咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 测绘科学与技术
    • 1 篇 软件工程
  • 4 篇 理学
    • 3 篇 数学
    • 1 篇 地理学

主题

  • 9 篇 equivalence algo...
  • 3 篇 set union
  • 2 篇 algorithm
  • 2 篇 priority queue
  • 1 篇 short-term relia...
  • 1 篇 smart substation...
  • 1 篇 dominator
  • 1 篇 set
  • 1 篇 minimum spanning...
  • 1 篇 stack
  • 1 篇 message-passing-...
  • 1 篇 computational co...
  • 1 篇 substation prote...
  • 1 篇 binary tree
  • 1 篇 merging
  • 1 篇 global navigatio...
  • 1 篇 graph
  • 1 篇 depth-first sear...
  • 1 篇 power system rel...
  • 1 篇 time source sens...

机构

  • 1 篇 seoul natl univ ...
  • 1 篇 state univ utrec...
  • 1 篇 shandong univ in...
  • 1 篇 tel aviv univ de...
  • 1 篇 polytech inst co...
  • 1 篇 hefei univ techn...
  • 1 篇 univ rome la sap...
  • 1 篇 babes bolyai uni...

作者

  • 1 篇 sun zhangzhen
  • 1 篇 italiano gf
  • 1 篇 jiang chunhua
  • 1 篇 du yujun
  • 1 篇 andreica alina b...
  • 1 篇 robert endre tar...
  • 1 篇 li shenghu
  • 1 篇 cheon jung hee
  • 1 篇 xu tianhe
  • 1 篇 hong hyunsook
  • 1 篇 vanleeuwen j
  • 1 篇 david cheriton
  • 1 篇 galil z
  • 1 篇 belfo fernando p...
  • 1 篇 xu guochang
  • 1 篇 tarjan re
  • 1 篇 j. e. hopcroft
  • 1 篇 j. d. ullman
  • 1 篇 robert tarjan
  • 1 篇 hua yuting

语言

  • 9 篇 英文
检索条件"主题词=Equivalence algorithm"
9 条 记 录,以下是1-10 订阅
排序:
A parallel equivalence algorithm based on MPI for GNSS data processing
收藏 引用
JOURNAL OF SPATIAL SCIENCE 2021年 第3期66卷 513-532页
作者: Jiang, Chunhua Xu, Tianhe Du, Yujun Sun, Zhangzhen Xu, Guochang Shandong Univ Inst Space Sci Weihai Shandong Peoples R China
A modified algorithm combining equivalence theory with MPI technology to improve Global Navigation Satellite System data processing efficiency is presented. The reservation of covariance matrix, elimination of unknown... 详细信息
来源: 评论
White-Box AES Implementation Revisited
收藏 引用
JOURNAL OF COMMUNICATIONS AND NETWORKS 2016年 第3期18卷 273-287页
作者: Baek, Chung Hun Cheon, Jung Hee Hong, Hyunsook Seoul Natl Univ Dept Math Sci Seoul South Korea
White-box cryptography presented by Chow et al. is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm... 详细信息
来源: 评论
Short-term reliability evaluation of protection systems in smart substations based on equivalent state spaces following semi-Markov process
收藏 引用
IET GENERATION TRANSMISSION & DISTRIBUTION 2016年 第9期10卷 2225-2230页
作者: Li, Shenghu Hua, Yuting Hefei Univ Technol Sch Elect Engn & Automat Hefei 230009 Peoples R China
The reliability analysis of protection systems in smart substations helps to improve their designed functions, whose difficulty lies in the complex configuration with various components. To avoid the dimension disaste... 详细信息
来源: 评论
A Comprehensive Methodology to Implement Business Intelligence and Analytics Through Knowledge Discovery in Databases  1
收藏 引用
6th International Conference on Mining Intelligence and Knowledge Exploration (MIKE)
作者: Belfo, Fernando Paulo Andreica, Alina Banca Polytech Inst Coimbra ISCAC Coimbra Business Sch Coimbra Portugal Babes Bolyai Univ Cluj Napoca Fac European Studies Cluj Napoca Romania
Business intelligence is used by companies for analysing business information, providing not only historical or current views on business operations, but also providing predictions about the business. Consequently, kn... 详细信息
来源: 评论
WORST-CASE ANALYSIS OF SET UNION algorithmS
收藏 引用
JOURNAL OF THE ACM 1984年 第2期31卷 245-281页
作者: TARJAN, RE VANLEEUWEN, J STATE UNIV UTRECHT DEPT COMP SCIUTRECHTNETHERLANDS
This paper analyzes the asymptotic worst-case running time of a number of variants of the well-known method of path compression for maintaining a collection of disjoint sets under union. We show that two one-pass meth... 详细信息
来源: 评论
Finding Dominators in Directed Graphs
收藏 引用
SIAM Journal on Computing 1974年 第1期3卷 62-89页
作者: Robert Tarjan
This paper describes an algorithm for finding dominators in an arbitrary directed graph. The algorithm uses depth-first search and efficient algorithms for computing disjoint set unions and manipulating priority queue... 详细信息