咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 185 篇 工学
    • 135 篇 计算机科学与技术...
    • 68 篇 电气工程
    • 20 篇 信息与通信工程
    • 15 篇 软件工程
    • 12 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 机械工程
    • 4 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
  • 64 篇 理学
    • 43 篇 数学
    • 16 篇 物理学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 13 篇 管理学
    • 13 篇 管理科学与工程(可...
  • 3 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 207 篇 deterministic al...
  • 17 篇 randomized algor...
  • 15 篇 distributed algo...
  • 13 篇 algorithms
  • 7 篇 optimisation
  • 7 篇 stochastic proce...
  • 6 篇 runtime
  • 6 篇 computational co...
  • 6 篇 deterministic al...
  • 6 篇 deterministic
  • 5 篇 network topology
  • 5 篇 optimization
  • 5 篇 stochastic algor...
  • 5 篇 approximate comp...
  • 4 篇 graph algorithms
  • 4 篇 probability tree...
  • 4 篇 lower bound
  • 4 篇 treasure hunt
  • 4 篇 matroid
  • 4 篇 randomised algor...

机构

  • 4 篇 nanyang technol ...
  • 3 篇 indian inst tech...
  • 3 篇 univ liverpool d...
  • 2 篇 it univ copenhag...
  • 2 篇 tel aviv univers...
  • 2 篇 dhirubhai ambani...
  • 2 篇 university of li...
  • 2 篇 univ granada dep...
  • 2 篇 univ hong kong d...
  • 2 篇 microsoft res re...
  • 2 篇 univ wroclaw wro...
  • 2 篇 cheriton school ...
  • 2 篇 univ politecn va...
  • 2 篇 indian inst tech...
  • 2 篇 computer science...
  • 2 篇 univ granada dep...
  • 2 篇 mit 77 massachus...
  • 2 篇 univ chinese aca...
  • 2 篇 univ salerno dip...
  • 2 篇 indian inst tech...

作者

  • 9 篇 kowalski dariusz...
  • 5 篇 cano andres
  • 5 篇 gomez-olmedo man...
  • 4 篇 moral serafin
  • 4 篇 de marco gianluc...
  • 3 篇 gorain barun
  • 3 篇 jurdzinski tomas...
  • 3 篇 moses william k....
  • 3 篇 ruzic milan
  • 2 篇 moran feldman
  • 2 篇 aaron bernstein
  • 2 篇 pandit supantha
  • 2 篇 lopez pedro
  • 2 篇 bhattacharya adr...
  • 2 篇 mondal kaushik
  • 2 篇 buchbinder niv
  • 2 篇 dimov ivan t.
  • 2 篇 garg mohit
  • 2 篇 gomez crispin
  • 2 篇 feldman moran

语言

  • 201 篇 英文
  • 5 篇 其他
  • 1 篇 荷兰文
检索条件"主题词=Deterministic algorithms"
207 条 记 录,以下是121-130 订阅
排序:
Approximations for Minimum Connected Sensor Cover
Approximations for Minimum Connected Sensor Cover
收藏 引用
32nd IEEE INFOCOM Conference
作者: Wu, Lidong Du, Hongwei Wu, Weili Li, Deying Lv, Jing Lee, Wonjun Univ Texas Dallas Dept Comp Sci Richardson TX 75080 USA Harbin Inst Technol Shenzhen Grad Sch Shenzhen Peoples R China Shenzhen Key Lab Internet Informat Collaborat Shenzhen Peoples R China Renmin Univ China Sch Informat Beijing 100872 Peoples R China Korea Univ Dept Comp Sci & Engn Seoul South Korea
Given a requested area, the Minimum Connected Sensor Cover problem is to find a minimum number of sensors such that their communication ranges induce a connected graph and their sensing ranges cover the requested area... 详细信息
来源: 评论
New Results on the Online Pricing Problem
New Results on the Online Pricing Problem
收藏 引用
24th International Symposium on algorithms and Computation
作者: Xiang, Xiangzhong Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China
We study the online pricing problem where there are m identical items on sale and a sequence of users u(1), u(2),... arrive one by one. Each u(i) has a non-increasing acceptable price function phi(i)(center dot) where... 详细信息
来源: 评论
Approximate Lazy Evaluation of Influence Diagrams
Approximate Lazy Evaluation of Influence Diagrams
收藏 引用
15th Conference of the Spanish-Association-for-Artificial-Intelligence (CAEPIA)
作者: Cabanas, Rafael Cano, Andres Gomez-Olmedo, Manuel Madsen, Anders L. Univ Granada CITIC Dept Comp Sci & Artificial Intelligence E-18071 Granada Spain HUGIN EXPERT Aalborg Denmark Aalborg Univ Dept Comp Sci Aalborg Denmark
Influence Diagrams are a tool used to represent and solve decision problems under uncertainty. One of the most efficient exact methods used to evaluate Influence Diagrams is Lazy Evaluation. This paper proposes the us... 详细信息
来源: 评论
Separations in Query Complexity Based on Pointer Functions  16
Separations in Query Complexity Based on Pointer Functions
收藏 引用
48th Annual ACM SIGACT Symposium on Theory of Computing (STOC)
作者: Ambainis, Andris Balodis, Kaspars Belovs, Aleksandrs Lee, Troy Santha, Miklos Smotrovs, Juris Univ Latvia Fac Comp Riga Latvia Univ Latvia IMCS Riga Latvia CWI Amsterdam Netherlands Nanyang Technol Univ SPMS Singapore Singapore NUS CQT Singapore Singapore NUS MajuLab Singapore Singapore CNRS IRIF Paris France
In 1986, Saks and Wigderson conjectured that the largest separation between deterministic and zero-error randomized query complexity for a total boolean function is given by the function f on n = 2(k) bits defined by ... 详细信息
来源: 评论
Feature selection in deterministic policy gradient
收藏 引用
JOURNAL OF ENGINEERING-JOE 2020年 第13期2020卷 403-406页
作者: Li, Luntong Li, Dazi Song, Tianheng Beijing Univ Chem Technol Inst Automat Beijing 100029 Peoples R China
The authors consider the task of learning control problem in reinforcement learning (RL) with continuous action space. Policy gradient, and in particular the determinist policy gradient (DPG) algorithm, provides a met... 详细信息
来源: 评论
Evolution with size in a locally periodic system: scattering and deterministic maps
收藏 引用
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL 2013年 第23期46卷 235101-235101页
作者: Dominguez-Rocha, V. Martinez-Mares, M. Univ Autonoma Metropolitana Iztapalapa Dept Fis Mexico City 09340 DF Mexico
In this paper, we study the evolution of the wavefunction with the system size in a locally periodic structure. In particular, we analyse the dependence of the wavefunction with the number of unit cells, which also re... 详细信息
来源: 评论
Two-Source Extractors for Leaky Sources
Two-Source Extractors for Leaky Sources
收藏 引用
IEEE Information Theory Workshop (ITW)
作者: Yu, Yu Li, Xiangxue Qian, Haifeng East China Normal Univ Dept Comp Sci & Technol Shanghai 200062 Peoples R China Tsinghua Univ Inst Interdisciplinary Informat Sci Beijing 100084 Peoples R China
A (worst-case) 2-source extractor is a deterministic algorithm that transforms pairwise independent weak random sources into almost uniform random strings. Despite non-constructive proofs that such objects exist with ... 详细信息
来源: 评论
Generation of Diverse Paths in 3D Environments
Generation of Diverse Paths in 3D Environments
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
作者: Quispe, Ana Huaman Kunz, Tobias Stilman, Mike Georgia Inst Technol Ctr Robot & Intelligent Machines Atlanta GA 30332 USA
In this paper we propose a deterministic algorithm to produce a set of diverse paths between a given start and goal configuration in 3D environments. These diverse paths have the following properties: 1) They are boun... 详细信息
来源: 评论
Peeling Algorithm for Custom Instruction Identification
Peeling Algorithm for Custom Instruction Identification
收藏 引用
IEEE Asia Pacific Conference on Circuit and System (APCCAS)
作者: Zhao, Kang Bian, Jinian Tsinghua Univ EDA Lab Dept Comp Sci & Technol Beijing 100084 Peoples R China
To speedup the custom instruction identification for the application specific instruction-set processor (ASIP), this paper proposes a peeling algorithm. It starts with the maximal valid pattern, and then gets a set of... 详细信息
来源: 评论
Optimal Monte Carlo algorithms
Optimal Monte Carlo algorithms
收藏 引用
IEEE John Vincent Atanasoff International Symposium on Modern Computing
作者: Dimov, Ivan T. Bulgarian Acad Sci Dept Parallel Algorithms Inst Parallel Proc Sofia 1113 Bulgaria
The question "what Monte Carlo can do and cannot do efficiently " is discussed for some functional spaces that define the regularity of the input data. Important for practical computations data classes are c... 详细信息
来源: 评论