咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 15 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 5 篇 理学
    • 4 篇 数学
    • 1 篇 生物学
  • 2 篇 医学
    • 1 篇 临床医学

主题

  • 26 篇 memory complexit...
  • 5 篇 time complexity
  • 2 篇 token bucket
  • 2 篇 uniform protocol
  • 2 篇 deep learning
  • 2 篇 distributed netw...
  • 2 篇 leaky bucket
  • 2 篇 mobile agents
  • 2 篇 bw management
  • 2 篇 pabx
  • 2 篇 iax2
  • 2 篇 infinitely many ...
  • 2 篇 portability
  • 2 篇 storage area net...
  • 2 篇 sip
  • 2 篇 asynchronous dis...
  • 2 篇 model
  • 2 篇 bw optimization
  • 2 篇 traffic engineer...
  • 2 篇 shared memory

机构

  • 2 篇 indian stat inst...
  • 2 篇 calif state univ...
  • 1 篇 chinese acad sci...
  • 1 篇 linyi university
  • 1 篇 kyushu univ dept...
  • 1 篇 ton duc thang un...
  • 1 篇 univ western aus...
  • 1 篇 indian stat inst...
  • 1 篇 katholieke univ ...
  • 1 篇 cornell univ sch...
  • 1 篇 indian inst tech...
  • 1 篇 free univ brusse...
  • 1 篇 shanghai jiao to...
  • 1 篇 epictr factory c...
  • 1 篇 institute of inf...
  • 1 篇 university of il...
  • 1 篇 qilu univ techno...
  • 1 篇 informat & infor...
  • 1 篇 jahangirnagar un...
  • 1 篇 indian inst tech...

作者

  • 3 篇 chand prabhat ku...
  • 3 篇 molla anisur rah...
  • 2 篇 kumar manish
  • 2 篇 shayevitz ofer
  • 2 篇 englert burkhard
  • 2 篇 ordentlich or
  • 2 篇 sivasubramaniam ...
  • 2 篇 berg tomer
  • 1 篇 yang anren
  • 1 篇 andreopoulos y
  • 1 篇 zou juan
  • 1 篇 guo longkun
  • 1 篇 rudi ali gholami
  • 1 篇 pal chandrajit
  • 1 篇 gu dawu
  • 1 篇 wang weina
  • 1 篇 kang xiaohan
  • 1 篇 jiao dan
  • 1 篇 xu hai yan
  • 1 篇 pattaro cristian

语言

  • 24 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Memory complexity"
26 条 记 录,以下是1-10 订阅
排序:
On The memory complexity of Uniformity Testing  35
On The Memory Complexity of Uniformity Testing
收藏 引用
35th Conference on Learning Theory (COLT)
作者: Berg, Tomer Ordentlich, Or Shayevitz, Ofer Tel Aviv Univ Sch Elect Engn Tel Aviv Israel Hebrew Univ Jerusalem Sch Comp Sci & Engn Jerusalem Israel
In this paper we consider the problem of uniformity testing with limited memory. We observe a sequence of independent identically distributed random variables drawn from a distribution p over [n], which is either unif... 详细信息
来源: 评论
A memory complexity Model for Circular Sentences
A Memory Complexity Model for Circular Sentences
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean Engineering(CICC-ITOE 2011)
作者: XU Hai yan LinYi University
The memory system has become a key factor to get high performance, especially for those numerical programs. Along with the increasing gap between processors and memories, the traditional calculation complexity analysi... 详细信息
来源: 评论
Improved impossible differential attack on reduced version of Camellia with FL/FL-1 functions
收藏 引用
IET INFORMATION SECURITY 2016年 第6期10卷 425-432页
作者: Liu, Ya Yang, Anren Liu, Zhiqiang Li, Wei Wang, Qingju Song, Liang Gu, Dawu Univ Shanghai Sci & Technol Dept Comp Sci & Engn Shanghai 200093 Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China Donghua Univ Sch Comp Sci & Technol Shanghai 201620 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Shanghai Key Lab Integrate Adm Technol Informat S Shanghai 200240 Peoples R China Katholieke Univ Leuven ESAT COSIC B-3001 Leuven Belgium Katholieke Univ Leuven iMinds B-3001 Leuven Belgium
As an ISO/IEC international standard, Camellia has been used in various cryptographic applications. In this study, the authors present the best currently known attacks on Camellia-192/256 with key-dependent layers FL/... 详细信息
来源: 评论
On the cost of uniform protocols whose memory consumption is adaptive to interval contention
收藏 引用
THEORETICAL COMPUTER SCIENCE 2009年 第6-7期410卷 533-545页
作者: Englert, Burkhard Calif State Univ Long Beach Dept Comp Engr & Comp Sci Long Beach CA 90840 USA
Recently, we introduced a novel term, memory-adaptive. whose goal it is to capture what it means for a distributed protocol to most efficiently make use of its shared memory. We proved three results that relate to the... 详细信息
来源: 评论
memory-Constrained No-Regret Learning in Adversarial Multi-Armed Bandits
收藏 引用
IEEE TRANSACTIONS ON SIGNAL PROCESSING 2021年 69卷 2371-2382页
作者: Xu, Xiao Zhao, Qing Cornell Univ Sch Elect & Comp Engn Ithaca NY 14850 USA
An adversarial multi-armed bandit problem with memory constraints is studied where the memory for storing arm statistics is only in a sublinear order of the number of arms. A hierarchical learning framework that offer... 详细信息
来源: 评论
Efficient haplotype block recognition of very long and dense genetic sequences
收藏 引用
BMC BIOINFORMATICS 2014年 第1期15卷 1-18页
作者: Taliun, Daniel Gamper, Johann Pattaro, Cristian European Acad Bolzano Bozen EURAC Biomed Ctr Bozen Bolzano Italy Free Univ Bozen Bolzano Bozen Bolzano Italy
Background: The new sequencing technologies enable to scan very long and dense genetic sequences, obtaining datasets of genetic markers that are an order of magnitude larger than previously available. Such genetic seq... 详细信息
来源: 评论
Time and space optimality of rotor-router graph exploration
收藏 引用
INFORMATION PROCESSING LETTERS 2017年 第Nov.期127卷 17-20页
作者: Menc, Artur Pajak, Dominik Uznanski, Przemyslaw Wroclaw Univ Technol Fac Fundamental Problems Technol Wroclaw Poland Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland
We consider the problem of exploration of an anonymous, port-labeled, undirected graph with n nodes, m edges and diameter D, by a single mobile agent. Initially the agent does not know the graph topology nor any of th... 详细信息
来源: 评论
An empirical estimation for time and memory algorithm complexities: newly developed R package
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第2期80卷 2997-3015页
作者: Agenis-Nevers, Marc Bokde, Neeraj Dhanraj Yaseen, Zaher Mundher Shende, Mayur Kishor Epictr Factory Clermont Ferrand France Aarhus Univ Dept Engn Renewable Energy & Thermodynam Aarhus Denmark Ton Duc Thang Univ Sustainable Dev Civil Engn Res Grp Fac Civil Engn Ho Chi Minh City Vietnam Govt Coll Engn Nagpur Maharashtra India
When an algorithm or a program runs on a computer, it requires some resources. The complexity of an algorithm is the measure of the resources, for some input. These complexities are usually space and time. The subject... 详细信息
来源: 评论
Statistical Inference With Limited memory: A Survey
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY 2024年 5卷 623-644页
作者: Berg, Tomer Ordentlich, Or Shayevitz, Ofer Tel Aviv Univ Dept Elect Engn Syst IL-6997801 Tel Aviv Israel Hebrew Univ Jerusalem Sch Comp Sci & Engn IL-91904 Jerusalem Israel
The problem of statistical inference in its various forms has been the subject of decades-long extensive research. Most of the effort has been focused on characterizing the behavior as a function of the number of avai... 详细信息
来源: 评论
Showcasing straight-line programs with memory via matrix Bruhat decomposition
收藏 引用
INTERNATIONAL JOURNAL OF ALGEBRA AND COMPUTATION 2024年 第7期34卷 1059-1090页
作者: Niemeyer, Alice C. Popiel, Tomasz Praeger, Cheryl E. Rademacher, Daniel Rhein Westfal TH Aachen Chair Algebra & Representat Theory Pontdriesch 10-16 D-52062 Aachen Germany Monash Univ Sch Math 9 Rainforest Walk Clayton Vic 3800 Australia Univ Western Australia Ctr Math Symmetry & Computat 35 Stirling Highway Crawley WA 6009 Australia
We suggest that straight-line programs designed for algebraic computations should be accompanied by a comprehensive complexity analysis that takes into account both the number of fundamental algebraic operations neede... 详细信息
来源: 评论