咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 16 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 生物学
  • 2 篇 医学
    • 1 篇 临床医学

主题

  • 27 篇 memory complexit...
  • 5 篇 time complexity
  • 2 篇 token bucket
  • 2 篇 uniform protocol
  • 2 篇 deep learning
  • 2 篇 memory managemen...
  • 2 篇 distributed netw...
  • 2 篇 leaky bucket
  • 2 篇 mobile agents
  • 2 篇 bw management
  • 2 篇 pabx
  • 2 篇 iax2
  • 2 篇 entropy estimati...
  • 2 篇 infinitely many ...
  • 2 篇 portability
  • 2 篇 storage area net...
  • 2 篇 sip
  • 2 篇 asynchronous dis...
  • 2 篇 model
  • 2 篇 bw optimization

机构

  • 2 篇 indian stat inst...
  • 2 篇 calif state univ...
  • 2 篇 hebrew univ jeru...
  • 1 篇 chinese acad sci...
  • 1 篇 linyi university
  • 1 篇 kyushu univ dept...
  • 1 篇 ton duc thang un...
  • 1 篇 univ western aus...
  • 1 篇 indian stat inst...
  • 1 篇 katholieke univ ...
  • 1 篇 cornell univ sch...
  • 1 篇 indian inst tech...
  • 1 篇 free univ brusse...
  • 1 篇 shanghai jiao to...
  • 1 篇 epictr factory c...
  • 1 篇 institute of inf...
  • 1 篇 university of il...
  • 1 篇 qilu univ techno...
  • 1 篇 informat & infor...
  • 1 篇 jahangirnagar un...

作者

  • 3 篇 shayevitz ofer
  • 3 篇 chand prabhat ku...
  • 3 篇 ordentlich or
  • 3 篇 molla anisur rah...
  • 3 篇 berg tomer
  • 2 篇 kumar manish
  • 2 篇 englert burkhard
  • 2 篇 sivasubramaniam ...
  • 1 篇 yang anren
  • 1 篇 andreopoulos y
  • 1 篇 zou juan
  • 1 篇 guo longkun
  • 1 篇 rudi ali gholami
  • 1 篇 pal chandrajit
  • 1 篇 gu dawu
  • 1 篇 wang weina
  • 1 篇 kang xiaohan
  • 1 篇 jiao dan
  • 1 篇 xu hai yan
  • 1 篇 pattaro cristian

语言

  • 25 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Memory complexity"
27 条 记 录,以下是1-10 订阅
排序:
memory complexity of Estimating Entropy and Mutual Information
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2025年 第5期71卷 3334-3349页
作者: Berg, Tomer Ordentlich, Or Shayevitz, Ofer Tel Aviv Univ Dept Elect Engn Syst IL-69978 Tel Aviv Israel Hebrew Univ Jerusalem Sch Comp Sci & Engn IL-91904 Jerusalem Israel
We observe an infinite sequence of independent identically distributed random variables X-1, X-2,& mldr;drawn from an unknown distribution p over [n] , and our goal is to estimate the entropy H(p) = -E[logp(X)] wi... 详细信息
来源: 评论
On The memory complexity of Uniformity Testing  35
On The Memory Complexity of Uniformity Testing
收藏 引用
35th Conference on Learning Theory (COLT)
作者: Berg, Tomer Ordentlich, Or Shayevitz, Ofer Tel Aviv Univ Sch Elect Engn Tel Aviv Israel Hebrew Univ Jerusalem Sch Comp Sci & Engn Jerusalem Israel
In this paper we consider the problem of uniformity testing with limited memory. We observe a sequence of independent identically distributed random variables drawn from a distribution p over [n], which is either unif... 详细信息
来源: 评论
Statistical Inference With Limited memory: A Survey
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY
收藏 引用
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY 2024年 5卷 623-644页
作者: Berg, Tomer Ordentlich, Or Shayevitz, Ofer Tel Aviv Univ Dept Elect Engn Syst IL-6997801 Tel Aviv Israel Hebrew Univ Jerusalem Sch Comp Sci & Engn IL-91904 Jerusalem Israel
The problem of statistical inference in its various forms has been the subject of decades-long extensive research. Most of the effort has been focused on characterizing the behavior as a function of the number of avai... 详细信息
来源: 评论
Showcasing straight-line programs with memory via matrix Bruhat decomposition
收藏 引用
INTERNATIONAL JOURNAL OF ALGEBRA AND COMPUTATION 2024年 第7期34卷 1059-1090页
作者: Niemeyer, Alice C. Popiel, Tomasz Praeger, Cheryl E. Rademacher, Daniel Rhein Westfal TH Aachen Chair Algebra & Representat Theory Pontdriesch 10-16 D-52062 Aachen Germany Monash Univ Sch Math 9 Rainforest Walk Clayton Vic 3800 Australia Univ Western Australia Ctr Math Symmetry & Computat 35 Stirling Highway Crawley WA 6009 Australia
We suggest that straight-line programs designed for algebraic computations should be accompanied by a comprehensive complexity analysis that takes into account both the number of fundamental algebraic operations neede... 详细信息
来源: 评论
Agent-Driven BFS Tree in Anonymous Graphs with Applications  1
收藏 引用
12th International Conference on Networked Systems (NETYS)
作者: Chand, Prabhat Kumar Kumar, Manish Molla, Anisur Rahaman Indian Stat Inst Kolkata Baranagar India Indian Inst Technol Chennai India
Breadth-First-Search (BFS) trees serve a pivotal role in designing efficient graph algorithms due to their efficacy in traversing and exploring graph structures with a systematic layer-by-layer approach. This paper in... 详细信息
来源: 评论
Run for Cover: Dominating Set via Mobile Agents  1
收藏 引用
19th International Symposium on Algorithmics of Wireless Networks (ALGOWIN) as part of ALGO Conference
作者: Chand, Prabhat Kumar Molla, Anisur Rahaman Sivasubramaniam, Sumathi Indian Stat Inst Kolkata India
Research involving computing with mobile agents is a fast-growing field, given the advancement of technology in automated systems, e.g., robots, drones, self-driving cars, etc. Therefore, it is pressing to focus on so... 详细信息
来源: 评论
Fault-Tolerant Dispersion of Mobile Robots  9th
Fault-Tolerant Dispersion of Mobile Robots
收藏 引用
9th International Conference on Algorithms and Discrete Applied Mathematics (CALDAM)
作者: Chand, Prabhat Kumar Kumar, Manish Molla, Anisur Rahaman Sivasubramaniam, Sumathi Indian Stat Inst Kolkata India
We consider the mobile robot dispersion problem in the presence of faulty robots (crash-fault). Mobile robot dispersion consists of k <= n robots in an n-node anonymous graph. The goal is to ensure that regardless ... 详细信息
来源: 评论
Clustered Network Adaptation Methodology for the Resource Constrained Platform  20
Clustered Network Adaptation Methodology for the Resource Co...
收藏 引用
20th IEEE Interregional NEWCAS Conference (IEEE NEWCAS)
作者: Verma, Pratibha Sasmal, Pradip Pal, Chandrajit Channappayya, Sumohana Acharyya, Amit Indian Inst Technol Dept Elect Engn Hyderabad India
Recently, deep neural networks (DNNs) are widely used for many artificial intelligence (AI) applications, including robotics, self driving vehicles etc. Although DNNs deliver state-of-the-art accuracy on many AI tasks... 详细信息
来源: 评论
memory-Constrained No-Regret Learning in Adversarial Multi-Armed Bandits
收藏 引用
IEEE TRANSACTIONS ON SIGNAL PROCESSING 2021年 69卷 2371-2382页
作者: Xu, Xiao Zhao, Qing Cornell Univ Sch Elect & Comp Engn Ithaca NY 14850 USA
An adversarial multi-armed bandit problem with memory constraints is studied where the memory for storing arm statistics is only in a sublinear order of the number of arms. A hierarchical learning framework that offer... 详细信息
来源: 评论
An empirical estimation for time and memory algorithm complexities: newly developed R package
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第2期80卷 2997-3015页
作者: Agenis-Nevers, Marc Bokde, Neeraj Dhanraj Yaseen, Zaher Mundher Shende, Mayur Kishor Epictr Factory Clermont Ferrand France Aarhus Univ Dept Engn Renewable Energy & Thermodynam Aarhus Denmark Ton Duc Thang Univ Sustainable Dev Civil Engn Res Grp Fac Civil Engn Ho Chi Minh City Vietnam Govt Coll Engn Nagpur Maharashtra India
When an algorithm or a program runs on a computer, it requires some resources. The complexity of an algorithm is the measure of the resources, for some input. These complexities are usually space and time. The subject... 详细信息
来源: 评论