咨询与建议

限定检索结果

文献类型

  • 1,451 篇 期刊文献
  • 1,141 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 2,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,089 篇 工学
    • 1,529 篇 计算机科学与技术...
    • 681 篇 电气工程
    • 584 篇 软件工程
    • 301 篇 信息与通信工程
    • 290 篇 控制科学与工程
    • 102 篇 石油与天然气工程
    • 56 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
    • 40 篇 机械工程
    • 40 篇 航空宇航科学与技...
    • 39 篇 电子科学与技术(可...
    • 34 篇 土木工程
    • 33 篇 交通运输工程
    • 28 篇 建筑学
    • 21 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 19 篇 测绘科学与技术
    • 10 篇 材料科学与工程(可...
    • 8 篇 环境科学与工程(可...
  • 711 篇 理学
    • 625 篇 数学
    • 109 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 33 篇 物理学
    • 20 篇 化学
    • 19 篇 生物学
  • 207 篇 管理学
    • 130 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 20 篇 经济学
    • 19 篇 应用经济学
  • 11 篇 法学
    • 9 篇 社会学
  • 10 篇 医学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 2,595 篇 consensus algori...
  • 407 篇 blockchain
  • 177 篇 blockchains
  • 130 篇 security
  • 119 篇 scalability
  • 101 篇 heuristic algori...
  • 99 篇 convergence
  • 85 篇 multi-agent syst...
  • 84 篇 throughput
  • 83 篇 fault tolerant s...
  • 81 篇 fault tolerance
  • 77 篇 privacy
  • 75 篇 microgrids
  • 74 篇 distributed cont...
  • 71 篇 protocols
  • 71 篇 consensus protoc...
  • 71 篇 peer-to-peer com...
  • 69 篇 internet of thin...
  • 66 篇 topology
  • 60 篇 smart contracts

机构

  • 9 篇 xidian univ sch ...
  • 8 篇 southeast univ s...
  • 8 篇 google research ...
  • 7 篇 columbia univers...
  • 7 篇 aalborg univ dep...
  • 7 篇 mit united state...
  • 7 篇 shanghai jiao to...
  • 6 篇 beihang univ sch...
  • 6 篇 carnegie mellon ...
  • 6 篇 southeast univ s...
  • 5 篇 beijing inst tec...
  • 5 篇 shandong univ sc...
  • 5 篇 school of mathem...
  • 5 篇 nanyang technol ...
  • 5 篇 north china elec...
  • 5 篇 dalian maritime ...
  • 5 篇 university of to...
  • 5 篇 qufu normal univ...
  • 4 篇 massachusetts in...
  • 4 篇 shanxi univ sch ...

作者

  • 13 篇 guerrero josep m...
  • 11 篇 li junmin
  • 7 篇 dragicevic tomis...
  • 7 篇 du yuhua
  • 7 篇 chen jiaxi
  • 7 篇 chow mo-yuen
  • 7 篇 kim hak-man
  • 7 篇 schulz christian
  • 6 篇 ding zhengtao
  • 6 篇 meng lexuan
  • 6 篇 wen guanghui
  • 6 篇 wang jianan
  • 6 篇 burgos-mellado c...
  • 6 篇 hadjicostis chri...
  • 5 篇 fischer nick
  • 5 篇 chae kijoon
  • 5 篇 fu xiang
  • 5 篇 zhang qinjin
  • 5 篇 chen chen
  • 5 篇 ahn hyo-sung

语言

  • 2,308 篇 英文
  • 278 篇 其他
  • 10 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=Consensus algorithm"
2595 条 记 录,以下是2521-2530 订阅
排序:
A Comparative Analysis of Bitcoin and Ethereum Blockchain
A Comparative Analysis of Bitcoin and Ethereum Blockchain
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Keyao Huang Jingyu Ma Xinyuan Wang Xi’an Jiaotong Liverpool University Suzhou China Pre-Engineering Div General Studies Admin University of Illinois at Urbana-Champaign Champaign US Hebei Agricultural University Langfang China
With the development of blockchain, various blockchain-based applications emerged. Of which Bitcoin and Ethereum are the most representative and popular blockchain applications. Therefore, it is important to compare B... 详细信息
来源: 评论
Revisiting the Relative Performance of the AVL Tree and Three Variants of the Red-Black Tree
arXiv
收藏 引用
arXiv 2024年
作者: Brown, Russell A.
Although historical opinion has held that the red-black tree is faster than the AVL tree, benchmarks reveal that the AVL tree is faster than the red-black tree for deletion, often faster for insertion, and as fast or ... 详细信息
来源: 评论
An Improved Distributed Secondary Control Scheme in Islanded AC Microgrids
An Improved Distributed Secondary Control Scheme in Islanded...
收藏 引用
IEEE Energy Conversion Congress and Exposition
作者: Jiahao Yu Fei Gao Shanshan Wei Junzhong Xu Dawei Liao Yutong Zhao Key Laboratory of Control of Power Transmission and Conversion Ministry of Education Shanghai Jiao Tong University Shanghai China
Following the hierarchical control architecture, this paper investigates the diffusion algorithm based distributed secondary control in islanded AC microgrids. The principle of diffusion algorithm is introduced first ... 详细信息
来源: 评论
Vulnerability Assessment of Blockchain Using Confrontation Deduction
Vulnerability Assessment of Blockchain Using Confrontation D...
收藏 引用
Chinese Automation Congress (CAC)
作者: Luyu Chen Jing He Xiaofeng Ma Wei Ye School of Electronics and Information Engineering Toingji University Shangha China Suzhou Tongji Blockchain Research Institute Suzhou China
blockchain technology is one of the strategic emerging information technologies. It integrates a variety of technologies such as cryptography, peer-to-peer network, consensus algorithm and smart contract, and has been... 详细信息
来源: 评论
Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs)
Ethereum for Secure Authentication of IoT using Pre-Shared K...
收藏 引用
International Conference on Wireless Networks and Mobile Communications (WINCOM)
作者: Mohammad El-Hajj Ahmad Fadlallah Maroun Chamoun Ahmed Serhrouchni Saint Joseph University Lebanon University of Sciences and Arts in Lebanon Telecom ParisTech France
Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distrib... 详细信息
来源: 评论
Smart GuardianChain: A Solution Based on Blockchain Technology for Ensuring Security of E-Health Records in a Smart Environment
Smart GuardianChain: A Solution Based on Blockchain Technolo...
收藏 引用
Smart Devices (ICSD), International Conference on
作者: Vinod Sharma Kailash Aseri Ranadeep Reddy Palle Atul Agrawal Karthikeya Tallapneni Sourabh Kumar Jain Jiwaji University Sunrise University University of Houston SDBCT Chandigarh University Jayoti Vidyapeeth Women’s University
In the age of rapidly progressing technology, the healthcare sector is embracing the revolution of digital transformation through the widespread adoption of Electronic Health Records (EHRs). Nevertheless, the digital ... 详细信息
来源: 评论
Sequential and Simultaneous Distance-based Dimension Reduction
arXiv
收藏 引用
arXiv 2019年
作者: Ni, Yijin Yu, Chuanping Ko, Andy Huo, Xiaoming H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology United States
This paper introduces a method called Sequential and Simultaneous Distance-based Dimension Reduction (S2D2R) that performs simultaneous dimension reduction for a pair of random vectors based on distance covariance (dC... 详细信息
来源: 评论
Efficient Matroid Intersection via a Batch-Update Auction algorithm
arXiv
收藏 引用
arXiv 2024年
作者: Blikstad, Joakim Tu, Ta-Wei KTH Royal Institute of Technology Max Planck Institute for Informatics Sweden Stanford University United States
Given two matroidsM1 andM2 over the same n-element ground set, the matroid intersection problem is to find a largest common independent set, whose size we denote by r. We present a simple and generic auction algorithm... 详细信息
来源: 评论
Research on target recognition method of robotic arm based on improved ORB
Research on target recognition method of robotic arm based o...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Zikang Gao Ming Lv Jie Zhang Nanjing University of Science and Technology Nanjing China
When a robotic arm is in motion, it typically cannot intelligently perform complex tasks in response to changes in the surrounding environment. Introducing a vision-based spatial target recognition method enables the ... 详细信息
来源: 评论
The Cost of Consistency: Submodular Maximization with Constant Recourse
arXiv
收藏 引用
arXiv 2024年
作者: Dütting, Paul Fusco, Federico Lattanzi, Silvio Norouzi-Fard, Ashkan Svensson, Ola Zadimoghaddam, Morteza Google Research United States Sapienza University of Rome Italy École Polytechnique Fédérale de Lausanne Switzerland
In this work, we study online submodular maximization, and how the requirement of maintaining a stable solution impacts the approximation. In particular, we seek bounds on the best-possible approximation ratio that is... 详细信息
来源: 评论