇 stephen m. watt
  • 5 篇 florin pop
  • 5 篇 simson daniel

语言

  • 574 篇 英文
检索条件"任意字段=7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing"
574 条 记 录,以下是341-350 订阅
An Adaptive Particle Swarm Optimizer Using Balanced Explorative and Exploitative Behaviors
An Adaptive Particle Swarm Optimizer Using Balanced Explorat...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Sayan Ghosh Debarati Kundu Kaushik Suresh Swagatam Das Ajith Abraham Department of Electronics and Telecommunication Engineering Jadavpur University Kolkata India Center of Excellence for Quantifiable Quality of Service Norwegian University of Science and Technology Trondheim Norway
Particle Swarm Optimization (PSO) has recently emerged as a nature inspired algorithm for real parameter optimization. this article describes a method for improving the final accuracy and the convergence speed of PSO ... 详细信息
来源: 评论
Towards a Reverse Engineering Dataflow Analysis Framework for Java and C++
Towards a Reverse Engineering Dataflow Analysis Framework fo...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Petru Florin Mihancea LOOSE Research Group Politehnica University of Timişoara Romania
Due to the software aging phenomenon, understanding a program is increasingly difficult. Many high-level analysis methods have been developed to support program comprehension, some of them based on dataflow analysis. ... 详细信息
来源: 评论
Data Flow Entropy Collector
Data Flow Entropy Collector
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Alin Suciu Kinga Marton Zoltan Antal Department of Computer Science Technical University of Cluj Napoca Cluj-Napoca Romania
Collecting entropy from various sources available within a regular PC and combining them in an entropy pool is often used as an alternative to pseudo random number generation. Cheaper than using a hardware true random... 详细信息
来源: 评论
A Bray-Curtis Weighted Automaton for Detecting Malicious Code through System-Call Analysis
A Bray-Curtis Weighted Automaton for Detecting Malicious Cod...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Ciprian-Petrisor Pungila Faculty of Mathematics and Informatics Computer Science Department West University of Timisoara Timisoara Romania
Malicious code detection is one of the top subjects of interest for intrusion detection systems in today's computer security research areas. In this paper we propose a new heuristic method for detecting malicious ... 详细信息
来源: 评论
Relational Operators in Heterogeneous Random Databases
Relational Operators in Heterogeneous Random Databases
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Letitia Velcescu Laurentiu Vasile Faculty of Mathematics and Informatics University of Bucharest Bucharest Romania
In this paper, we investigate the sizes of some approximate relational operations results, focusing on join, outer join and difference. We extend the notion of random database, in which the records are random vectors ... 详细信息
来源: 评论
Combining Old-Fashioned Computer Go with Monte Carlo Go
Combining Old-Fashioned Computer Go with Monte Carlo Go
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Florin Chelaru Liviu Ciortuz Faculty of Computer Science University Al.I.Cuza of Iasi Iasi Romania Faculty of Computer Science-Computer Science Department University Al.I.Cuza of Iasi Iasi Romania
In this paper we discuss the idea of combining old-fashioned computer Go with Monte Carlo Go. We introduce an analyze-after approach to random simulations. We also briefly present the other features of our present Mon... 详细信息
来源: 评论
Evaluating the effort of building a Machine Learning model for malware detection from ground zero
Evaluating the effort of building a Machine Learning model f...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Dan-Gabriel Anton "Al. I. Cuza" University - Faculty of Computer Science Iaşi Romania
As the field of cybersecurity research evolved in the past decades, machine learning-based approaches for malware identification have become more frequent. the paper proposes a method of identifying which kind of feat... 详细信息
来源: 评论
the Quest for Perfect and Compact Symmetry Breaking for Graph Problems
The Quest for Perfect and Compact Symmetry Breaking for Grap...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Marijn J.H. Heule Department of Computer Science The University of Texas at Austin Austin Texas United States
Symmetry breaking is a crucial technique to solve many graph problems. However, current state-of-the-art techniques break graph symmetries only partially, causing search algorithms to unnecessarily explore many isomor... 详细信息
来源: 评论
Partial Finitely Generated Bi-Ideals
Partial Finitely Generated Bi-Ideals
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Raivis Bets Janis Buls Department of Mathematics University of Latvia Riga Latvia
Partial words have been studied by Blanchet-Sadri et al., but bi-ideals or reccurrent words have been studied for centuries by many researchers. this paper gives a solution for some problems for partial reccurrent wor... 详细信息
来源: 评论
computing Self-intersection Loci of Parametrized Surfaces Using Regular Systems and Groebner Bases
Computing Self-intersection Loci of Parametrized Surfaces Us...
收藏 引用
international symposium on symbolic and numeric algorithms for scientific computing (SYNASC)
作者: Yanli Huang Dongming Wang LMIB-SKLSDE-School of Mathematics and Systems Science Beihang University Beijing China Laboratoire d'Informatique de Paris 6 Université Pierre et Marie Curie CNRS Paris France
the computation of self-intersection loci of parametrized surfaces is needed for constructing trimmed parametrizations and describing the topology of the considered surfaces in real settings. this paper presents two g... 详细信息
来源: 评论