咨询与建议

限定检索结果

文献类型

  • 1,448 篇 期刊文献
  • 1,162 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 2,611 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,090 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 694 篇 电气工程
    • 576 篇 软件工程
    • 307 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 103 篇 石油与天然气工程
    • 56 篇 仪器科学与技术
    • 42 篇 机械工程
    • 40 篇 航空宇航科学与技...
    • 38 篇 电子科学与技术(可...
    • 35 篇 交通运输工程
    • 34 篇 土木工程
    • 33 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 21 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 19 篇 测绘科学与技术
    • 10 篇 材料科学与工程(可...
    • 9 篇 环境科学与工程(可...
  • 698 篇 理学
    • 611 篇 数学
    • 106 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 33 篇 物理学
    • 21 篇 化学
    • 21 篇 生物学
  • 206 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 20 篇 经济学
    • 19 篇 应用经济学
  • 11 篇 法学
    • 9 篇 社会学
  • 9 篇 医学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 2,611 篇 consensus algori...
  • 418 篇 blockchain
  • 191 篇 blockchains
  • 143 篇 security
  • 130 篇 scalability
  • 105 篇 heuristic algori...
  • 101 篇 convergence
  • 89 篇 throughput
  • 89 篇 fault tolerant s...
  • 86 篇 fault tolerance
  • 86 篇 multi-agent syst...
  • 79 篇 privacy
  • 76 篇 microgrids
  • 76 篇 consensus protoc...
  • 74 篇 internet of thin...
  • 74 篇 distributed cont...
  • 74 篇 peer-to-peer com...
  • 71 篇 protocols
  • 67 篇 topology
  • 63 篇 delays

机构

  • 10 篇 xidian univ sch ...
  • 8 篇 southeast univ s...
  • 8 篇 google research ...
  • 8 篇 mit united state...
  • 7 篇 columbia univers...
  • 7 篇 aalborg univ dep...
  • 7 篇 shanghai jiao to...
  • 6 篇 beihang univ sch...
  • 6 篇 carnegie mellon ...
  • 6 篇 national univers...
  • 6 篇 southeast univ s...
  • 6 篇 university of to...
  • 5 篇 shanghai univ sc...
  • 5 篇 beijing inst tec...
  • 5 篇 shandong univ sc...
  • 5 篇 school of mathem...
  • 5 篇 nanyang technol ...
  • 5 篇 north china elec...
  • 5 篇 dalian maritime ...
  • 5 篇 qufu normal univ...

作者

  • 13 篇 guerrero josep m...
  • 12 篇 li junmin
  • 8 篇 chen jiaxi
  • 7 篇 dragicevic tomis...
  • 7 篇 du yuhua
  • 7 篇 chow mo-yuen
  • 7 篇 kim hak-man
  • 7 篇 schulz christian
  • 6 篇 ding zhengtao
  • 6 篇 li jinsha
  • 6 篇 meng lexuan
  • 6 篇 wen guanghui
  • 6 篇 wang jianan
  • 6 篇 burgos-mellado c...
  • 6 篇 hadjicostis chri...
  • 6 篇 zhang wei
  • 5 篇 fischer nick
  • 5 篇 chae kijoon
  • 5 篇 wang jing
  • 5 篇 fu xiang

语言

  • 2,120 篇 英文
  • 480 篇 其他
  • 9 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"主题词=Consensus algorithm"
2611 条 记 录,以下是1441-1450 订阅
排序:
Extrapolated Hard Thresholding algorithms with Finite Length for Composite 0 Penalized Problems
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Fan Wei, Jiazhen Bian, Wei School of Mathematics Harbin Institute of Technology Harbin China
For a class of sparse optimization problems with the penalty function of (·)+0, we first characterize its local minimizers and then propose an extrapolated hard thresholding algorithm to solve such problems. We s... 详细信息
来源: 评论
Optimal k-Secretary with Logarithmic Memory
arXiv
收藏 引用
arXiv 2025年
作者: Qiao, Mingda Zhang, Wei Massachusetts Institute of Technology United States
We study memory-bounded algorithms for the k-secretary problem. The algorithm of Kleinberg [Kle05] achieves an optimal competitive ratio of 1 − O(1/√k), yet a straightforward implementation requires Ω(k) memory. Our ... 详细信息
来源: 评论
Enhancing Medical IOT data using Blockchain
Enhancing Medical IOT data using Blockchain
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: N. Giridharan Yashwin G. M Logeshwaran B Bharaniraja R Department of Artificial Intelligence and Data Science K.S.Rangasamy College of Technology Tiruchengode India
The potential of blockchain technology is very high in terms of transforming healthcare management systems, especially in safety, interoperability, and the integrity of health data. This revolutionary ability comes fr... 详细信息
来源: 评论
A Blockchain-Based Approach to WoT Device Access Control
A Blockchain-Based Approach to WoT Device Access Control
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Someah Alangari Computer Science Department College of Computing and IT Shaqra University Shaqra Saudi Arabia
The Web of Things (WoT) represents an interconnected network of sensors and smart devices. It faces significant security and privacy challenges, including potential data breaches, unauthorized access issues, and conce... 详细信息
来源: 评论
Runtime Analysis of the Compact Genetic algorithm on the LeadingOnes Benchmark
arXiv
收藏 引用
arXiv 2025年
作者: Chwialkowski, Marcel Doerr, Benjamin Krejca, Martin S. École Polytechnique Institut Polytechnique de Paris Palaiseau France Palaiseau France
The compact genetic algorithm (cGA) is one of the simplest estimation-of-distribution algorithms (EDAs). Next to the univariate marginal distribution algorithm (UMDA)—another simple EDA—, the cGA has been subject to... 详细信息
来源: 评论
Convergence Analysis of the Wasserstein Proximal algorithm beyond Geodesic Convexity
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Shuailong Chen, Xiaohui Section of Computer Science Ecole Polytechnique Fédérale de Lausanne Switzerland Department of Mathematics University of Southern California United States
The proximal algorithm is a powerful tool to minimize nonlinear and nonsmooth functionals in a general metric space. Motivated by the recent progress in studying the training dynamics of the noisy gradient descent alg... 详细信息
来源: 评论
Decision-Theoretic Approaches in Learning-Augmented algorithms∗
arXiv
收藏 引用
arXiv 2025年
作者: Angelopoulos, Spyros Dürr, Christoph Melidi, Georgii Sorbonne University CNRS LIP6 Paris France International Laboratory on Learning Systems Montreal Canada
In this work, we initiate the systemic study of decision-theoretic metrics in the design and analysis of algorithms with machine-learned predictions. We introduce approaches based on both deterministic measures such a... 详细信息
来源: 评论
TESTING THE FAIRNESS-ACCURACY IMPROVABILITY OF algorithmS
arXiv
收藏 引用
arXiv 2024年
作者: Auerbach, Eric Liang, Annie Okumura, Kyohei Tabord-Meehan, Max Department of Economics Northwestern University United States Department of Economics University of Chicago United States
Many organizations use algorithms that have a disparate impact, i.e., the benefits or harms of the algorithm fall disproportionately on certain social groups. Addressing an algorithm’s disparate impact can be challen... 详细信息
来源: 评论
Best-Arm Identification in Unimodal Bandits
arXiv
收藏 引用
arXiv 2024年
作者: Poiani, Riccardo Jourdan, Marc Kaufmann, Emilie Degenne, Rémy Bocconi University Milan Italy EPFL Lausanne Switzerland Univ. Lille Inria CNRS Centrale Lille UMR 9189-CRIStAL France
We study the fixed-confidence best-arm identification problem in unimodal bandits, in which the means of the arms increase with the index of the arm up to their maximum, then decrease. We derive two lower bounds on th... 详细信息
来源: 评论
How to Make the Gradients Small Privately: Improved Rates for Differentially Private Non-Convex Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Lowy, Andrew Ullman, Jonathan Wright, Stephen J. Wisconsin Institute for Discovery University of Wisconsin-Madison United States Khoury College of Computer Sciences Northeastern University United States Department of Computer Sciences University of Wisconsin–Madison United States
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk... 详细信息
来源: 评论