咨询与建议

限定检索结果

文献类型

  • 89 篇 期刊文献
  • 39 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 81 篇 计算机科学与技术...
    • 27 篇 电气工程
    • 17 篇 软件工程
    • 14 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 水利工程
    • 2 篇 石油与天然气工程
    • 2 篇 船舶与海洋工程
    • 2 篇 网络空间安全
    • 1 篇 测绘科学与技术
    • 1 篇 轻工技术与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 48 篇 理学
    • 35 篇 数学
    • 5 篇 物理学
    • 4 篇 生物学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 12 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
    • 1 篇 作物学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 132 篇 probabilistic al...
  • 5 篇 combinatorial op...
  • 4 篇 deterministic al...
  • 4 篇 grasp
  • 3 篇 gcd
  • 3 篇 distributed algo...
  • 3 篇 automata
  • 3 篇 distributed comp...
  • 3 篇 parallel algorit...
  • 3 篇 temporal logic
  • 2 篇 strategy
  • 2 篇 subset sum probl...
  • 2 篇 euler function
  • 2 篇 clustering
  • 2 篇 smartphone secur...
  • 2 篇 linear combinati...
  • 2 篇 reusing past que...
  • 2 篇 computational co...
  • 2 篇 lamb waves
  • 2 篇 binary search

机构

  • 3 篇 univ s carolina ...
  • 3 篇 indiana univ pur...
  • 2 篇 univ calif santa...
  • 2 篇 cepel elect ener...
  • 2 篇 pontificia univ ...
  • 2 篇 indiana univ pur...
  • 2 篇 kobe univ grad s...
  • 2 篇 macquarie univ d...
  • 2 篇 brno university ...
  • 2 篇 at&t labs res in...
  • 2 篇 mines paristech
  • 2 篇 russian acad sci...
  • 2 篇 univ bio bio dep...
  • 2 篇 univ calif berke...
  • 2 篇 univ bonn bit co...
  • 2 篇 hong kong polyte...
  • 2 篇 univ camerino de...
  • 1 篇 petra univ amman...
  • 1 篇 univ hlth networ...
  • 1 篇 natl res univ hi...

作者

  • 5 篇 li feng
  • 4 篇 peng wei
  • 3 篇 huang chin-tser
  • 3 篇 zou xukai
  • 2 篇 resende mgc
  • 2 篇 gutierrez-soto c...
  • 2 篇 lo eric
  • 2 篇 spirakis paul g.
  • 2 篇 di pietro robert...
  • 2 篇 wang dong
  • 2 篇 ye lin
  • 2 篇 mohri masami
  • 2 篇 he zhian
  • 2 篇 lu ye
  • 2 篇 hirotomo masanor...
  • 2 篇 wong petrie
  • 2 篇 mertzios george ...
  • 2 篇 de alfaro l
  • 2 篇 aiex rm
  • 2 篇 vinogradov d. v.

语言

  • 124 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"主题词=Probabilistic Algorithm"
132 条 记 录,以下是21-30 订阅
排序:
Proving Obliviousness of probabilistic algorithms with Formal Verification  26
Proving Obliviousness of Probabilistic Algorithms with Forma...
收藏 引用
ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH Companion)
作者: Yan, Pengbo Univ Melbourne Melbourne Vic Australia
Obliviousness is a security feature to protect sensitive information from an algorithm's observable behaviours. For better run-time performance, many oblivious algorithms published recently are probabilistic inste... 详细信息
来源: 评论
Tracking multiple agents in an intelligent space with probabilistic algorithms and a camera ring
Tracking multiple agents in an intelligent space with probab...
收藏 引用
IEEE International Symposium on Industrial Electronics (ISIE)
作者: Marron, M. Pizarro, D. Marcos, A. Jalvo, R. Garcia, J. C. Mazo, M. Univ Alcala de Henares Dept Elect Madrid 28871 Spain
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observa... 详细信息
来源: 评论
A RELATION BETWEEN CORRECTNESS AND RANDOMNESS IN THE COMPUTATION OF probabilistic algorithmS
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1984年 第1期16卷 47-53页
作者: CALUDE, C ZIMAND, M Department of Mathematics University of Bucharest Bucharest Str. Academiei 14 R-70109 Romania
Chaitin and Schwartz [4] have proved that Solovay and Strassen [12], Miller [9], and Rabin [10] probabilistic algorithms for testing primality are error-free in case the input sequence of coin tosses has maximal infor... 详细信息
来源: 评论
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2011年 第3期34卷 853-863页
作者: Di Pietro, Roberto Molva, Refik Univ Roma Tre Dipartimento Matemat I-00149 Rome Italy Univ Rovira & Virgili UNESCO Chair Data Privacy Tarragona Spain Inst EURECOM F-06560 Sophia Antipolis France
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be comprom... 详细信息
来源: 评论
probabilistic Damage Identification Based on Correlation Analysis Using Guided Wave Signals in Aluminum Plates
收藏 引用
STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL 2010年 第2期9卷 133-144页
作者: Wang, Dong Ye, Lin Su, Zhongqing Lu, Ye Li, Fucai Meng, Guang Univ Sydney LSMS CAMT Sch Aerosp Mech & Mechatron Engn Sydney NSW 2006 Australia Hong Kong Polytech Univ Dept Mech Engn Hong Kong Hong Kong Peoples R China Shanghai Jiao Tong Univ State Key Lab Mech Syst & Vibrat Shanghai 200030 Peoples R China
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and e... 详细信息
来源: 评论
probabilistic CHECKING OF ASSOCIATIVITY IN ALGEBRAS
收藏 引用
INFORMATION PROCESSING LETTERS 1991年 第4期37卷 187-191页
作者: JACOBS, DP Dep. Comp. Sci. Clemson Univ. Clemson SC 29634-1906 USA
We can easily decide, using O(n-5) arithmetic operations, if multiplication is associative in an n-dimensional algebra. We present two Monte Carlo algorithms that use only O(n3) and O(n4) operations respectively. Inte... 详细信息
来源: 评论
Fast Non-Local Means (NLM) Computation With probabilistic Early Termination
收藏 引用
IEEE SIGNAL PROCESSING LETTERS 2010年 第3期17卷 277-280页
作者: Vignesh, Ramanathan Oh, Byung Tae Kuo, C. -C. Jay Indian Inst Technol Dept Elect Engn Kharagpur 721302 W Bengal India Univ So Calif Ming Hsieh Dept Elect Engn Los Angeles CA 90089 USA Univ So Calif Signal & Image Proc Inst Los Angeles CA 90089 USA
A speed up technique for the non-local means (NLM) image denoising algorithm based on probabilistic early termination ( PET) is proposed. A significant amount of computation in the NLM scheme is dedicated to the disto... 详细信息
来源: 评论
Optimal probabilistic ring exploration by semi-synchronous oblivious robots
收藏 引用
THEORETICAL COMPUTER SCIENCE 2013年 498卷 10-27页
作者: Devismes, Stephane Petit, Franck Tixeuil, Sebastien Univ Grenoble 1 VERIMAG UMR 5104 Grenoble France Univ Paris 04 UPMC LIP6 UMR 7606 F-75230 Paris 05 France
We consider a team of k identical, oblivious, and semi-synchronous mobile robots that are able to sense (i.e., view) their environment, yet are unable to communicate, and evolve on a constrained path. Previous results... 详细信息
来源: 评论
probabilistic CLOCK SYNCHRONIZATION IN DISTRIBUTED SYSTEMS
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1994年 第5期5卷 474-487页
作者: ARVIND, K Digital Equipment Corporation Littleton MA USA
This paper presents and analyzes a new probabilistic clock synchronization algorithm that can guarantee a much smaller bound on the clock skew than most existing algorithms. The algorithm is probabilistic in the sense... 详细信息
来源: 评论
probabilistic inference by means of cluster variation method and linear response theory
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2003年 第7期E86D卷 1228-1242页
作者: Tanaka, K Tohoku Univ Grad Sch Informat Sci Dept Comp & Math Sci Sendai Miyagi 9808579 Japan
probabilistic inference by means of a massive probabilistic model usually has exponential-order computational complexity. For such massive probabilistic model, loopy belief propagation was proposed as a scheme to obta... 详细信息
来源: 评论