咨询与建议

限定检索结果

文献类型

  • 78,668 篇 会议
  • 4,291 篇 期刊文献

馆藏范围

  • 82,959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,627 篇 工学
    • 6,927 篇 计算机科学与技术...
    • 6,762 篇 电气工程
    • 2,981 篇 信息与通信工程
    • 2,680 篇 控制科学与工程
    • 2,477 篇 软件工程
    • 1,636 篇 电子科学与技术(可...
    • 1,501 篇 仪器科学与技术
    • 1,416 篇 机械工程
    • 247 篇 航空宇航科学与技...
    • 235 篇 生物医学工程(可授...
    • 202 篇 网络空间安全
    • 196 篇 交通运输工程
    • 140 篇 测绘科学与技术
    • 131 篇 生物工程
    • 95 篇 材料科学与工程(可...
    • 91 篇 动力工程及工程热...
    • 83 篇 核科学与技术
    • 69 篇 光学工程
  • 1,906 篇 理学
    • 955 篇 系统科学
    • 515 篇 物理学
    • 199 篇 数学
    • 153 篇 生物学
    • 79 篇 地球物理学
  • 1,750 篇 管理学
    • 1,686 篇 管理科学与工程(可...
  • 505 篇 文学
    • 505 篇 新闻传播学
  • 247 篇 医学
    • 180 篇 临床医学
  • 140 篇 农学
    • 100 篇 作物学
  • 71 篇 艺术学
    • 71 篇 设计学(可授艺术学...
  • 55 篇 教育学
    • 54 篇 教育学
  • 51 篇 军事学
    • 51 篇 军队指挥学
  • 36 篇 经济学
  • 7 篇 法学

主题

  • 82,959 篇 algorithm design...
  • 5,906 篇 clustering algor...
  • 5,302 篇 heuristic algori...
  • 5,277 篇 computer science
  • 5,158 篇 optimization
  • 4,677 篇 signal processin...
  • 4,549 篇 hardware
  • 4,068 篇 genetic algorith...
  • 3,996 篇 computational mo...
  • 3,980 篇 convergence
  • 3,964 篇 performance anal...
  • 3,643 篇 data mining
  • 3,580 篇 mathematical mod...
  • 3,392 篇 testing
  • 3,250 篇 routing
  • 2,987 篇 educational inst...
  • 2,977 篇 robustness
  • 2,964 篇 equations
  • 2,956 篇 partitioning alg...
  • 2,871 篇 delay

机构

  • 90 篇 ibm thomas j. wa...
  • 76 篇 department of el...
  • 71 篇 school of comput...
  • 51 篇 department of el...
  • 49 篇 state key labora...
  • 49 篇 school of electr...
  • 46 篇 tsinghua univers...
  • 45 篇 institute for in...
  • 45 篇 school of electr...
  • 44 篇 school of comput...
  • 42 篇 school of comput...
  • 40 篇 school of inform...
  • 38 篇 department of el...
  • 38 篇 department of co...
  • 36 篇 institute of inf...
  • 35 篇 department of co...
  • 35 篇 department of co...
  • 33 篇 department of el...
  • 33 篇 department of el...
  • 32 篇 department of co...

作者

  • 88 篇 lei wang
  • 62 篇 yu wang
  • 57 篇 jun zhang
  • 51 篇 jun wang
  • 43 篇 jian wang
  • 40 篇 bin wang
  • 39 篇 hui wang
  • 37 篇 jing zhang
  • 37 篇 li li
  • 33 篇 wei wang
  • 28 篇 qiang zhou
  • 28 篇 slawomir koziel
  • 27 篇 rui wang
  • 26 篇 xi chen
  • 25 篇 min huang
  • 25 篇 wayne luk
  • 23 篇 jie yang
  • 22 篇 hisao ishibuchi
  • 21 篇 feng liu
  • 21 篇 ming chen

语言

  • 81,761 篇 英文
  • 854 篇 其他
  • 337 篇 中文
  • 5 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 斯洛伐克文
检索条件"主题词=Algorithm Design And Analysis"
82959 条 记 录,以下是501-510 订阅
排序:
NEIGHBOR DISCOVERY algorithmS IN DIRECTIONAL ANTENNA BASED SYNCHRONOUS AND ASYNCHRONOUS WIRELESS AD HOC NETWORKS
收藏 引用
IEEE WIRELESS COMMUNICATIONS 2013年 第6期20卷 106-112页
作者: Liu, Bo Rong, Bo Hu, Rose Qingyang Qian, Yi Shanghai Jiao Tong Univ Dept Elect Engn Shanghai 200030 Peoples R China Commun Res Ctr Canada Ottawa ON Canada Utah State Univ Dept Elect & Comp Engn Logan UT 84322 USA Univ Nebraska Dept Comp & Elect Engn Lincoln NE 68583 USA
The performance of wireless systems could be significantly improved by directional antennas with highly efficient MAC layers and other control protocols and algorithms. One such critical algorithm is neighbor discover... 详细信息
来源: 评论
AN ALOHA-BASED IMPROVED ANTI-COLLISION algorithm FOR RFID SYSTEMS
收藏 引用
IEEE WIRELESS COMMUNICATIONS 2013年 第5期20卷 152-158页
作者: He, Yejun Wang, Xiaoye Shenzhen Univ Shenzhen Peoples R China
Tag collision arbitration is considered as one of the critical issues in RFID system design. In order to further improve the identification efficiency of tag anti-collision algorithms in RFID systems, several types of... 详细信息
来源: 评论
analysis OF THE SHORT-TIME UNBIASED SPECTRUM ESTIMATION algorithm
收藏 引用
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING 1985年 第1期33卷 136-142页
作者: MATHEWS, VJ YOUN, DH Department of Electrical and Computer Engineering University of Iowa Iowa IA USA
The short-time unbiased spectrum estimation (STUSE) algorithm is analyzed and expressions for the mean and variance of the spectrum estimates are derived. The STUSE algorithm deliberately adds biased spectrum estimate... 详细信息
来源: 评论
USING THE DECOMPOSITION TREE FOR DIRECTED-NETWORK RELIABILITY COMPUTATION
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 1984年 第5期33卷 390-395页
作者: HAGSTROM, JN University of Illinois Chicago USA
A related paper provides an algorithm to compute the reliability of an undirected network. The algorithm exploits the decomposition tree of the network derived from decomposing the network graph into its triconnected ... 详细信息
来源: 评论
Robust design of envelope-constrained filters in the presence of input uncertainty
收藏 引用
IEEE TRANSACTIONS ON SIGNAL PROCESSING 1996年 第8期44卷 1872-1878页
作者: Zheng, WX Cantoni, A Tee, KL UNIV WESTERN AUSTRALIA DEPT MATHNEDLANDSWA 6907AUSTRALIA CURTIN UNIV TECHNOL AUSTRALIAN TELECOMMUN RES INSTPERTHWA 6001AUSTRALIA
The maximum robustness design of envelope-constrained filters with uncertain input (ECUI) is formulated as a minimax optimization problem in which the set of feasible filters is characterized by nonsmooth matrix inequ... 详细信息
来源: 评论
Reengineering legacy embedded systems
收藏 引用
IEEE design & TEST OF COMPUTERS 1999年 第2期16卷 38-47页
作者: Madisetti, VK Jung, YK Khan, MH Kim, J Finnessy, T VP Technol Marietta GA 30068 USA USAF Mfg Technol Directorate Mfg & Engn Syst Branch Wright Patterson AFB OH USA
Systems that require reengineering are a fact of life in both the commercial and military arenas. The authors have developed a systematic methodology based on virtual prototyping, with accompanying tools and libraries... 详细信息
来源: 评论
THE NUMERICAL COMPUTATION OF BESSEL-FUNCTIONS OF THE 1ST KIND AND 2ND KIND FOR INTEGER ORDERS AND COMPLEX ARGUMENTS
收藏 引用
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION 1990年 第9期38卷 1341-1349页
作者: DUTOIT, CF The Department of Electrical and Electronic Engineering University of Stellenbosch Stellenbosch South Africa
A rigorous algorithm for computing integer order Bessel functions of the first and second kind with complex arguments is discussed. The algorithm makes use of backward recurrence for computing Bessel functions of the ... 详细信息
来源: 评论
algorithm-agile encryption in ATM networks
收藏 引用
COMPUTER 1998年 第9期31卷 57-+页
作者: Tarman, TD Hutchinson, RL Pierson, LG Sholander, PE Witzke, EL Sandia Natl Labs Albuquerque NM 87213 USA
As more users subscribe to ATM data services to support their broadband applications, ATM security devices must be employed to ensure protection against eavesdropping, impersonation, unauthorized data modification, an... 详细信息
来源: 评论
On Caching and Routing in Information-Centric Networks
收藏 引用
IEEE COMMUNICATIONS MAGAZINE 2018年 第3期56卷 204-209页
作者: Seetharam, Anand SUNY Binghamton Dept Comp Sci Binghamton NY 13902 USA
With the exponential growth of content in recent years, users are primarily interested in obtaining particular content and are not concerned with the host housing the content. By treating content as a first class citi... 详细信息
来源: 评论
AUDITORY analysis OF SPECTROTEMPORAL INFORMATION IN ACOUSTIC-SIGNALS
收藏 引用
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE 1995年 第2期14卷 186-194页
作者: WANG, K SHAMMA, SA AT and T Bell Laboratories Inc. Murray Hill NJ USA Department of Electrical Engineering University of Maryland College Park USA
Acoustic signals are often characterized by pitch, timbre, loudness, forms of modulation, and onset/offset instants. These descriptors of sound quality have a close relationship to the instantaneous spectral propertie... 详细信息
来源: 评论