咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 18 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 36 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 10 篇 电气工程
    • 3 篇 环境科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 土木工程
    • 1 篇 船舶与海洋工程
  • 13 篇 理学
    • 12 篇 数学
    • 1 篇 生物学
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 56 篇 generic algorith...
  • 3 篇 computational co...
  • 3 篇 quicksort
  • 3 篇 introspective al...
  • 3 篇 hybrid algorithm...
  • 2 篇 crossover
  • 2 篇 c
  • 2 篇 energy storage
  • 2 篇 templates
  • 2 篇 mutation
  • 2 篇 heapsort
  • 2 篇 sorting algorith...
  • 2 篇 variance ratio
  • 2 篇 voltage control
  • 2 篇 genetic algorith...
  • 2 篇 hierarchical mut...
  • 2 篇 software librari...
  • 2 篇 constraint propa...
  • 2 篇 multimodal funct...
  • 2 篇 optimization of ...

机构

  • 2 篇 suny albany dept...
  • 2 篇 eth dept comp sc...
  • 2 篇 computer science...
  • 1 篇 natl res univ hi...
  • 1 篇 osaka univ dept ...
  • 1 篇 fed polytech sch...
  • 1 篇 univ texas austi...
  • 1 篇 univ hosp bonn i...
  • 1 篇 nanchang univ en...
  • 1 篇 elect distribut ...
  • 1 篇 elect distribut ...
  • 1 篇 bell labs murray...
  • 1 篇 univ frankfurt f...
  • 1 篇 indian inst sci ...
  • 1 篇 univ bordeaux cn...
  • 1 篇 rensselaer polyt...
  • 1 篇 cwi nl-1009 ab a...
  • 1 篇 univ tubingen wi...
  • 1 篇 univ amsterdam n...
  • 1 篇 schmid & partner...

作者

  • 3 篇 musser dr
  • 2 篇 apt kr
  • 2 篇 stearns re
  • 2 篇 musial kamil
  • 2 篇 burduk anna
  • 2 篇 shaaban mohamed
  • 2 篇 maurer ueli
  • 2 篇 watt stephen m.
  • 1 篇 luo a
  • 1 篇 petinrin j. o.
  • 1 篇 xu xin
  • 1 篇 chen wc
  • 1 篇 machleidt torste...
  • 1 篇 broadwater rober...
  • 1 篇 abdullah ansari
  • 1 篇 schnorr cp
  • 1 篇 feinauer lynn r.
  • 1 篇 osawa naoki
  • 1 篇 schwarzweller c
  • 1 篇 yongxian li tran...

语言

  • 47 篇 英文
  • 9 篇 其他
检索条件"主题词=Generic Algorithms"
56 条 记 录,以下是11-20 订阅
排序:
On the equivalence of RSA and factoring regarding generic ring algorithms
收藏 引用
12th International Conference on the Theory of Application of Cryptology and Information Security
作者: Leander, Gregor Rupp, Andy Ruhr Univ Bochum Horst Gortz Inst IT Secur Univ Str 150 D-4630 Bochum Germany
To prove or disprove the computational equivalence of solving the RSA problem and factoring integers is a longstanding open problem in cryptography. This paper provides some evidence towards the validity of this equiv... 详细信息
来源: 评论
A generic Approach for Analysis of White-Light Interferometry Data via User-Defined algorithms
A Generic Approach for Analysis of White-Light Interferometr...
收藏 引用
14th International Conference on Computational Science and Its Applications (ICCSA)
作者: Schneider, Max Fey, Dietmar Wenzel, Kay Machleidt, Torsten Univ Erlangen Nurnberg Erlangen Germany Gesell Bild & Signalverarbeitung GBS mbH Ilmenau Germany
The non-destructive and automatic 3D surface analysis using white-light interferometry has very high demands on the required computing systems. This is due to both, the high volume of data that are collected and the t... 详细信息
来源: 评论
Introspective sorting and selection revisited
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2000年 第6期30卷 617-638页
作者: Valois, JD Rensselaer Polytech Inst Dept Comp Sci Troy NY 12180 USA
We describe two improvements to introspective sorting and selection algorithms: a simple rule fine-grained introspection that detects potential worst-case performance after only a small constant number of partitioning... 详细信息
来源: 评论
Breaking RSA generically Is Equivalent to Factoring
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2016年 第11期62卷 6251-6259页
作者: Aggarwal, Divesh Maurer, Ueli Natl Univ Singapore Dept Comp Sci Ctr Quantum Technol Singapore 117543 Singapore ETH Dept Comp Sci CH-8092 Zurich Switzerland
Let N be a random variable distributed according to some appropriate distribution over the set of products of two primes, such that factoring N is believed to be hard. The RSA assumption states that, given an a chosen... 详细信息
来源: 评论
Secured distributed algorithms without hardness assumptions
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2023年 171卷 130-140页
作者: Barenboim, Leonid Levin, Harel Open Univ Israel Dept Math & Comp Sci POB 808 Raanana Israel Nucl Res Ctr Negev Dept Phys POB 9001 Beer Sheva Israel
We study algorithms in the LOCAL model that produce secured output. Specifically, each vertex computes its part in the output, the entire output is correct, but each vertex cannot discover the output of other vertices... 详细信息
来源: 评论
Small generic hardcore subsets for the discrete logarithm: Short secret DL-keys
收藏 引用
INFORMATION PROCESSING LETTERS 2001年 第2期79卷 93-98页
作者: Schnorr, CP Univ Frankfurt Fachbereich Math Informat D-60439 Frankfurt Germany Bell Labs Murray Hill NJ 07974 USA
Let G be a group of prime order q with generator g. We study hardcore subsets H subset of G of the discrete logarithm (DL) log(g) in the model of generic algorithms. In this model we count group operations such as mul... 详细信息
来源: 评论
Evolution and development of a multicellular organism: Scalability, resilience, and neutral complexification
收藏 引用
ARTIFICIAL LIFE 2006年 第3期12卷 381-409页
作者: Federici, Diego Downing, Keith Norwegian Univ Sci & Technol Dept Comp & Informat Sci N-7491 Trondheim Norway
To increase the evolvability of larger search spaces, several indirect encoding strategies have been proposed. Among these, multicellular developmental systems are believed to offer great potential for the evolution o... 详细信息
来源: 评论
Automatic segmentation of dermoscopy images using self-generating neural networks seeded by genetic algorithm
收藏 引用
PATTERN RECOGNITION 2013年 第3期46卷 1012-1019页
作者: Xie, Fengying Bovik, Alan C. Beihang Univ Image Proc Ctr Sch Aeronaut & Astronaut Beijing 100191 Peoples R China Univ Texas Austin Dept Elect & Comp Engn Austin TX 78712 USA
A novel dermoscopy image segmentation algorithm is proposed using a combination of a self-generating neural network (SGNN) and the genetic algorithm (GA). Optimal samples are selected as seeds using GA;taking these se... 详细信息
来源: 评论
The role of commutativity in constraint propagation algorithms
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 2000年 第6期22卷 1002-1036页
作者: Apt, KR CWI NL-1090 GB Amsterdam Netherlands Univ Amsterdam NL-1012 WX Amsterdam Netherlands
Constraint propagation algorithms form an important part of most of the constraint programming systems. We provide here a simple, yet very general framework that allows us to explain several constraint propagation alg... 详细信息
来源: 评论
The essence of constraint propagation
收藏 引用
THEORETICAL COMPUTER SCIENCE 1999年 第1-2期221卷 179-210页
作者: Apt, KR CWI NL-1009 AB Amsterdam Netherlands Univ Amsterdam Dept Math Comp Sci Phys & Astron NL-1012 WX Amsterdam Netherlands
We show that several constraint propagation algorithms (also called (local) consistency, consistency enforcing, Waltz, filtering or narrowing algorithms) are instances of algorithms that deal with chaotic iteration. T... 详细信息
来源: 评论