咨询与建议

限定检索结果

文献类型

  • 14,525 篇 会议
  • 1,359 篇 期刊文献
  • 2 篇 资讯
  • 1 篇 学位论文

馆藏范围

  • 15,887 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,749 篇 工学
    • 1,985 篇 计算机科学与技术...
    • 1,815 篇 电气工程
    • 735 篇 信息与通信工程
    • 561 篇 控制科学与工程
    • 552 篇 软件工程
    • 286 篇 机械工程
    • 233 篇 仪器科学与技术
    • 232 篇 电子科学与技术(可...
    • 47 篇 测绘科学与技术
    • 39 篇 交通运输工程
    • 31 篇 网络空间安全
    • 28 篇 航空宇航科学与技...
    • 16 篇 生物医学工程(可授...
    • 15 篇 材料科学与工程(可...
    • 15 篇 矿业工程
    • 12 篇 土木工程
    • 12 篇 石油与天然气工程
    • 9 篇 动力工程及工程热...
  • 373 篇 管理学
    • 369 篇 管理科学与工程(可...
  • 312 篇 理学
    • 131 篇 系统科学
    • 76 篇 数学
    • 53 篇 物理学
    • 29 篇 生物学
    • 25 篇 地球物理学
    • 13 篇 统计学(可授理学、...
  • 83 篇 医学
    • 76 篇 临床医学
  • 59 篇 文学
    • 59 篇 新闻传播学
  • 21 篇 艺术学
    • 21 篇 设计学(可授艺术学...
  • 16 篇 农学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 11 篇 教育学
    • 10 篇 教育学
  • 2 篇 经济学
  • 2 篇 法学

主题

  • 15,887 篇 partitioning alg...
  • 4,717 篇 clustering algor...
  • 3,101 篇 algorithm design...
  • 1,677 篇 computer science
  • 1,305 篇 heuristic algori...
  • 1,139 篇 data mining
  • 905 篇 computational mo...
  • 756 篇 optimization
  • 752 篇 hardware
  • 746 篇 costs
  • 722 篇 image segmentati...
  • 665 篇 iterative algori...
  • 601 篇 parallel process...
  • 582 篇 testing
  • 579 篇 approximation al...
  • 563 篇 routing
  • 510 篇 computer archite...
  • 478 篇 concurrent compu...
  • 467 篇 very large scale...
  • 444 篇 application soft...

机构

  • 40 篇 ibm thomas j. wa...
  • 38 篇 department of co...
  • 31 篇 school of comput...
  • 25 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 department of el...
  • 18 篇 at and t bell la...
  • 17 篇 department of co...
  • 17 篇 school of electr...
  • 16 篇 school of comput...
  • 16 篇 department of el...
  • 16 篇 institute of com...
  • 16 篇 department of el...
  • 15 篇 department of co...
  • 15 篇 university of ch...
  • 15 篇 department of co...
  • 15 篇 department of el...

作者

  • 25 篇 xianlong hong
  • 19 篇 hichem frigui
  • 15 篇 yici cai
  • 14 篇 sanghamitra band...
  • 13 篇 jun wang
  • 13 篇 g. karypis
  • 13 篇 li li
  • 13 篇 jing wang
  • 12 篇 sriparna saha
  • 12 篇 tzung-pei hong
  • 12 篇 a.k. jain
  • 12 篇 thambipillai sri...
  • 11 篇 suleyman s. koza...
  • 11 篇 hau-san wong
  • 11 篇 yu wang
  • 11 篇 hui wang
  • 11 篇 jian-jia chen
  • 11 篇 p. banerjee
  • 11 篇 sanjoy baruah
  • 11 篇 francisco de a.t...

语言

  • 15,733 篇 英文
  • 119 篇 其他
  • 32 篇 中文
检索条件"主题词=Partitioning Algorithms"
15887 条 记 录,以下是891-900 订阅
排序:
Rule-Based Constraint Elicitation For Active Constraint-Incremental Clustering
Rule-Based Constraint Elicitation For Active Constraint-Incr...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Aymeric Beauchamp Thi-Bich-Hanh Dao Samir Loudni Christel Vrain LIFO EA 4022 University of Orléans INSA Centre-Val-de-Loire Orléans France TASC (LS2N-CNRS) / GREYC IMT Atlantique / University of Caen Normandy Nantes France
Constrained clustering algorithms integrate user knowledge as constraints in the clustering process to guide it towards a desired outcome. When interacting with users, it is essential to quickly ask simple questions t... 详细信息
来源: 评论
HW/SW Co-Design of the Secure Hash Function SHA-256
HW/SW Co-Design of the Secure Hash Function SHA-256
收藏 引用
International Conference on Advanced Electrical Engineering (ICAEE)
作者: M. Issad N. Anane N. Guenfoud M. Debyeche Centre de Développement des Technologies Avancées CDTA Alger Algérie Université des Sciences et Technologies Houari Boumediene Bab Ezzouar
Technological developments in data communication has increased the integration cryptographic algorithms. Hash functions are used in many security schemes such as digital signature/verification and block chain network.... 详细信息
来源: 评论
Opportunistic Network Routing Based on Node Sociality and Location Information
Opportunistic Network Routing Based on Node Sociality and Lo...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Gaofeng Zhang Jia Hao Gang Xu Xing Wang Yanhe Fu Ru Yi College of Computer Science Inner Mongolia University Hohhot China
Opportunistic network nodes exhibit social attributes, and existing community routing algorithms are currently designed for situations where the community structure remains fixed and do not comprehensively analyze the... 详细信息
来源: 评论
Unveiling the Power of Neural Program Synthesis in High Level Code Generation
Unveiling the Power of Neural Program Synthesis in High Leve...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Gurram Kumar Sai Koganti Sri Sai Harshith Kucharlapati Akash Varma G. Yashwanth Kiran J Swaminathan Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri India
In this research, we delve into a transformative exploration of the realm of code generation, unveiling three fundamental modules that constitute the backbone of our study: the Text-to-Code Generation Model, Code Auto... 详细信息
来源: 评论
Open Service for Networking Systems of AI: A Case Study in Adaptation Optimization
Open Service for Networking Systems of AI: A Case Study in A...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Bobo Ju Kun Yang Yang Liu Jing Liu Peng Sun Wei Ni Liang Song Academy for Engineering & Technology Fudan University Shanghai China Innovation Platform for Academicians of Hainan Province Haikou China Department of Computer Science University of Toronto Toronto Ontario Canada School of Information Science and Technology Fudan University Shanghai China Division of Natural and Applied Sciences Duke Kunshan University Suzhou China Shanghai East Bund Research Institute on NSAI Shanghai China
Under the architecture of Networking Systems of AI (NSAI), we propose a three-tier edge computing platform called Open Service for NSAI (OpenSAI), which can jointly configure the application execution and compute-stor... 详细信息
来源: 评论
A Fair Scheduling Algorithm and Schedulability Analysis for Performance Asymmetric Multiprocessors
A Fair Scheduling Algorithm and Schedulability Analysis for ...
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Peng Wu Feihang Jin Tao Yan Institute of Big Data Science and Industry Shanxi University Taiyuan China School of Computer and Information Technology Shanxi University Taiyuan China Institute of Big Data Science and Industry School of Computer and Information Technology Taiyuan China
We propose a new scheduling policy for performance asymmetric multiprocessors that have identical instruction sets but different processing speeds. The difference between it and the original Pfair scheduling is that w... 详细信息
来源: 评论
Research on Cloud Security Protection Based on Microisolation Technology
Research on Cloud Security Protection Based on Microisolatio...
收藏 引用
Electronic Information Engineering and Computer Technology (EIECT), International Conference on
作者: Shiyong Dai Jinhua Huang Yulong Wu Xuxian Wang Huiying Lu Wenqian Xu Yixin Jiang Yunan Zhang Electric Power Research Institute of Guangdong Power Grid Co. Ltd Guangzhou China Joint Laboratory on Cyberspace Security CSG Guangzhou China CSG Electric Power Research Institute Co. Ltd Guangzhou China Guangdong Provincial Key La-boratory of Power System Network Security Guangzhou China
Cloud computing technology is becoming more and more popular in enterprises, but it also breaks the traditional partition mode of enterprises. Starting from the importance of microisolation technology in cloud resourc... 详细信息
来源: 评论
Partitionable Task Offloading for Intelligent Ship-assisted Maritime Edge Computing Networks
Partitionable Task Offloading for Intelligent Ship-assisted ...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Shuang Qi Bin Lin Xiaoyu Zhang Lue Yang Information Science and Technology College Dalian Maritime University Dalian China
Camera-equipped unmanned aerial vehicles (UAVs) can provide instant maritime visual data, playing a crucial role in maritime safety, environmental monitoring, and resource management. By integrating mobile edge comput... 详细信息
来源: 评论
A Dynamic Visual Sensor Denoising Method Based on Event Density Classification
A Dynamic Visual Sensor Denoising Method Based on Event Dens...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Qiangxiao Zhou Hai Xiong Yiheng Wang Yuhao Shen Long Cheng College of Computer Science and Artificial Intelligence WenZhou University Wenzhou China
Dynamic Visual Sensors (DVS) output pixel information asynchronously as an address event, only transmitting information for pixels where the intensity change exceeds a threshold, thereby reducing redundant data genera... 详细信息
来源: 评论
Enhancing Quantum Search: The Potential of Partitioned Grover's Algorithm
Enhancing Quantum Search: The Potential of Partitioned Grove...
收藏 引用
Innovative and Intelligent Information Technologies (IC3IT), International Conference on
作者: Ahcene Bounceur Saadat M. Alhashmi Mohamed Abdalla Nour Huseyin Seker University of Sharjah College of Computing and Informatics Sharjah UAE
Grover's Algorithm is a prominent quantum search algorithm in the rapidly advancing quantum computing study. By exploiting superposition and quantum parallelism, it has the potential to outperform classical brute-... 详细信息
来源: 评论