咨询与建议

限定检索结果

文献类型

  • 160 篇 期刊文献
  • 75 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 210 篇 工学
    • 127 篇 电气工程
    • 106 篇 计算机科学与技术...
    • 37 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 软件工程
    • 9 篇 机械工程
    • 5 篇 交通运输工程
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 石油与天然气工程
  • 45 篇 理学
    • 22 篇 数学
    • 18 篇 物理学
    • 4 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 13 篇 医学
    • 12 篇 临床医学
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学

主题

  • 236 篇 computation comp...
  • 57 篇 computational co...
  • 9 篇 iterative method...
  • 9 篇 communication co...
  • 8 篇 computer vision ...
  • 8 篇 optimisation
  • 8 篇 optimisation tec...
  • 6 篇 optimization
  • 6 篇 codes
  • 6 篇 matrix algebra
  • 6 篇 key distribution
  • 5 篇 signal detection
  • 5 篇 vectors
  • 5 篇 multicast commun...
  • 5 篇 radiofrequency i...
  • 5 篇 feature extracti...
  • 5 篇 storage complexi...
  • 5 篇 polynomials
  • 5 篇 image recognitio...
  • 5 篇 privacy

机构

  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ natl...
  • 2 篇 srm inst sci & t...
  • 2 篇 nanjing univ sci...
  • 2 篇 anna univ chenna...
  • 2 篇 huazhong univ sc...
  • 2 篇 beijing inst tec...
  • 2 篇 mil tech coll au...
  • 2 篇 univ chinese aca...
  • 2 篇 beijing univ pos...
  • 2 篇 yangzhou univ co...
  • 2 篇 univ coll engn t...
  • 2 篇 chinese acad sci...
  • 2 篇 beijing key lab ...
  • 2 篇 xidian univ stat...
  • 2 篇 anna univ chenna...
  • 2 篇 beijing univ pos...
  • 2 篇 yamaguchi univ f...
  • 2 篇 univ auckland de...
  • 1 篇 henan univ sch m...

作者

  • 3 篇 zhang lei
  • 3 篇 bose s.
  • 3 篇 kannan a.
  • 3 篇 vijayakumar p.
  • 2 篇 li sheng
  • 2 篇 amutha r.
  • 2 篇 he sun
  • 2 篇 zhang enze
  • 2 篇 chen q.
  • 2 篇 deepa n.
  • 2 篇 deborah lazarus ...
  • 2 篇 li weijun
  • 2 篇 balaji l.
  • 2 篇 khoussainov bakh...
  • 2 篇 cui sheng
  • 2 篇 chen qingwei
  • 2 篇 lim olivier
  • 2 篇 mancini stephane
  • 2 篇 pandiaraja p.
  • 2 篇 chen weigang

语言

  • 220 篇 英文
  • 13 篇 其他
  • 2 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=Computation complexity"
236 条 记 录,以下是121-130 订阅
排序:
Kalman Filtering with Unknown Sensor Measurement Losses
收藏 引用
IFAC-PapersOnLine 2016年 第22期49卷 315-320页
作者: Zhang, Jiaqi You, Keyou Department of Automation and Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing100084 China
This work studies the state estimation problem of a networked linear system where a sensor and an estimator are connected via a lossy network. If the measurement loss is known to the estimator, the minimum variance es... 详细信息
来源: 评论
Improved Semi-supervised Clustering Algorithm Based on Affinity Propagation
收藏 引用
Journal of Donghua University(English Edition) 2015年 第1期32卷 125-131页
作者: 金冉 刘瑞娟 李晔锋 寇春海 College of Information Science and Technology Donghua University College of Computer Science and Technology Zhejiang Wanli University College of Science Donghua University
A clustering algorithm for semi-supervised affinity propagation based on layered combination is proposed in this paper in light of existing flaws. To improve accuracy of the algorithm,it introduces the idea of layered... 详细信息
来源: 评论
A fast reliability-algorithm for the circular consecutive-weighted-k-out-of-n:F system
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 1998年 第4期47卷 472-474页
作者: Chang, JC Chen, RJ Hwang, FK Natl Chiao Tung Univ Dept Comp Sci & Informat Engn Hsinchu 30050 Taiwan Natl Chiao Tung Univ Dept Appl Math Hsinchu 30050 Taiwan
An O(Tn) algorithm is presented for the circular consecutive-weighted-k-out-of-n:F system, where T less than or equal to min[n, [(k - w(max))/w(min)] + 1];w(max), w(min) are the maximum, minimum weights of all compone... 详细信息
来源: 评论
AN APPROACH TO THE PROBLEMS OF ROUTING OPTIMIZATION IN THE REGIONS OF INTRICATE SHAPE
收藏 引用
INFORMATION PROCESSING LETTERS 1981年 第1期13卷 39-43页
作者: STOYAN, YG SMELYAKOV, SV Institute of Machine-Building Problems Ukrainian Academy of Sciences Olminskogo 14 310024 Kharkov-24 U.S.S.R.
来源: 评论
Hybrid Context Aware Recommendation System for E-Health Care by merkle hash tree from cloud using evolutionary algorithm
收藏 引用
SOFT COMPUTING 2020年 第10期24卷 7149-7161页
作者: Deepa, N. Pandiaraja, P. M Kumarasamy Coll Engn Dept Comp Sci & Engn Karur 639113 Tamil Nadu India
Privacy preservation permits doctors to outsource the huge encrypted reports to the cloud and permits the authenticated patients to have a safe search over the reports without leaking the private information. The doct... 详细信息
来源: 评论
Enforcing bounded realness of S parameter through trace parameterization
Enforcing bounded realness of S parameter through trace para...
收藏 引用
12th Topical Meeting on Electrical Performance of Electronic Packaging
作者: Chen, HB Fang, JY Univ Calif Santa Cruz Dept Elect Engn Santa Cruz CA 95064 USA
A new method of enforcing the bounded realness of S parameter macro-model is proposed in this paper. With a given stable rational function obtained from fitting the original data, its closest bounded real rational fun... 详细信息
来源: 评论
Fast Intra Mode Prediction for HEVC Based on Distortion Variance
Fast Intra Mode Prediction for HEVC Based on Distortion Vari...
收藏 引用
IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Balaji, L. Raj, V. Logesh Raghavendran, R. Raj, S. Mathan Akash, G. Velammal Inst Technol Dept ECE Madras Tamil Nadu India
High Efficiency Video Coding (HEVC) is an ongoing standard, which is an extension of H.264/AVC which is the latest coding standard. In HEVC encoder an exhaustive search method is employed to select the best mode for e... 详细信息
来源: 评论
EDCA: Efficient Diffusion Cipher and Authentication Scheme for Wireless Sensor Networks
EDCA: Efficient Diffusion Cipher and Authentication Scheme f...
收藏 引用
IEEE Wireless Communications and Networking Conference (WCNC)
作者: Noura, Hassan Martin, Steven Al Agha, Khaldoun Univ Paris Sud CNRS Lab Rech Informat Paris France
The security of Wireless Sensor Networks (WSN) is essential for effective deployment in various areas and applications such as military and business. The existing security solutions of WSN are based on multi-round fun... 详细信息
来源: 评论
A Timing Synchronization Method for OFDM Based Power Line Communication  9
A Timing Synchronization Method for OFDM Based Power Line Co...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Xiaosheng Liu Jiasheng Liu He Sun Hao Liu Xuanpu Gu School of Electrical Engineering and Automation Harbin Institute of Technology
Orthogonal frequency division multiplexing(OFDM) is one important technologies of power line communication(PLC). This paper presents a new timing synchronization method for OFDM system which can be used in PLC. The pr... 详细信息
来源: 评论
Fast Mode Decision Algorithm for H. 264/SVC  3
Fast Mode Decision Algorithm for H. 264/SVC
收藏 引用
3rd International Conference on Frontiers in Intelligent Computing - Theory and Applications (FICTA)
作者: Balaji, L. Thyagharajan, K. K. Anna Univ Fac Informat & Commun Chennai 600025 Tamil Nadu India Velammal Inst Technol Chennai 601204 Tamil Nadu India RMD Engn Coll Chennai 601206 Tamil Nadu India
H.264/AVC extension is H.264/SVC which is applicable for environment that demands video streaming. This paper presents an algorithm to reduce computation complexity and maintain coding efficiency by determining the mo... 详细信息
来源: 评论