咨询与建议

限定检索结果

文献类型

  • 19 篇 期刊文献
  • 11 篇 会议
  • 2 篇 学位论文
  • 1 篇 资讯

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 25 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 生物医学工程(可授...
    • 1 篇 控制科学与工程
    • 1 篇 船舶与海洋工程
  • 3 篇 理学
    • 1 篇 海洋科学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学

主题

  • 33 篇 graph-based algo...
  • 4 篇 recommender syst...
  • 2 篇 depth-first sear...
  • 2 篇 multiple constan...
  • 2 篇 overlapping clus...
  • 2 篇 model based test...
  • 2 篇 semi-supervised ...
  • 2 篇 data mining
  • 2 篇 finite state mac...
  • 2 篇 gate-level area ...
  • 2 篇 software testing
  • 2 篇 breadth-first se...
  • 2 篇 multiple constan...
  • 2 篇 0-1 integer line...
  • 2 篇 finite impulse r...
  • 1 篇 covid-19
  • 1 篇 parallel algorit...
  • 1 篇 meta path-based ...
  • 1 篇 variational infe...
  • 1 篇 computational st...

机构

  • 3 篇 univ aegean samo...
  • 2 篇 free univ bozen ...
  • 2 篇 univ catolica pe...
  • 2 篇 inesc id lisbon
  • 2 篇 univ tecn lisboa...
  • 2 篇 istanbul tech un...
  • 2 篇 univ tecn lisboa...
  • 1 篇 univ costa rica ...
  • 1 篇 intesa sanpaolo ...
  • 1 篇 iowa state univ ...
  • 1 篇 tech univ munich...
  • 1 篇 natl inst astrop...
  • 1 篇 peking univ peop...
  • 1 篇 int hellen univ ...
  • 1 篇 aarhus univ bioi...
  • 1 篇 xiangtan univ hu...
  • 1 篇 inst nacl astrof...
  • 1 篇 univ technol syd...
  • 1 篇 adv technol appl...
  • 1 篇 univ fed sao pau...

作者

  • 5 篇 aksoy levent
  • 4 篇 flores paulo
  • 3 篇 symeonidis panag...
  • 2 篇 monteiro jose
  • 2 篇 carrasco-ochoa j...
  • 2 篇 perez-suarez air...
  • 2 篇 zanker markus
  • 2 篇 mariano matheus ...
  • 2 篇 costa eduardo
  • 2 篇 medina-pagola jo...
  • 2 篇 gunes ece olcay
  • 1 篇 roikjer tobias
  • 1 篇 fco martinez-tri...
  • 1 篇 martinez alexand...
  • 1 篇 fernandez-tobias...
  • 1 篇 corns steven
  • 1 篇 cantador ivan
  • 1 篇 endo andre takes...
  • 1 篇 yu jeffrey xu
  • 1 篇 yu zuguo

语言

  • 33 篇 英文
检索条件"主题词=Graph-based algorithms"
33 条 记 录,以下是21-30 订阅
排序:
Finding the optimal tradeoff between area and delay in multiple constant multiplications
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2011年 第8期35卷 729-741页
作者: Aksoy, Levent Costa, Eduardo Flores, Paulo Monteiro, Jose INESC ID Lisbon Portugal Univ Catolica Pelotas Pelotas Brazil Univ Tecn Lisboa INESC ID IST Lisbon Portugal
Over the years many efficient algorithms for the multiplierless design of multiple constant multiplications (MCMs) have been introduced. These algorithms primarily focus on finding the fewest number of addition/subtra... 详细信息
来源: 评论
Treatment Recommendations for COVID-19 Patients along with Robust Explanations  34
Treatment Recommendations for COVID-19 Patients along with R...
收藏 引用
34th IEEE International Symposium on Computer-based Medical Systems (IEEE CBMS)
作者: Symeonidis, Panagiotis Andras, Christos Zanker, Markus Univ Aegean Samos Greece Int Hellen Univ Thessaloniki Greece Free Univ Bozen Bolzano Bolzano Italy
The global response to the pandemic introduced by COVID-19 is unprecedented. Scientists develop methods, which analyze data to identify an effective treatment that uncovers possible responses to the SARS-COV-2 virus. ... 详细信息
来源: 评论
Web Services for Guiding Persons with Locomotor Impairments in Public Spaces  26
Web Services for Guiding Persons with Locomotor Impairments ...
收藏 引用
26th International Conference on System Theory, Control and Computing (ICSTCC)
作者: Damian, Ioan Lacatusu, Marian Lacatusu, Florin Ionita, Anca Daniela Univ Politehn Bucuresti Automat & Ind Informat Dept Bucharest Romania
The navigation of pedestrians to a certain destination poses a challenge for large or unknown public spaces, even for those with very good wayfinding designs. This is amplified when people having locomotory impairment... 详细信息
来源: 评论
Vulnerability Assessment Methods - A Review
Vulnerability Assessment Methods - A Review
收藏 引用
4th International Conference on Network Security and Applications (CNSA 2011)
作者: Nath, Hiran V. Amrita Sch Engn Coimbatore TIFAC CORE Cyber Secur Ctr Coimbatore Tamil Nadu India
This paper reviews the major contributions in the field of Vulnerability Assessment from 1990 onwards. Even well administered networks are vulnerable to attack. Vulnerabilities are weaknesses in the requirements, desi... 详细信息
来源: 评论
Distributed-Memory algorithms for Maximal Cardinality Matching using Matrix Algebra
Distributed-Memory Algorithms for Maximal Cardinality Matchi...
收藏 引用
IEEE International Conference on Cluster Computing (CLUSTER)
作者: Azad, Ariful Buluc, Aydin Lawrence Berkeley Natl Lab Computat Res Div Berkeley CA 94720 USA
We design and implement distributed-memory parallel algorithms for computing maximal cardinality matching in a bipartite graph. Relying on matrix algebra building blocks, our algorithms expose a higher degree of paral... 详细信息
来源: 评论
Similarity Search, Recommendation and Explainability over graphs in Different Domains: Social Media, News, and Health Industry  21st
Similarity Search, Recommendation and Explainability over Gr...
收藏 引用
21st International Conference on Web Engineering (ICWE)
作者: Symeonidis, Panagiotis Univ Aegean Samos Greece
In this tutorial, we provide a rich blend of theory and practice regarding graph algorithms, to deal with challenging issues such as scalability, data noise, and sparsity in recommender systems. We also demonstrate re... 详细信息
来源: 评论
Recommending What Drug to Prescribe Next for Accurate and Explainable Medical Decisions  34
Recommending What Drug to Prescribe Next for Accurate and Ex...
收藏 引用
34th IEEE International Symposium on Computer-based Medical Systems (IEEE CBMS)
作者: Symeonidis, Panagiotis Chairistanidis, Stergios Zanker, Markus Univ Aegean Samos Greece Aristotle Univ Thessaloniki Thessaloniki Greece Free Univ Bozen Bolzano Bolzano Italy
Patients with complex diseases (i.e., cancer, diabetes, etc.) often follow a therapeutic that consists of multiple drugs, focusing at different human targets such as genes, proteins, etc. There is already related work... 详细信息
来源: 评论
Analysis of label noise in graph-based semi-supervised learning  20
Analysis of label noise in graph-based semi-supervised learn...
收藏 引用
35th Annual ACM Symposium on Applied Computing (SAC)
作者: de Aquino Afonso, Bruno Klaus Berton, Lilian Univ Fed Sao Paulo Sao Jose Dos Campos Brazil
In machine learning, one must acquire labels to help supervise a model that will be able to generalize to unseen data. However, the labeling process can be tedious, long, costly, and error-prone. It is often the case ... 详细信息
来源: 评论
Keyphrase Extraction Using Knowledge graphs
收藏 引用
DATA SCIENCE AND ENGINEERING 2017年 第4期2卷 275-288页
作者: Shi, Wei Zheng, Weiguo Yu, Jeffrey Xu Cheng, Hong Zou, Lei Chinese Univ Hong Kong Shatin Hong Kong Peoples R China Peking Univ Beijing Peoples R China
Extracting keyphrases from documents automatically is an important and interesting task since keyphrases provide a quick summarization for documents. Although lots of efforts have been made on keyphrase extraction, mo... 详细信息
来源: 评论
Search algorithms for the multiple constant multiplications problem: Exact and approximate
Search algorithms for the multiple constant multiplications ...
收藏 引用
26th Norchip Conference
作者: Aksoy, Levent Gunes, Ece Olcay Flores, Paulo Istanbul Tech Univ Dept Elect & Commun Engn TR-34469 Istanbul Turkey Univ Tecn Lisboa INESC ID IST P-1000029 Lisbon Portugal
This article addresses the multiplication of one data sample with multiple constants using addition/subtraction and shift operations, i.e., the multiple constant multiplications (MCM) operation. In the last two decade... 详细信息
来源: 评论