咨询与建议

限定检索结果

文献类型

  • 78,668 篇 会议
  • 4,291 篇 期刊文献

馆藏范围

  • 82,959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,627 篇 工学
    • 6,927 篇 计算机科学与技术...
    • 6,762 篇 电气工程
    • 2,981 篇 信息与通信工程
    • 2,680 篇 控制科学与工程
    • 2,477 篇 软件工程
    • 1,636 篇 电子科学与技术(可...
    • 1,501 篇 仪器科学与技术
    • 1,416 篇 机械工程
    • 247 篇 航空宇航科学与技...
    • 235 篇 生物医学工程(可授...
    • 202 篇 网络空间安全
    • 196 篇 交通运输工程
    • 140 篇 测绘科学与技术
    • 131 篇 生物工程
    • 95 篇 材料科学与工程(可...
    • 91 篇 动力工程及工程热...
    • 83 篇 核科学与技术
    • 69 篇 光学工程
  • 1,906 篇 理学
    • 955 篇 系统科学
    • 515 篇 物理学
    • 199 篇 数学
    • 153 篇 生物学
    • 79 篇 地球物理学
  • 1,750 篇 管理学
    • 1,686 篇 管理科学与工程(可...
  • 505 篇 文学
    • 505 篇 新闻传播学
  • 247 篇 医学
    • 180 篇 临床医学
  • 140 篇 农学
    • 100 篇 作物学
  • 71 篇 艺术学
    • 71 篇 设计学(可授艺术学...
  • 55 篇 教育学
    • 54 篇 教育学
  • 51 篇 军事学
    • 51 篇 军队指挥学
  • 36 篇 经济学
  • 7 篇 法学

主题

  • 82,959 篇 algorithm design...
  • 5,906 篇 clustering algor...
  • 5,302 篇 heuristic algori...
  • 5,277 篇 computer science
  • 5,158 篇 optimization
  • 4,677 篇 signal processin...
  • 4,549 篇 hardware
  • 4,068 篇 genetic algorith...
  • 3,996 篇 computational mo...
  • 3,980 篇 convergence
  • 3,964 篇 performance anal...
  • 3,643 篇 data mining
  • 3,580 篇 mathematical mod...
  • 3,392 篇 testing
  • 3,250 篇 routing
  • 2,987 篇 educational inst...
  • 2,977 篇 robustness
  • 2,964 篇 equations
  • 2,956 篇 partitioning alg...
  • 2,871 篇 delay

机构

  • 90 篇 ibm thomas j. wa...
  • 76 篇 department of el...
  • 71 篇 school of comput...
  • 51 篇 department of el...
  • 49 篇 state key labora...
  • 49 篇 school of electr...
  • 46 篇 tsinghua univers...
  • 45 篇 institute for in...
  • 45 篇 school of electr...
  • 44 篇 school of comput...
  • 42 篇 school of comput...
  • 40 篇 school of inform...
  • 38 篇 department of el...
  • 38 篇 department of co...
  • 36 篇 institute of inf...
  • 35 篇 department of co...
  • 35 篇 department of co...
  • 33 篇 department of el...
  • 33 篇 department of el...
  • 32 篇 department of co...

作者

  • 88 篇 lei wang
  • 62 篇 yu wang
  • 57 篇 jun zhang
  • 51 篇 jun wang
  • 43 篇 jian wang
  • 40 篇 bin wang
  • 39 篇 hui wang
  • 37 篇 jing zhang
  • 37 篇 li li
  • 33 篇 wei wang
  • 28 篇 qiang zhou
  • 28 篇 slawomir koziel
  • 27 篇 rui wang
  • 26 篇 xi chen
  • 25 篇 min huang
  • 25 篇 wayne luk
  • 23 篇 jie yang
  • 22 篇 hisao ishibuchi
  • 21 篇 feng liu
  • 21 篇 ming chen

语言

  • 81,761 篇 英文
  • 854 篇 其他
  • 337 篇 中文
  • 5 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 斯洛伐克文
检索条件"主题词=Algorithm design and analysis"
82959 条 记 录,以下是4991-5000 订阅
排序:
An Adaptive Differential Evolution algorithm
An Adaptive Differential Evolution Algorithm
收藏 引用
IEEE Congress on Evolutionary Computation (CEC)
作者: Noman, Nasimul Bollegala, Danushka Iba, Hitoshi Univ Tokyo Grad Sch Engn Tokyo 1138656 Japan
The performance of Differential Evolution (DE) algorithm is significantly affected by its parameter setting. But the choice of parameters is heavily dependent on the problem characteristics. Therefore, recently a coup... 详细信息
来源: 评论
A Discussion of Digital Processing in Synthetic Aperture Radar
收藏 引用
IEEE Transactions on Aerospace and Electronic Systems 1975年 第3期AES-11卷 326-337页
作者: Kirk, John C. Raytheon Company Goleta Calif. 93017 United States
This is a summary paper describing the processing of synthetic aperture radar (SAR) data using digital correlation algorithms. Fundamental SAR theory as it applies to the various SAR modes, namely, strip mapping, spot... 详细信息
来源: 评论
Noise-Blind Image Deblurring  30
Noise-Blind Image Deblurring
收藏 引用
30th IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Jin, Meiguang Roth, Stefan Favaro, Paolo Univ Bern Bern Switzerland Tech Univ Darmstadt Darmstadt Germany
We present a novel approach to noise-blind deblurring, the problem of deblurring an image with known blur, but unknown noise level. We introduce an efficient and robust solution based on a Bayesian framework using a s... 详细信息
来源: 评论
Relationships between window-based real-time constraints
Relationships between window-based real-time constraints
收藏 引用
13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
作者: Gang Tu Jun-lin Li Fu-min Yang Wei Luo Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China Wuhan Digital Engn Inst Wuhan 430074 Peoples R China
This paper analyses the computational relationships of two types of window-based real-time constraint, sliding and fixed window constraint. First, based on the definition of "strict harder", the paper gives ... 详细信息
来源: 评论
Personalizable Smartphone Application for Detecting Falls
Personalizable Smartphone Application for Detecting Falls
收藏 引用
IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)
作者: Medrano, C. Igual, R. Plaza, I. Castro, M. Fardoun, H. M. Univ Zaragoza Escuela Univ Politecn EduQTech Grp Teruel 44003 Spain Spanish Univ Distance Educ UNED Elect & Comp Engn Dept DIEEC Madrid Spain King Abdulazia Univ Jeddah Saudi Arabia
A personalizable fall detector system is presented in this paper. It relies on a semisupervised novelty detection technique and has been implemented in a smartphone application. Thus, it has been tested that the algor... 详细信息
来源: 评论
Quadratic Goldreich-Levin Theorems
Quadratic Goldreich-Levin Theorems
收藏 引用
52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS)
作者: Tulsiani, Madhur Wolf, Julia Princeton Univ Princeton NJ 08544 USA Ecole Polytech Ctr Math F-91128 Palaiseau France
Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases... 详细信息
来源: 评论
A novel genetic algorithm based on image databases for mining association rules
A novel genetic algorithm based on image databases for minin...
收藏 引用
6th IEEE/ACIS International Conference on Computer and Information Science in conjunction with 1st IEEE/ACIS International Workshop on e-Activity
作者: Dai, Shangping Gao, Li Zhu, Qiang Zhu, Changwu Hua Zhong Normal Univ Dept Comp Sci Wuhan 430079 Peoples R China Zhejiang Univ Media & Commun Hangzhou 310018 Peoples R China
Data mining technology has emerged as a means for identifying patterns and trends from large quantities of data. Mining encompasses various algorithms such as clustering, classification, and association rule mining. I... 详细信息
来源: 评论
Informal proof analysis towards testing enhancement  13
Informal proof analysis towards testing enhancement
收藏 引用
13th International Symposium on Software Reliability Engineering
作者: Lussier, G Waeselynck, H CNRS LAAS F-31077 Toulouse 4 France
This paper aims at verifying properties of generic fault-tolerance algorithms. Our goal is to enhance the testing process with information extracted from the proof of the algorithm, whether this proof is formal or inf... 详细信息
来源: 评论
Bio-inspired Adaboost method for efficient face recognition
Bio-inspired Adaboost method for efficient face recognition
收藏 引用
Conference on Frontiers in the Convergence of Bioscience and Information Technologies
作者: Sedai, Suman Rhee, Phill Kyu Inha Univ Dept Comp Sci & Engn Inchon South Korea
We present the design of face recognition system based on the Adaboost algorithm and bio- inspired evolutionary search. We start by extracting the feature vector of the face image based on fixed fiducial points. Then ... 详细信息
来源: 评论
On the Local Structure of Stable Clustering Instances  58
On the Local Structure of Stable Clustering Instances
收藏 引用
58th IEEE Annual Symposium on Foundations of Computer Science (FOCS)
作者: Cohen-Addad, Vincent Schwiegelshohn, Chris Univ Copenhagen Copenhagen Denmark Sapienza Univ Rome Rome Italy
We study the classic k-median and k-means clustering objectives in the beyond-worst-case scenario. We consider three well-studied notions of structured data that aim at characterizing real-world inputs: Distribution S... 详细信息
来源: 评论