咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 16 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物工程
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 生物学
  • 2 篇 医学
    • 1 篇 临床医学

主题

  • 27 篇 memory complexit...
  • 5 篇 time complexity
  • 2 篇 token bucket
  • 2 篇 uniform protocol
  • 2 篇 deep learning
  • 2 篇 memory managemen...
  • 2 篇 distributed netw...
  • 2 篇 leaky bucket
  • 2 篇 mobile agents
  • 2 篇 bw management
  • 2 篇 pabx
  • 2 篇 iax2
  • 2 篇 entropy estimati...
  • 2 篇 infinitely many ...
  • 2 篇 portability
  • 2 篇 storage area net...
  • 2 篇 sip
  • 2 篇 asynchronous dis...
  • 2 篇 model
  • 2 篇 bw optimization

机构

  • 2 篇 indian stat inst...
  • 2 篇 calif state univ...
  • 2 篇 hebrew univ jeru...
  • 1 篇 chinese acad sci...
  • 1 篇 linyi university
  • 1 篇 kyushu univ dept...
  • 1 篇 ton duc thang un...
  • 1 篇 univ western aus...
  • 1 篇 indian stat inst...
  • 1 篇 katholieke univ ...
  • 1 篇 cornell univ sch...
  • 1 篇 indian inst tech...
  • 1 篇 free univ brusse...
  • 1 篇 shanghai jiao to...
  • 1 篇 epictr factory c...
  • 1 篇 institute of inf...
  • 1 篇 university of il...
  • 1 篇 qilu univ techno...
  • 1 篇 informat & infor...
  • 1 篇 jahangirnagar un...

作者

  • 3 篇 shayevitz ofer
  • 3 篇 chand prabhat ku...
  • 3 篇 ordentlich or
  • 3 篇 molla anisur rah...
  • 3 篇 berg tomer
  • 2 篇 kumar manish
  • 2 篇 englert burkhard
  • 2 篇 sivasubramaniam ...
  • 1 篇 yang anren
  • 1 篇 andreopoulos y
  • 1 篇 zou juan
  • 1 篇 guo longkun
  • 1 篇 rudi ali gholami
  • 1 篇 pal chandrajit
  • 1 篇 gu dawu
  • 1 篇 wang weina
  • 1 篇 kang xiaohan
  • 1 篇 jiao dan
  • 1 篇 xu hai yan
  • 1 篇 pattaro cristian

语言

  • 25 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Memory complexity"
27 条 记 录,以下是11-20 订阅
排序:
Energy-efficient design techniques for LUT based adaptive digital pre-distorters
收藏 引用
MICROELECTRONICS JOURNAL 2023年 141卷
作者: Baran, Dursun Sci & Technol Res Council Turkey TUBITAK Gebze Kocaeli Turkiye Informat & Informat Secur Res Ctr BILGEM TUBITAK TR-41470 Gebze Kocaeli Turkiye
Energy-efficient design techniques for an adaptive Look-Up Table (LUT) based Digital Predistortion (DPD) system are presented. The proposed methods are simplification of the adaptation function, reduction of the memor... 详细信息
来源: 评论
One-pass streaming algorithm for monotone lattice submodular maximization subject to a cardinality constraint
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2023年 第17期35卷
作者: Zhang, Zhenning Guo, Longkun Wang, Linyang Zou, Juan Beijing Univ Technol Dept Operat Res & Informat Engn Beijing Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou Peoples R China Qilu Univ Technol Sch Comp Sci Room 420 Jinan 250353 Peoples R China Qufu Normal Univ Sch Math & Sci Qufu Shandong Peoples R China
In the article, we devise streaming algorithms for maximization of a monotone submodular function subject to a cardinality constraint on the integer lattice. Based on the observation that lattice submodularity is not ... 详细信息
来源: 评论
Efficient and lightweight group rekeying protocol for communicating things
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2021年 91卷 107021-107021页
作者: Lakhlef, Hicham Bouabdallah, Abdelmadjid Sorbonne Univ Univ Technol Compiegne CNRS CS 60319 F-60203 Compiegne France
Recent advances in emerging technologies have given birth to a new type of networks called Internet of Things (IoT). The emergence of IoT has led practitioners to envision networking a large number of sensors for even... 详细信息
来源: 评论
Succinct enumeration of distant vertex pairs
收藏 引用
DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS 2019年 第6期11卷
作者: Rudi, Ali Gholami Babol Noshirvani Univ Technol Dept Elect & Comp Engn Babol Sar Iran
The fastest known algorithms for finding the exact value of the diameter of general graphs are no faster than the algorithms that compute all-pairs shortest paths. An extension of the problem of computing graph diamet... 详细信息
来源: 评论
Quickstop: A Markov optimal stopping approach for quickest misinformation detection
Quickstop: A Markov optimal stopping approach for quickest m...
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing Systems
作者: Honghao, W.E.I. Kang, Xiaohan Wang, Weina Ying, Lei Arizona State University TempeAZ85287 United States University of Illinois at Urbana-Champaign Urbana Illinois61820 United States Carnegie Mellon University PittsburghPA15213 United States
This paper combines data-driven and model-driven methods for real-time misinformation detection. Our algorithm, named QuickStop, is an optimal stopping algorithm based on a probabilistic information spreading model ob... 详细信息
来源: 评论
Time and space optimality of rotor-router graph exploration
收藏 引用
INFORMATION PROCESSING LETTERS 2017年 第Nov.期127卷 17-20页
作者: Menc, Artur Pajak, Dominik Uznanski, Przemyslaw Wroclaw Univ Technol Fac Fundamental Problems Technol Wroclaw Poland Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland
We consider the problem of exploration of an anonymous, port-labeled, undirected graph with n nodes, m edges and diameter D, by a single mobile agent. Initially the agent does not know the graph topology nor any of th... 详细信息
来源: 评论
Improved impossible differential attack on reduced version of Camellia with FL/FL-1 functions
收藏 引用
IET INFORMATION SECURITY 2016年 第6期10卷 425-432页
作者: Liu, Ya Yang, Anren Liu, Zhiqiang Li, Wei Wang, Qingju Song, Liang Gu, Dawu Univ Shanghai Sci & Technol Dept Comp Sci & Engn Shanghai 200093 Peoples R China Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China Donghua Univ Sch Comp Sci & Technol Shanghai 201620 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Shanghai Key Lab Integrate Adm Technol Informat S Shanghai 200240 Peoples R China Katholieke Univ Leuven ESAT COSIC B-3001 Leuven Belgium Katholieke Univ Leuven iMinds B-3001 Leuven Belgium
As an ISO/IEC international standard, Camellia has been used in various cryptographic applications. In this study, the authors present the best currently known attacks on Camellia-192/256 with key-dependent layers FL/... 详细信息
来源: 评论
A memory complexity Model for Circular Sentences
A Memory Complexity Model for Circular Sentences
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean Engineering(CICC-ITOE 2011)
作者: XU Hai yan LinYi University
The memory system has become a key factor to get high performance, especially for those numerical programs. Along with the increasing gap between processors and memories, the traditional calculation complexity analysi... 详细信息
来源: 评论
Performance Evaluation of a Portable PABX System Through Developing New Bandwidth Optimization Technique  2
Performance Evaluation of a Portable PABX System Through Dev...
收藏 引用
2nd International Conference on Electrical Engineering and Information and Communication Technology (ICEEICT)
作者: Rahman, Md Torikur Mahi, Md Julkar Nayeen Biswas, Milon Kaiser, M. Shamim Al Mamun, Shamim Jahangirnagar Univ Inst Informat Technol Dhaka Bangladesh
Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is al... 详细信息
来源: 评论
Efficient haplotype block recognition of very long and dense genetic sequences
收藏 引用
BMC BIOINFORMATICS 2014年 第1期15卷 1-18页
作者: Taliun, Daniel Gamper, Johann Pattaro, Cristian European Acad Bolzano Bozen EURAC Biomed Ctr Bozen Bolzano Italy Free Univ Bozen Bolzano Bozen Bolzano Italy
Background: The new sequencing technologies enable to scan very long and dense genetic sequences, obtaining datasets of genetic markers that are an order of magnitude larger than previously available. Such genetic seq... 详细信息
来源: 评论