咨询与建议

限定检索结果

文献类型

  • 90 篇 期刊文献
  • 39 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 81 篇 计算机科学与技术...
    • 28 篇 电气工程
    • 18 篇 软件工程
    • 14 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 水利工程
    • 2 篇 石油与天然气工程
    • 2 篇 船舶与海洋工程
    • 2 篇 网络空间安全
    • 1 篇 测绘科学与技术
    • 1 篇 轻工技术与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 48 篇 理学
    • 35 篇 数学
    • 5 篇 物理学
    • 4 篇 生物学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 12 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
    • 1 篇 作物学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 133 篇 probabilistic al...
  • 5 篇 combinatorial op...
  • 4 篇 deterministic al...
  • 4 篇 grasp
  • 4 篇 distributed comp...
  • 3 篇 gcd
  • 3 篇 distributed algo...
  • 3 篇 automata
  • 3 篇 parallel algorit...
  • 3 篇 temporal logic
  • 2 篇 strategy
  • 2 篇 subset sum probl...
  • 2 篇 euler function
  • 2 篇 clustering
  • 2 篇 smartphone secur...
  • 2 篇 linear combinati...
  • 2 篇 reusing past que...
  • 2 篇 computational co...
  • 2 篇 lamb waves
  • 2 篇 binary search

机构

  • 3 篇 univ s carolina ...
  • 3 篇 indiana univ pur...
  • 2 篇 univ calif santa...
  • 2 篇 cepel elect ener...
  • 2 篇 pontificia univ ...
  • 2 篇 indiana univ pur...
  • 2 篇 kobe univ grad s...
  • 2 篇 macquarie univ d...
  • 2 篇 brno university ...
  • 2 篇 at&t labs res in...
  • 2 篇 mines paristech
  • 2 篇 russian acad sci...
  • 2 篇 univ bio bio dep...
  • 2 篇 univ calif berke...
  • 2 篇 univ bonn bit co...
  • 2 篇 hong kong polyte...
  • 2 篇 univ camerino de...
  • 1 篇 petra univ amman...
  • 1 篇 univ hlth networ...
  • 1 篇 natl res univ hi...

作者

  • 5 篇 li feng
  • 4 篇 peng wei
  • 3 篇 huang chin-tser
  • 3 篇 zou xukai
  • 2 篇 resende mgc
  • 2 篇 gutierrez-soto c...
  • 2 篇 lo eric
  • 2 篇 spirakis paul g.
  • 2 篇 di pietro robert...
  • 2 篇 wang dong
  • 2 篇 ye lin
  • 2 篇 mohri masami
  • 2 篇 he zhian
  • 2 篇 lu ye
  • 2 篇 hirotomo masanor...
  • 2 篇 wong petrie
  • 2 篇 mertzios george ...
  • 2 篇 de alfaro l
  • 2 篇 aiex rm
  • 2 篇 vinogradov d. v.

语言

  • 125 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"主题词=Probabilistic Algorithm"
133 条 记 录,以下是31-40 订阅
排序:
probabilistic CLOCK SYNCHRONIZATION IN DISTRIBUTED SYSTEMS
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1994年 第5期5卷 474-487页
作者: ARVIND, K Digital Equipment Corporation Littleton MA USA
This paper presents and analyzes a new probabilistic clock synchronization algorithm that can guarantee a much smaller bound on the clock skew than most existing algorithms. The algorithm is probabilistic in the sense... 详细信息
来源: 评论
Distributed computation of shared backup path in mesh optical networks using probabilistic methods
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2004年 第5期12卷 920-930页
作者: Bouillet, E Labourdette, JF Tellium Inc Oceanport NJ 07757 USA
We assess the benefits of using statistical techniques to ascertain the shareability of protection channels when computing shared-mesh restored lightpaths in optical mesh networks. These optical networks support wavel... 详细信息
来源: 评论
A probabilistic dynamic technique for the distributed generation of very large state spaces
收藏 引用
PERFORMANCE EVALUATION 2000年 第1-4期39卷 127-148页
作者: Knottenbelt, WJ Harrison, PG Mestern, MA Kritzinger, PS Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2BZ England Univ Cape Town Dept Comp Sci ZA-7701 Rondebosch South Africa
Conventional methods for state space exploration are limited to the analysis of small systems because they suffer from excessive memory and computational requirements. We have developed a new dynamic probabilistic sta... 详细信息
来源: 评论
NANOSCALE RESONANCE ENERGY TRANSFER-BASED DEVICES FOR probabilistic COMPUTING
收藏 引用
IEEE MICRO 2015年 第5期35卷 72-84页
作者: Wang, Siyang Lebeck, Alvin R. Dwyer, Chris Duke Univ Dept Elect & Comp Engn Durham NC 27706 USA Duke Univ Dept Comp Sci Durham NC 27706 USA
Despite the theoretical advances in probabilistic computing, A fundamental mismatch persists between the deterministic hardware that traditional computers use and the stochastic nature of probabilistic algorithms. The... 详细信息
来源: 评论
Polynomial-time probabilistic observability analysis of sampled-data piecewise affine systems
收藏 引用
SYSTEMS & CONTROL LETTERS 2007年 第11-12期56卷 685-694页
作者: Azuma, Shun-ichi Imura, Jun-Ichi Kyoto Univ Grad Sch Informat Kyoto 6110011 Japan Tokyo Inst Technol Grad Sch Informat Sci & Engn Tokyo 152 Japan
This paper proposes a polynomial-time probabilistic approach to solve the observability problem of sampled-data piecewise affine systems. First, an algebraic characterization for the system to be observable is derived... 详细信息
来源: 评论
THE COMPLEXITY OF probabilistic VERIFICATION
收藏 引用
JOURNAL OF THE ASSOCIATION FOR COMPUTING MACHINERY 1995年 第4期42卷 857-907页
作者: COURCOUBETIS, C YANNAKAKIS, M ICS IRAKLIONGREECE AT&T BELL LABS MURRAY HILLNJ 07974
We determine the complexity of testing whether a finite state, sequential or concurrent probabilistic program satisfies its specification expressed in linear-time temporal logic. For sequential programs, we present an... 详细信息
来源: 评论
probabilistic SELF-STABILIZATION
收藏 引用
INFORMATION PROCESSING LETTERS 1990年 第2期35卷 63-67页
作者: HERMAN, T Dep. Comp. Sci. Univ. Texas Austin TX 78712-1188 USA
Because no deterministic solution is possible for problems in a ring of identical processes, probabilistic methods using randomization are typically proposed as solutions. A probabilistic, self-stabilizing algorithm ... 详细信息
来源: 评论
PET: probabilistic Estimating Tree for Large-Scale RFID Estimation
PET: Probabilistic Estimating Tree for Large-Scale RFID Esti...
收藏 引用
31st International Conference on Distributed Computing Systems (ICDCS)
作者: Zheng, Yuanqing Li, Mo Qian, Chen Nanyang Technol Univ Sch Comp Engn Singapore Singapore Univ Texas Austin Dept Comp Sci Austin TX 78712 USA
Estimating the number of RFID tags in the region of interest is an important task in many RFID applications. In this paper we propose a novel approach for efficiently estimating the approximate number of RFID tags. Co... 详细信息
来源: 评论
probabilistic Cryptosystem with Two Pairs of Private/Public Keys
Probabilistic Cryptosystem with Two Pairs of Private/Public ...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Alfaifi, Reem Comp Sci Dept Riyadh Saudi Arabia
This paper proposes a new cryptosystem that uses two pairs of -private/public-keys. The two distinct pairs have different roles: one is for signing/verifying the message and another for encrypting/decrypting it. The p... 详细信息
来源: 评论
probabilistic Encryption - A Practical Implementation
Probabilistic Encryption - A Practical Implementation
收藏 引用
4th International Conference on Computer Sciences and Convergence Information Technology
作者: Creado, Orhio Mark Wang, Yiling Wu, Xianping Le, Phu Dung Monash Univ Caulfield Sch Informat Technol Melbourne Vic 3004 Australia
This paper aims to provide a practical implementation of a probabilistic cipher by extending on the algorithms by Fuchsbauer, Goldwasser and Micali. We provide details on designing and implementing the cipher and furt... 详细信息
来源: 评论