咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 8 篇 电气工程
    • 8 篇 计算机科学与技术...
    • 4 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 软件工程
  • 14 篇 理学
    • 11 篇 数学
    • 2 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 28 篇 linear algorithm...
  • 3 篇 identification
  • 2 篇 pseudorandomness
  • 2 篇 additive complex...
  • 2 篇 linear unmixing
  • 2 篇 hyperspectral da...
  • 2 篇 resource allocat...
  • 2 篇 remote sensing
  • 2 篇 robustness
  • 1 篇 modular decompos...
  • 1 篇 networked contro...
  • 1 篇 colouring
  • 1 篇 intrusion detect...
  • 1 篇 least distance h...
  • 1 篇 permutation grap...
  • 1 篇 measurement erro...
  • 1 篇 np-hard problems
  • 1 篇 parallel process...
  • 1 篇 algebraic approa...
  • 1 篇 complex systems

机构

  • 2 篇 montclair state ...
  • 1 篇 london sch econ ...
  • 1 篇 lulea univ techn...
  • 1 篇 zhejiang univ in...
  • 1 篇 liafa - cnrs uni...
  • 1 篇 univ primorska f...
  • 1 篇 d'amiens 800oo a...
  • 1 篇 energy syst inst...
  • 1 篇 odense univ dept...
  • 1 篇 appalachian stat...
  • 1 篇 j.l. kellogg gra...
  • 1 篇 clemson univ dep...
  • 1 篇 univ nis fac ele...
  • 1 篇 moe engn res ctr...
  • 1 篇 univ patras dept...
  • 1 篇 la.r.i.a. 5 rue ...
  • 1 篇 open univ milton...
  • 1 篇 univ complutense...
  • 1 篇 sorbonne univ cn...
  • 1 篇 stmicroelectroni...

作者

  • 2 篇 kaminski michael
  • 2 篇 robila stefan a.
  • 2 篇 shparlinski igor...
  • 2 篇 maciak lukasz g.
  • 1 篇 pedraza luis f.
  • 1 篇 shwartz a
  • 1 篇 laskar r
  • 1 篇 korkina elena
  • 1 篇 p.m. mäkilä
  • 1 篇 cancilla john c.
  • 1 篇 jamison b
  • 1 篇 zhang ruiming
  • 1 篇 shi z
  • 1 篇 spirakis paul g.
  • 1 篇 corneil dg
  • 1 篇 buchinsky evgeny
  • 1 篇 izquierdo manuel
  • 1 篇 oliensis j
  • 1 篇 mcrae a
  • 1 篇 rodriguez-colina...

语言

  • 25 篇 英文
  • 3 篇 其他
检索条件"主题词=Linear algorithms"
28 条 记 录,以下是21-30 订阅
排序:
ABSTRACT STOCHASTIC APPROXIMATIONS AND APPLICATIONS
收藏 引用
STOCHASTIC PROCESSES AND THEIR APPLICATIONS 1989年 第1期31卷 133-149页
作者: SHWARTZ, A BERMAN, N BEN GURION UNIV NEGEV DEPT MECH ENGNIL-84105 BEERSHEBAISRAEL
Results on the convergence with probability one of stochastic approximation algorithms of the form θ n+1 = θ n − γ n+1 h(θ n ) + u n+1 are given, where the θ's belong to some Banach space and { u n } is a sto... 详细信息
来源: 评论
Convex-round and concave-round graphs
收藏 引用
SIAM JOURNAL ON DISCRETE MATHEMATICS 2000年 第2期13卷 179-193页
作者: Bang-Jensen, J Huang, J Yeo, A Odense Univ Dept Math & Comp Sci DK-5230 Odense Denmark Univ Victoria Dept Math & Stat Victoria BC V8W 3P4 Canada Univ Aarhus Dept Comp Sci Brics DK-8000 Aarhus C Denmark
We introduce two new classes of graphs which we call convex-round, respectively concave-round graphs. Convex-round (concave-round) graphs are those graphs whose vertices can be circularly enumerated so that the (close... 详细信息
来源: 评论
Finiteness theorems for graphs and posets obtained by compositions
收藏 引用
ORDER-A JOURNAL ON THE THEORY OF ORDERED SETS AND ITS APPLICATIONS 1998年 第3期15卷 203-220页
作者: Gustedt, J Tech Univ Berlin D-10623 Berlin Germany
We investigate classes of graphs and posets that admit decompositions to obtain or disprove finiteness results for obstruction sets. To do so we develop a theory of minimal infinite antichains that allows us to charac... 详细信息
来源: 评论
Flexible image processing in Embedded Systems using Multi-agents Systems
收藏 引用
IFAC-PapersOnLine 2016年 第25期49卷 164-169页
作者: Inguère, Tifaine Carlier, Florent Renault, Valérie CREN University of Maine Le Mans France STMicroelectronics Le Mans France
Efficient Image processing can lead to complex algorithms. In Embedded context resources are limited and the approach of linear algorithm does not allow to decrease complexity regarding the variations of these resourc... 详细信息
来源: 评论
Analysis of linear Methods for Robust Identification in ℓ 1
收藏 引用
IFAC Proceedings Volumes 1994年 第8期27卷 389-394页
作者: J.R. Partington P.M. Mäkilä School of Mathematics University of Leeds Leeds LS2 9JT UK Division of Automatic Control Luled University of Technology S-971 87 Lulcå SWEDEN
Worst-case analysis of system identification by means of the linear algorithms such as least squares is considered. Estimates for worst-case and average errors are provided, showing that worst-case robust convergence ... 详细信息
来源: 评论
Performance Comparison of Cloudlet Scheduling Policies  1
Performance Comparison of Cloudlet Scheduling Policies
收藏 引用
1st International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS)
作者: Geetha, V. Devi, R. Aruna Ilavenil, T. Begum, S. Marjana Revathi, S. Pondicherry Engn Coll Dept Informat Technol Pondicherry India
Cloud computing is widely accepted as the best computing and storage model for low cost and high resource utilization. User requests from public can be run in data centers of large datacenters whey they are idle. This... 详细信息
来源: 评论
Sequential and parallel feature extraction in hyperspectral data using Nonnegative Matrix Factorization
Sequential and parallel feature extraction in hyperspectral ...
收藏 引用
3rd Annual IEEE Long Island Systems, Applications and Technology Conference
作者: Robila, Stefan A. Maciak, Lukasz G. Montclair State Univ Dept Comp Sci Montclair NJ 07043 USA
Feature extraction refers to the groups of techniques that, when applied to large dimensional and redundant data result in significant dimensionality reduction while preserving or even enhancing the information conten... 详细信息
来源: 评论
Optimal algorithms for detecting network stability  1
收藏 引用
2nd International Workshop on algorithms and Computation
作者: Koukopoulos, Dimitrios Nikolopoulos, Stavros D. Palios, Leonidas Spirakis, Paul G. Univ Ioannina Dept Cultural Heritage Management & New Technol GR-30100 Agrinion Greece Univ Ioannina Dept Comp Sci GR-45110 Ioannina Greece Univ Patras Dept Comp Engn & Informat GR-26500 Patras Greece Univ Patras RACTI GR-26500 Patras Greece
A packet-switched network is universally stable if, for any greedy protocol and any adversary of injection rate less than 1, the number of packets in the network remains bounded at all times. A natural question that a... 详细信息
来源: 评论