咨询与建议

限定检索结果

文献类型

  • 362 篇 期刊文献
  • 146 篇 会议
  • 10 篇 学位论文

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 409 篇 工学
    • 380 篇 计算机科学与技术...
    • 94 篇 软件工程
    • 64 篇 电气工程
    • 24 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 1 篇 光学工程
  • 212 篇 理学
    • 190 篇 数学
    • 13 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 5 篇 化学
    • 5 篇 系统科学
    • 1 篇 地球物理学
  • 38 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 12 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 特种医学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 哲学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 518 篇 graph algorithm
  • 51 篇 approximation al...
  • 18 篇 np-complete
  • 17 篇 domination
  • 16 篇 tree
  • 13 篇 computational co...
  • 13 篇 combinatorial re...
  • 12 篇 minimum spanning...
  • 12 篇 shortest path
  • 11 篇 chordal graph
  • 11 篇 combinatorial op...
  • 10 篇 gpu
  • 9 篇 graph theory
  • 9 篇 ordering
  • 9 篇 parallel algorit...
  • 9 篇 network optimiza...
  • 8 篇 planar graph
  • 8 篇 interval graphs
  • 8 篇 reordering algor...
  • 7 篇 apx-complete

机构

  • 13 篇 tohoku univ grad...
  • 10 篇 univ elect sci &...
  • 7 篇 kyoto univ grad ...
  • 6 篇 indian inst tech...
  • 5 篇 indian inst tech...
  • 5 篇 tohoku univ grad...
  • 5 篇 univ rostock ins...
  • 5 篇 indian inst tech...
  • 5 篇 tohoku univ grad...
  • 4 篇 univ sydney sch ...
  • 4 篇 osaka prefecture...
  • 4 篇 univ tokushima d...
  • 4 篇 mit comp sci & a...
  • 4 篇 otaru univ dept ...
  • 4 篇 fudan univ sch c...
  • 4 篇 univ bergen dept...
  • 4 篇 univ helsinki de...
  • 4 篇 shandong univ sc...
  • 3 篇 georgia inst tec...
  • 3 篇 tsinghua univ de...

作者

  • 25 篇 ito takehiro
  • 19 篇 nagamochi hirosh...
  • 16 篇 panda b. s.
  • 13 篇 ono hirotaka
  • 10 篇 zhou xiao
  • 10 篇 tarjan re
  • 9 篇 pandey arti
  • 9 篇 xiao mingyu
  • 8 篇 ishii toshimasa
  • 8 篇 otachi yota
  • 7 篇 suzuki akira
  • 7 篇 morsy ehab
  • 7 篇 zhang zhongzhi
  • 6 篇 uno yushi
  • 5 篇 paul s.
  • 5 篇 cui bin
  • 5 篇 kawahara jun
  • 5 篇 qin lu
  • 5 篇 chen lei
  • 5 篇 lin xuemin

语言

  • 458 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"主题词=Graph Algorithm"
518 条 记 录,以下是361-370 订阅
排序:
Approximation to the minimum cost edge installation problem
收藏 引用
18th International Symposium on algorithms and Computations (ISAAC 2007)
作者: Morsy, Ehab Nagamochi, Hiroshi Kyoto Univ Grad Sch Informat Dept Appl Math & Phys Kyoto Japan
We consider the minimum cost edge installation problem (MCEI) in a graph G = (V, E) with edge weight w (e) >= 0, e is an element of E. We are given a vertex s is an element of V designated as a sink, an edge capaci... 详细信息
来源: 评论
An Analysis of Reordering algorithms to Reduce the Computational Cost of the Jacobi-Preconditioned CG Solver Using High-Precision Arithmetic  17th
An Analysis of Reordering Algorithms to Reduce the Computati...
收藏 引用
17th International Conference on Computational Science and its Applications (ICCSA)
作者: Gonzaga de Oliveira, Sanderson L. Chagas, Guilherme Oliveira Barreto Bernardes, Junior Assis Univ Fed Lavras Lavras MG Brazil Inst Nacl Pesquisas Espaciais Sao Paulo Brazil
Several heuristics for bandwidth and profile reductions have been proposed since the 1960s. In systematic reviews, 133 heuristics applied to these problems have been found. The results of these heuristics have been an... 详细信息
来源: 评论
Shared-Memory Parallel Maximal Biclique Enumeration  26
Shared-Memory Parallel Maximal Biclique Enumeration
收藏 引用
26th International Conference on High Performance Computing, Data and Analytics (HiPCW)
作者: Das, Apurba Tirthapura, Srikanta Natl Univ Singapore Singapore Singapore Iowa State Univ Ames IA USA
We present shared memory parallel algorithms for maximal biclique enumeration (MBE), the task of enumerating all complete dense subgraphs (maximal bicliques) from a bipartite graph, which is widely used in the analysi... 详细信息
来源: 评论
A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection  5
A Node-Embedding Features Based Machine Learning Technique f...
收藏 引用
5th IEEE Conference on Dependable and Secure Computing (IEEE DSC)
作者: Rai, Sudhir Kumar Mittal, Ashish Mittal, Sparsh Indian Inst Technol IIT Roorkee Roorkee Uttar Pradesh India
As the malware menace exacerbates, dynamic malware detection (DMD) has become even more critical. In this paper, we present a machine-learning-based DMD technique. We propose generating node embedding features (NEFs) ... 详细信息
来源: 评论
Reconfiguring Directed Trees in a Digraph  27th
Reconfiguring Directed Trees in a Digraph
收藏 引用
27th International Computing and Combinatorics Conference (COCOON)
作者: Ito, Takehiro Iwamasa, Yuni Kobayashi, Yasuaki Nakahata, Yu Otachi, Yota Wasa, Kunihiro Tohoku Univ Grad Sch Informat Sci Sendai Miyagi Japan Kyoto Univ Grad Sch Informat Kyoto Japan Nagoya Univ Grad Sch Informat Nagoya Aichi Japan Toyohashi Univ Technol Dept Comp Sci & Engn Toyohashi Aichi Japan
In this paper, we investigate the computational complexity of subgraph reconfiguration problems in directed graphs. More specifically, we focus on the problem of reconfiguring directed trees in a digraph, where a dire... 详细信息
来源: 评论
Approximating the k-Splittable Capacitated Network Design Problem
Approximating the k-Splittable Capacitated Network Design Pr...
收藏 引用
39th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM)
作者: Morsy, Ehab Nanyang Technol Univ Div Math Sci Singapore 637371 Singapore Suez Canal Univ Dept Math Ismailia 22541 Egypt
We consider the k-splittable capacitated network design problem (kSCND) in a graph G = (V, E) with edge weight w(e) >= 0, e is an element of E. We are given a vertex s is an element of V designated as a sink, a cab... 详细信息
来源: 评论
EBOARST: An Efficient Edge-Based Obstacle-Avoiding Rectilinear Steiner Tree Construction algorithm
EBOARST: An Efficient Edge-Based Obstacle-Avoiding Rectiline...
收藏 引用
International Symposium on Physical Design (ISPD)
作者: Long, Jieyi Zhou, Hai Memik, Seda Ogrenci Northwestern Univ Dept Elect Engn & Comp Engn Evanston IL 60208 USA
Obstacle-avoiding Steiner routing has arisen as a fundamental problem in the physical design of modern VLSI chips. In this paper, we present EBOARST, an efficient four-step algorithm to construct a rectilinear obstacl... 详细信息
来源: 评论
Implicit Enumeration of Topological-Minor-Embeddings and Its Application to Planar Subgraph Enumeration  14th
Implicit Enumeration of Topological-Minor-Embeddings and Its...
收藏 引用
14th International Conference and Workshops on algorithms and Computation (WALCOM)
作者: Nakahata, Yu Kawahara, Jun Horiyama, Takashi Minato, Shin-ichi Kyoto Univ Kyoto Japan Hokkaido Univ Sapporo Hokkaido Japan
Given graphs G and H, we propose a method to implicitly enumerate topological-minor-embeddings of H in G using decision diagrams. We show a useful application of our method to enumerating subgraphs characterized by fo... 详细信息
来源: 评论
Fast and Scalable NUMA-based Thread Parallel Breadth-first Search  13
Fast and Scalable NUMA-based Thread Parallel Breadth-first S...
收藏 引用
International Conference on High Performance Computing and Simulation (HPCS)
作者: Yasui, Yuichiro Fujisawa, Katsuki Kyushu Univ Nishi Ku 744 Motooka Fukuoka 812 Japan JST COI Nishi Ku Fukuoka Japan JST CREST Nishi Ku Fukuoka Japan
The breadth-first search (BFS) is one of the most centric kernels in graph processing. Beamer's direction-optimizing BFS algorithm, which selects one of two traversal directions at each level, can reduce unnecessa... 详细信息
来源: 评论
CONNECTED LIAR'S DOMINATION IN graphS: COMPLEXITY AND algorithmS
收藏 引用
DISCRETE MATHEMATICS algorithmS AND APPLICATIONS 2013年 第4期5卷 1350024-1-1350024-16页
作者: Panda, B. S. Paul, S. Indian Inst Technol Delhi Dept Math Comp Sci & Applicat Grp New Delhi 110016 India
A subset L subset of V of a graph G = (V, E) is called a connected liar's dominating set of G if (i) for all v. V, |NG[v] n L| >= 2, ( ii) for every pair u, v is an element of V of distinct vertices, |(N-G[u]. ... 详细信息
来源: 评论