咨询与建议

限定检索结果

文献类型

  • 91 篇 期刊文献
  • 39 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 109 篇 工学
    • 81 篇 计算机科学与技术...
    • 28 篇 电气工程
    • 18 篇 软件工程
    • 14 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 水利工程
    • 2 篇 石油与天然气工程
    • 2 篇 船舶与海洋工程
    • 2 篇 网络空间安全
    • 1 篇 测绘科学与技术
    • 1 篇 轻工技术与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 49 篇 理学
    • 36 篇 数学
    • 5 篇 物理学
    • 4 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 系统科学
    • 1 篇 化学
  • 12 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
    • 1 篇 作物学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 134 篇 probabilistic al...
  • 5 篇 combinatorial op...
  • 4 篇 deterministic al...
  • 4 篇 grasp
  • 4 篇 distributed comp...
  • 3 篇 gcd
  • 3 篇 distributed algo...
  • 3 篇 automata
  • 3 篇 parallel algorit...
  • 3 篇 temporal logic
  • 2 篇 strategy
  • 2 篇 subset sum probl...
  • 2 篇 euler function
  • 2 篇 clustering
  • 2 篇 smartphone secur...
  • 2 篇 linear combinati...
  • 2 篇 reusing past que...
  • 2 篇 computational co...
  • 2 篇 lamb waves
  • 2 篇 binary search

机构

  • 3 篇 univ s carolina ...
  • 3 篇 indiana univ pur...
  • 2 篇 univ calif santa...
  • 2 篇 cepel elect ener...
  • 2 篇 pontificia univ ...
  • 2 篇 indiana univ pur...
  • 2 篇 kobe univ grad s...
  • 2 篇 macquarie univ d...
  • 2 篇 brno university ...
  • 2 篇 at&t labs res in...
  • 2 篇 mines paristech
  • 2 篇 russian acad sci...
  • 2 篇 univ bio bio dep...
  • 2 篇 univ calif berke...
  • 2 篇 univ bonn bit co...
  • 2 篇 hong kong polyte...
  • 2 篇 univ camerino de...
  • 1 篇 petra univ amman...
  • 1 篇 univ hlth networ...
  • 1 篇 natl res univ hi...

作者

  • 5 篇 li feng
  • 4 篇 peng wei
  • 3 篇 huang chin-tser
  • 3 篇 zou xukai
  • 2 篇 resende mgc
  • 2 篇 gutierrez-soto c...
  • 2 篇 lo eric
  • 2 篇 spirakis paul g.
  • 2 篇 di pietro robert...
  • 2 篇 wang dong
  • 2 篇 ye lin
  • 2 篇 mohri masami
  • 2 篇 he zhian
  • 2 篇 lu ye
  • 2 篇 hirotomo masanor...
  • 2 篇 wong petrie
  • 2 篇 mertzios george ...
  • 2 篇 de alfaro l
  • 2 篇 aiex rm
  • 2 篇 vinogradov d. v.

语言

  • 126 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"主题词=Probabilistic Algorithm"
134 条 记 录,以下是61-70 订阅
Behavior Analysis Modulus for harbor security
Behavior Analysis Modulus for harbor security
收藏 引用
MTS/IEEE Oceans Conference
作者: Zouaoui, Salma Roy, Valerie Maizi, Nadia MINES ParisTech Paris France
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to mo... 详细信息
来源: 评论
Several Remarks on Index Generation Functions
Several Remarks on Index Generation Functions
收藏 引用
42nd IEEE International Symposium on Multiple-Valued Logic (ISMVL)
作者: Simovici, Dan A. Zimand, Marius Pletea, Dan Univ Massachusetts Dept Comp Sci Harbor Campus Boston MA 02125 USA Towson Univ Dept Comp & Informat Sci Towson MD USA
We propose a probabilistic greedy algorithm for decomposing partially specified index generation functions. These functions have numerous applications in a variety of circuit design problems. We show that finding an o... 详细信息
来源: 评论
Dynamic Programming for Optimal Integration of Plug-in Hybrid Electric Vehicles (PHEVs) in Residential Electric Grid Areas
Dynamic Programming for Optimal Integration of Plug-in Hybri...
收藏 引用
Annual Conference on IEEE Industrial Electronics Society
作者: Harun TURKER Ahmad HABLY Seddik BACHA Grenoble Electrical Engineering Lab. Grenoble Image Parole Signal Automatique Lab.
Plug-in Hybrid Electric Vehicles (PHEVs) will strongly penetrate in the car fleet. Based on databases of the houses Daily Loads Profiles (DLPs) and on a probabilistic algorithm of PHEVs connections in residential elec... 详细信息
来源: 评论
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2011年 第3期34卷 853-863页
作者: Di Pietro, Roberto Molva, Refik Univ Roma Tre Dipartimento Matemat I-00149 Rome Italy Univ Rovira & Virgili UNESCO Chair Data Privacy Tarragona Spain Inst EURECOM F-06560 Sophia Antipolis France
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be comprom... 详细信息
来源: 评论
Behavior Analysis Modulus for harbor security
Behavior Analysis Modulus for harbor security
收藏 引用
OCEANS Conference
作者: Salma Zouaoui Valerie Roy Nadia Maizi MINES ParisTech
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to mo... 详细信息
来源: 评论
PET: probabilistic Estimating Tree for Large-Scale RFID Estimation
PET: Probabilistic Estimating Tree for Large-Scale RFID Esti...
收藏 引用
31st International Conference on Distributed Computing Systems (ICDCS)
作者: Zheng, Yuanqing Li, Mo Qian, Chen Nanyang Technol Univ Sch Comp Engn Singapore Singapore Univ Texas Austin Dept Comp Sci Austin TX 78712 USA
Estimating the number of RFID tags in the region of interest is an important task in many RFID applications. In this paper we propose a novel approach for efficiently estimating the approximate number of RFID tags. Co... 详细信息
来源: 评论
Location privacy and resilience in wireless sensor networks querying
收藏 引用
COMPUTER COMMUNICATIONS 2011年 第3期34卷 515-523页
作者: Di Pietro, Roberto Viejo, Alexandre Univ Roma Tre Dipartimento Matemat I-00146 Rome Italy Univ Rovira & Virgili UNESCO Chair Data Privacy Dept Engn Informat & Matemat E-43007 Tarragona Spain
Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms those would just protect the message conte... 详细信息
来源: 评论
Using Patterns in the Behavior of the Random Surfer to Detect Webspam Beneficiaries
Using Patterns in the Behavior of the Random Surfer to Detec...
收藏 引用
11th International Conference on Web Information Systems Engineering
作者: Largillier, Thomas Peyronnet, Sylvain Univ Paris Sud Lab Rech Informat F-91405 Orsay France
In order to appear in a good position on a search engine's result list it is not enough to be relevant regarding the request. Someone also have to be "popular". This notion of popularity is calculated by... 详细信息
来源: 评论
Tracking multiple agents in an intelligent space with probabilistic algorithms and a camera ring
Tracking multiple agents in an intelligent space with probab...
收藏 引用
IEEE International Symposium on Industrial Electronics (ISIE)
作者: Marron, M. Pizarro, D. Marcos, A. Jalvo, R. Garcia, J. C. Mazo, M. Univ Alcala de Henares Dept Elect Madrid 28871 Spain
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observa... 详细信息
来源: 评论
probabilistic Damage Identification Based on Correlation Analysis Using Guided Wave Signals in Aluminum Plates
收藏 引用
STRUCTURAL HEALTH MONITORING-AN INTERNATIONAL JOURNAL 2010年 第2期9卷 133-144页
作者: Wang, Dong Ye, Lin Su, Zhongqing Lu, Ye Li, Fucai Meng, Guang Univ Sydney LSMS CAMT Sch Aerosp Mech & Mechatron Engn Sydney NSW 2006 Australia Hong Kong Polytech Univ Dept Mech Engn Hong Kong Hong Kong Peoples R China Shanghai Jiao Tong Univ State Key Lab Mech Syst & Vibrat Shanghai 200030 Peoples R China
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and e... 详细信息
来源: 评论