咨询与建议

限定检索结果

文献类型

  • 78,668 篇 会议
  • 5,059 篇 期刊文献

馆藏范围

  • 83,727 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,393 篇 工学
    • 7,502 篇 电气工程
    • 7,153 篇 计算机科学与技术...
    • 3,218 篇 信息与通信工程
    • 2,729 篇 控制科学与工程
    • 2,562 篇 软件工程
    • 1,634 篇 电子科学与技术(可...
    • 1,514 篇 仪器科学与技术
    • 1,418 篇 机械工程
    • 339 篇 航空宇航科学与技...
    • 257 篇 生物医学工程(可授...
    • 208 篇 交通运输工程
    • 202 篇 网络空间安全
    • 144 篇 测绘科学与技术
    • 131 篇 生物工程
    • 95 篇 材料科学与工程(可...
    • 90 篇 动力工程及工程热...
    • 88 篇 核科学与技术
    • 69 篇 光学工程
  • 1,995 篇 理学
    • 956 篇 系统科学
    • 575 篇 物理学
    • 222 篇 数学
    • 153 篇 生物学
    • 83 篇 地球物理学
  • 1,751 篇 管理学
    • 1,687 篇 管理科学与工程(可...
  • 505 篇 文学
    • 505 篇 新闻传播学
  • 261 篇 医学
    • 189 篇 临床医学
  • 140 篇 农学
    • 100 篇 作物学
  • 71 篇 艺术学
    • 71 篇 设计学(可授艺术学...
  • 60 篇 教育学
    • 59 篇 教育学
  • 51 篇 军事学
    • 51 篇 军队指挥学
  • 36 篇 经济学
  • 7 篇 法学

主题

  • 83,727 篇 algorithm design...
  • 5,925 篇 clustering algor...
  • 5,326 篇 heuristic algori...
  • 5,293 篇 computer science
  • 5,165 篇 optimization
  • 4,758 篇 signal processin...
  • 4,585 篇 hardware
  • 4,077 篇 genetic algorith...
  • 4,043 篇 performance anal...
  • 4,041 篇 convergence
  • 4,038 篇 computational mo...
  • 3,668 篇 data mining
  • 3,597 篇 mathematical mod...
  • 3,435 篇 testing
  • 3,275 篇 routing
  • 3,012 篇 robustness
  • 3,010 篇 equations
  • 2,994 篇 educational inst...
  • 2,981 篇 partitioning alg...
  • 2,923 篇 delay

机构

  • 86 篇 ibm thomas j. wa...
  • 76 篇 department of el...
  • 68 篇 school of comput...
  • 53 篇 department of el...
  • 49 篇 school of electr...
  • 48 篇 state key labora...
  • 46 篇 tsinghua univers...
  • 45 篇 institute for in...
  • 44 篇 school of electr...
  • 44 篇 school of comput...
  • 42 篇 school of comput...
  • 40 篇 school of inform...
  • 38 篇 department of co...
  • 37 篇 department of el...
  • 36 篇 institute of inf...
  • 35 篇 department of co...
  • 33 篇 department of el...
  • 33 篇 department of el...
  • 32 篇 department of co...
  • 32 篇 department of el...

作者

  • 88 篇 lei wang
  • 62 篇 yu wang
  • 57 篇 jun zhang
  • 51 篇 jun wang
  • 43 篇 jian wang
  • 40 篇 bin wang
  • 39 篇 hui wang
  • 37 篇 jing zhang
  • 37 篇 li li
  • 33 篇 wei wang
  • 28 篇 qiang zhou
  • 28 篇 slawomir koziel
  • 27 篇 rui wang
  • 26 篇 xi chen
  • 25 篇 min huang
  • 25 篇 wayne luk
  • 23 篇 jie yang
  • 22 篇 hisao ishibuchi
  • 21 篇 feng liu
  • 21 篇 ming chen

语言

  • 82,448 篇 英文
  • 935 篇 其他
  • 337 篇 中文
  • 5 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 斯洛伐克文
检索条件"主题词=Algorithm Design And Analysis"
83727 条 记 录,以下是611-620 订阅
排序:
A Constraint-Pattern Based Method for Reachability Determination  41
A Constraint-Pattern Based Method for Reachability Determina...
收藏 引用
41st IEEE Annual Computer Software and Applications Conference (COMPSAC)
作者: Wang, Yuexing Gu, Zuxing Cheng, Xi Zhou, Min Song, Xiaoyu Gu, Ming Sun, Jiaguang Minist Educ Key Lab Informat Syst Secur Beijing Peoples R China Tsinghua Natl Lab Informat Sci & Technol TNList Beijing Peoples R China Tsinghua Univ Sch Software Beijing Peoples R China Portland State Univ Elect & Comp Engn Portland OR 97207 USA
When analyzing programs using static program analysis, we need to determine the reachability of each possible execution path of the programs. Many static analysis tools collect constraints of each path and use SMT sol... 详细信息
来源: 评论
Priority-Based Spectrum Access in Cognitive D2D Networks for IoT
Priority-Based Spectrum Access in Cognitive D2D Networks for...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Liu, Xingya Xie, Jiang (Linda) Univ North Carolina Charlotte Dept Elect & Comp Engn Charlotte NC 28223 USA
Device to device (D2D) communication is essential in Internet of things (IoT). Cognitive radio (CR)-enabled device is a promising technique to address D2D communications. Among all the functions supported in IoT, prio... 详细信息
来源: 评论
Semantic Bootstrapping: A Theoretical Perspective  33
Semantic Bootstrapping: A Theoretical Perspective
收藏 引用
IEEE 33rd International Conference on Data Engineering (ICDE)
作者: Wu, Wentao Li, Hongsong Wang, Haixun Zhu, Kenny Q. Microsoft Res Redmond WA 98052 USA Alibaba Grp Hangzhou Zhejiang Peoples R China Facebook Inc Menlo Pk CA USA Shanghai Jiao Tong Univ Shanghai Peoples R China
Knowledge acquisition is an iterative process. Most prior work used syntactic bootstrapping approaches, while semantic bootstrapping was proposed recently. Unlike syntactic bootstrapping, semantic bootstrapping bootst... 详细信息
来源: 评论
A Grid-Based Detailed Routing algorithm for Advanced 1D Process  50
A Grid-Based Detailed Routing Algorithm for Advanced 1D Proc...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Zhang, Ye Yang, Fan Zhou, Dian Zeng, Xuan Hu, Xiangdong Fudan Univ Sch Microelect State Key Lab ASIC & Syst Shanghai Peoples R China Shanghai High Performance Integrated Circuit Desi Shanghai Peoples R China Univ Texas Dallas Dept Elect Engn Richardson TX 75083 USA
End cutting 1D layout process is a promising candidate for sub-10nm process nodes. To be correctly manufactured, any pair of end cuts must be either merged/aligned or apart from each other with at least a minimum dist... 详细信息
来源: 评论
Segregated Targeting for Resource Allocation Networks with Dedicated Sources  6
Segregated Targeting for Resource Allocation Networks with D...
收藏 引用
6th International Symposium on Advanced Control of Industrial Processes (AdCONIP)
作者: Jain, Sheetal Bandyopadhyay, Santanu Indian Inst Technol Dept Energy Sci & Engn Bombay 400076 Maharashtra India
Segregated targeting problems consist of a set of sources called internal sources and multiple sets of demands called zones. Each zone consists of a set of demands and a unique resource. Internal sources are allocated... 详细信息
来源: 评论
Novel Clique Enumeration Heuristic for Detecting Overlapping Clusters
Novel Clique Enumeration Heuristic for Detecting Overlapping...
收藏 引用
IEEE Congress on Evolutionary Computation (CEC)
作者: Schmitt, Rafael Ramos, Pedro Santiago, Rafael Lamb, Luis Univ Vale Itajai Lab Appl Intelligence Itajai Brazil Univ Fed Rio Grande do Sul Inst Informat Porto Alegre RS Brazil
There are several known methods for detecting overlapping communities in graphs, each one having their advantages and limitations. The Clique Percolation Method (CPM) is one such method. CPM works by joining highly co... 详细信息
来源: 评论
Backtracking and Dynamic Bit-shield Anti-Collision algorithm in RFID System  2
Backtracking and Dynamic Bit-shield Anti-Collision Algorithm...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Mo Lei Chen HuaLi Fang MengXu Ren Ju Chengdu Aeronautic Polytechnic The Innovation Base of School-Enterprise Cooperation Aviation Electronic Technology in Sichuan SiChuan TOP IT Vocational Institute
In a radio frequency identification system, The lower identification efficiency problem of system brought by multi tags collision has become the bottleneck problem of the application of RFID technolog
来源: 评论
Automatically design Distance Functions for Graph-based Semi-Supervised Learning  16
Automatically Design Distance Functions for Graph-based Semi...
收藏 引用
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems
作者: Miquilini, Patricia Rossi, Rafael G. Quiles, Marcos G. de Melo, Vinicius V. Basgalupp, Marcio P. Univ Fed Sao Paulo Inst Sci & Technol Sao Paulo Brazil Univ Fed Mato Grosso do Sul Campo Grande MS Brazil
Automatic data classification is often performed by supervised learning algorithms, producing a model to classify new instances. Reflecting that labeled instances are expensive, semi supervised learning (SSL) methods ... 详细信息
来源: 评论
Unbiased Sparse Subspace Clustering By Selective Pursuit  14
Unbiased Sparse Subspace Clustering By Selective Pursuit
收藏 引用
14th Conference on Computer and Robot Vision (CRV)
作者: Ackermann, Hanno Rosenhahn, Bodo Yang, Michael Ying Leibniz Univ Hannover Inst Informat Proc Hannover Germany Univ Twente Scene Understanding Grp Enschede Netherlands
Sparse subspace clustering (SSC) is an elegant approach for unsupervised segmentation if the data points of each cluster are located in linear subspaces. This model applies, for instance, in motion segmentation if som... 详细信息
来源: 评论
An L1-Minimization Based algorithm to Measure the Redundancy of State Estimators in Large Sensor Systems  13
An L1-Minimization Based Algorithm to Measure the Redundancy...
收藏 引用
13th IEEE Conference on Automation Science and Engineering (IEEE CASE)
作者: Vijayaraghavan, Vishnu Kianfar, Kiavash Ding, Yu Parsaei, Hamid Texas A&M Univ Dept Ind & Syst Engn College Stn TX 77843 USA Texas A&M Univ Qatar Dept Mech Engn POB 23874 Doha Qatar
Linear models have been successfully used to establish the connections between sensor measurements and system states in sensor networks. Finding the degree of redundancy for structured linear systems is proven to be N... 详细信息
来源: 评论