咨询与建议

限定检索结果

文献类型

  • 2,438 篇 期刊文献
  • 773 篇 会议
  • 24 篇 学位论文
  • 4 册 图书

馆藏范围

  • 3,239 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,353 篇 工学
    • 2,012 篇 计算机科学与技术...
    • 477 篇 电气工程
    • 380 篇 信息与通信工程
    • 337 篇 软件工程
    • 76 篇 机械工程
    • 74 篇 控制科学与工程
    • 68 篇 电子科学与技术(可...
    • 29 篇 交通运输工程
    • 28 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 8 篇 土木工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 测绘科学与技术
    • 6 篇 石油与天然气工程
    • 6 篇 生物工程
    • 3 篇 环境科学与工程(可...
  • 1,656 篇 理学
    • 1,602 篇 数学
    • 28 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 12 篇 系统科学
    • 10 篇 化学
    • 3 篇 地球物理学
  • 901 篇 管理学
    • 894 篇 管理科学与工程(可...
    • 238 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 245 篇 经济学
    • 238 篇 应用经济学
    • 6 篇 理论经济学
  • 10 篇 法学
    • 8 篇 法学
  • 9 篇 医学
    • 5 篇 临床医学
  • 8 篇 军事学
  • 4 篇 农学
  • 2 篇 艺术学
  • 1 篇 教育学

主题

  • 3,239 篇 approximation al...
  • 222 篇 scheduling
  • 81 篇 combinatorial op...
  • 73 篇 approximation al...
  • 68 篇 np-hard
  • 68 篇 computational co...
  • 65 篇 np-hardness
  • 64 篇 linear programmi...
  • 61 篇 np-complete
  • 56 篇 optimization
  • 53 篇 facility locatio...
  • 51 篇 traveling salesm...
  • 51 篇 graph algorithm
  • 46 篇 wireless sensor ...
  • 45 篇 worst-case analy...
  • 45 篇 vertex cover
  • 45 篇 makespan
  • 45 篇 network design
  • 43 篇 computational ge...
  • 43 篇 dynamic programm...

机构

  • 52 篇 univ alberta dep...
  • 50 篇 univ texas dalla...
  • 38 篇 shandong jianzhu...
  • 37 篇 iit dept comp sc...
  • 37 篇 nanjing univ sta...
  • 34 篇 tianjin univ tec...
  • 33 篇 city univ hong k...
  • 32 篇 univ new brunswi...
  • 31 篇 shandong normal ...
  • 29 篇 shandong univ sc...
  • 27 篇 renmin univ chin...
  • 24 篇 yunnan univ sch ...
  • 24 篇 chinese acad sci...
  • 23 篇 hangzhou dianzi ...
  • 20 篇 beijing univ tec...
  • 19 篇 zhejiang normal ...
  • 17 篇 beijing univ tec...
  • 17 篇 beijing univ tec...
  • 17 篇 univ wisconsin d...
  • 16 篇 univ texas dalla...

作者

  • 92 篇 xu dachuan
  • 53 篇 du donglei
  • 49 篇 wu weili
  • 47 篇 lin guohui
  • 46 篇 zhang zhao
  • 44 篇 wu chenchen
  • 42 篇 li deying
  • 34 篇 zhang dongmei
  • 30 篇 li min
  • 30 篇 du ding-zhu
  • 29 篇 chen yong
  • 28 篇 yu wei
  • 28 篇 zhang an
  • 26 篇 liu zhaohui
  • 25 篇 dai haipeng
  • 25 篇 wang wei
  • 25 篇 li weidong
  • 25 篇 chen guihai
  • 24 篇 dumitrescu adria...
  • 24 篇 zhang peng

语言

  • 3,008 篇 英文
  • 214 篇 其他
  • 13 篇 中文
检索条件"主题词=Approximation Algorithm"
3239 条 记 录,以下是1061-1070 订阅
排序:
Incremental algorithms for the maximum internal spanning tree problem
收藏 引用
Science China(Information Sciences) 2021年 第5期64卷 77-84页
作者: Xianbin ZHU Wenjun LI Yongjie YANG Jianxin WANG School of Computer Science and Engineering Central South University Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Chair of Economic Theory Saarland University
The maximum internal spanning tree(MIST) problem is utilized to determine a spanning tree in a graph G,with the maximum number of possible internal *** incremental maximum internal spanning tree(IMIST) problem is ... 详细信息
来源: 评论
Improved approximation for two dimensional Strip Packing with polynomial bounded width
收藏 引用
THEORETICAL COMPUTER SCIENCE 2019年 789卷 34-49页
作者: Jansen, Klaus Rau, Malin Univ Kiel Inst Comp Sci D-24118 Kiel Germany
We study the well-known two-dimensional Strip Packing problem. Given a set of rectangular axis-parallel items and a strip of width W with infinite height, the objective is to find a packing of all items into the strip... 详细信息
来源: 评论
Improved approximation algorithms for Capacitated Fault-Tolerant k-Center  12th
收藏 引用
12th Latin American Symposium on Theoretical Informatics (LATIN)
作者: Fernandes, Cristina G. de Paula, Samuel P. Pedrosa, Lehilton L. C. Univ Sao Paulo Dept Comp Sci Sao Paulo Brazil Univ Estadual Campinas Inst Comp Campinas SP Brazil
In the -center problem, given a metric space V and a positive integer k, one wants to select k elements (centers) of V and an assignment from V to centers, minimizing the maximum distance between an element of V and i... 详细信息
来源: 评论
Collaborative Social Internet of Things in Mobile Edge Networks
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2020年 第12期7卷 11473-11491页
作者: Wang, Chih-Hang Kuo, Jian-Jhih Yang, De-Nian Chen, Wen-Tsuen Acad Sinica Inst Informat Sci Taipei 11529 Taiwan Natl Chung Cheng Univ Dept Comp Sci & Informat Engn Chiayi 62102 Taiwan Acad Sinica Res Ctr Informat Technol Innovat Taipei 11529 Taiwan Natl Tsing Hua Univ Dept Comp Sci Hsinchu 30013 Taiwan
Artificial intelligence (AI) on chips has recently driven the expansion of the Social Internet of Things (SIoT), where a group of SIoT devices with social relations can collaboratively identify and handle local events... 详细信息
来源: 评论
Simple approximation algorithms for Balanced MAX 2SAT  12th
收藏 引用
12th Latin American Symposium on Theoretical Informatics (LATIN)
作者: Paul, Alice Poloczek, Matthias Williamson, David P. Cornell Univ Sch Operat Res & Informat Engn Ithaca NY 14850 USA
We study simple algorithms for the balanced MAX 2SAT problem, where we are given weighted clauses of length one and two with the property that for each variable x the total weight of clauses that x appears in equals t... 详细信息
来源: 评论
New approximation algorithms for the Minimum Cycle Cover Problem  12th
New Approximation Algorithms for the Minimum Cycle Cover Pro...
收藏 引用
12th International Frontiers of algorithmics Workshop (FAW)
作者: Yu, Wei Liu, Zhaohui Bao, Xiaoguang East China Univ Sci & Technol Dept Math Shanghai 200237 Peoples R China Shanghai Ocean Univ Coll Informat Technol Shanghai 201306 Peoples R China
Given an undirected weighted graph G = (V, E) with nonnegative weight function obeying the triangle inequality, a set {C-1, C-2, ... , C-k} of cycles is called a cycle cover if V subset of U-i=1(k) V (C-i) and its cos... 详细信息
来源: 评论
MASA: An efficient framework for anomaly detection in multi-attributed networks
收藏 引用
COMPUTERS & SECURITY 2021年 102卷 102085-102085页
作者: Shao, Minglai Li, Jianxin Chang, Yue Zhao, Jun Chen, Xunxun Beihang Univ Bejing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China Beihang Univ Sch Comp Sci & Engn Beijing Peoples R China CNCERT Beijing Peoples R China
Anomalous connected subgraph detection has been widely used in multiple scenarios, such as botnet detection, fraud detection and event detection. Nevertheless, the huge search space makes a serious computational chall... 详细信息
来源: 评论
Tight approximation for partial vertex cover with hard capacities
收藏 引用
THEORETICAL COMPUTER SCIENCE 2019年 778卷 61-72页
作者: Kao, Mong-Jen Shiau, Jia-Yau Lin, Ching-Chi Lee, D. T. Natl Chung Cheng Univ Dept Comp Sci & Informat Engn Chiayi Taiwan Natl Taiwan Univ Grad Inst Elect Engn Taipei Taiwan Natl Taiwan Ocean Univ Dept Comp Sci & Engn Keelung Taiwan Acad Sinica Inst Informat Sci Taipei Taiwan
We consider the partial vertex cover problem with hard capacity constraints (Partial VC-HC) on hypergraphs. In this problem we are given a hypergraph G = (V, E) with a maximum edge size f and a covering requirement 72... 详细信息
来源: 评论
Adaptive Influence Maximization: If Influential Node Unwilling to Be the Seed
收藏 引用
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA 2021年 第5期15卷 84-84页
作者: Guo, Jianxiong Wu, Weili Univ Texas Dallas Dept Comp Sci 800 W Campbell Rd Richardson TX 75080 USA
Influence maximization problem attempts to find a small subset of nodes that makes the expected influence spread maximized, which has been researched intensively before. They all assumed that each user in the seed set... 详细信息
来源: 评论
Implementing synchronous reactive components upon multiprocessor platforms
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2021年 116卷 102027-102027页
作者: Baruah, Sanjoy Washington Univ St Louis MO 63110 USA
Model-based design methodologies based on the synchrony assumption are widely used in many safety-critical application domains. The synchrony assumption asserts that actions (such as the execution of code) occur insta... 详细信息
来源: 评论