咨询与建议

限定检索结果

文献类型

  • 137 篇 期刊文献
  • 27 篇 会议
  • 6 篇 学位论文
  • 1 册 图书

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 126 篇 计算机科学与技术...
    • 52 篇 电气工程
    • 18 篇 软件工程
    • 10 篇 信息与通信工程
    • 6 篇 仪器科学与技术
    • 6 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
  • 62 篇 理学
    • 55 篇 数学
    • 11 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 3 篇 化学
    • 2 篇 物理学
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 171 篇 probabilistic al...
  • 9 篇 machine learning
  • 6 篇 parallel algorit...
  • 5 篇 approximation al...
  • 5 篇 tracking
  • 5 篇 finite fields
  • 4 篇 reliability
  • 4 篇 clustering
  • 4 篇 algorithms
  • 4 篇 analysis of algo...
  • 4 篇 distributed algo...
  • 4 篇 biology and gene...
  • 3 篇 computational co...
  • 3 篇 random graphs
  • 3 篇 geometric soluti...
  • 3 篇 polynomial
  • 3 篇 markov processes
  • 3 篇 computational ge...
  • 3 篇 primality
  • 3 篇 decision trees

机构

  • 3 篇 technion israel ...
  • 3 篇 univ buenos aire...
  • 2 篇 agena ltd cambri...
  • 2 篇 univ nacl gen sa...
  • 2 篇 univ cambridge d...
  • 2 篇 cornell univ dep...
  • 2 篇 vrije univ amste...
  • 2 篇 google inc mount...
  • 2 篇 northwestern uni...
  • 2 篇 queen mary univ ...
  • 2 篇 brno university ...
  • 2 篇 idiap res inst c...
  • 2 篇 inst tecnol buen...
  • 2 篇 core secur techn...
  • 1 篇 universidad vera...
  • 1 篇 the work of the ...
  • 1 篇 crytek r&d dept ...
  • 1 篇 univ malaga dept...
  • 1 篇 univ pisa dipart...
  • 1 篇 fgan fom ettling...

作者

  • 4 篇 alt helmut
  • 4 篇 scharf ludmila
  • 3 篇 matera guillermo
  • 2 篇 garcia j. c.
  • 2 篇 srinivasan a
  • 2 篇 ezome tony
  • 2 篇 pizarro d.
  • 2 篇 kaski samuel
  • 2 篇 pang jun
  • 2 篇 juan angel a.
  • 2 篇 naor m
  • 2 篇 moran s
  • 2 篇 ciuffoletti a
  • 2 篇 devismes stephan...
  • 2 篇 waissbein ariel
  • 2 篇 solerno pablo
  • 2 篇 schymura daria
  • 2 篇 lercier reynald
  • 2 篇 neil martin
  • 2 篇 noguchi takao

语言

  • 166 篇 英文
  • 5 篇 其他
检索条件"主题词=Probabilistic Algorithms"
171 条 记 录,以下是81-90 订阅
probabilistic algorithm for finding roots of linearized polynomials
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2008年 第1期46卷 17-23页
作者: Skachek, Vitaly Roth, Ron M. Univ Coll Dublin Claude Shannon Inst Dublin 4 Ireland Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel
A probabilistic algorithm is presented for finding a basis of the root space of a linearized polynomial L(x) = Sigma(t)(i=0) L(i)x(qi) over F(q)n. The expected time complexity of the presented algorithm is O (nt) oper... 详细信息
来源: 评论
On the probabilistic epipolar geometry
收藏 引用
IMAGE AND VISION COMPUTING 2008年 第3期26卷 405-414页
作者: Brandt, Sami S. Helsinki Univ Technol Lab Computat Engn FI-02015 Helsinki Finland
In this paper, we are going to answer the following question: assuming that we have estimates for the epipolar geometry and its uncertainty between two views, how probable is it that a new, independent point pair will... 详细信息
来源: 评论
Continuous versus discrete model in autodiagnosis systems for wireless networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2008年 第6期7卷 673-681页
作者: Barco, Raquel Lazaro, Pedro Diez, Luis Wille, Volker Univ Malaga ETSI Telecomunicac Dept Commun Engn E-29071 Malaga Spain Nokia Siemens Networks Consulting & Syst Integrat Huntingdon PE29 6YJ Cambs England
In the near future, several radio access technologies will coexist in Beyond 3G mobile networks ( B3G), and they will be eventually transformed into one seamless global communication infrastructure. Self-managing syst... 详细信息
来源: 评论
Detecting objects of variable shape structure with hidden state shape models
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2008年 第3期30卷 477-492页
作者: Wang, Jingbin Athitsos, Vassilis Sclaroff, Stan Betke, Margrit Google Inc Mountain View CA 94043 USA Univ Texas Arlington Dept Comp Sci & Engn Arlington TX 76019 USA Boston Univ Dept Comp Sci Boston MA 02215 USA
This paper proposes a method for detecting object classes that exhibit variable shape structure in heavily cluttered images. The term "variable shape structure" is used to characterize object classes in whic... 详细信息
来源: 评论
Incremental PLSI for threshold-resilient online event analysis
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2008年 第3期20卷 289-299页
作者: Chou, Tzu-Chuan Chen, Meng Chang Acad Sinica Inst Informat Sci Taipei 115 Taiwan
The goal of online event analysis is to detect events and track their associated documents in real time from a continuous stream of documents generated by multiple information sources. Unlike traditional text categori... 详细信息
来源: 评论
Dimensionality reduction of clustered data sets
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2008年 第3期30卷 535-540页
作者: Sanguinetti, Guido Univ Sheffield Dept Comp Sci Sheffield S1 4DP S Yorkshire England
We present a novel probabilistic latent variable model to perform linear dimensionality reduction on data sets which contain clusters. We prove that the maximum likelihood solution of the model is an unsupervised gene... 详细信息
来源: 评论
Efficient multiple faces tracking based on Relevance Vector Machine and Boosting learning
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION 2008年 第6期19卷 382-391页
作者: Shen, Shuhan Liu, Yuncai Shanghai Jiao Tong Univ Inst Image Proc & Pattern Recognit Shanghai 200240 Peoples R China
A multiple faces tracking system was presented based on Relevance Vector Machine (RVM) and Boosting learning. In this system, a face detector based on Boosting learning is used to detect faces at the first frame, and ... 详细信息
来源: 评论
Properties of graphs with large girth
Properties of graphs with large girth
收藏 引用
作者: Hoppen, Carlos University of Waterloo
学位级别:master
This thesis is devoted to the analysis of a class ofiterative probabilistic algorithms in regular graphs, calledlocally greedy algorithms, which will provide bounds forgraph functions in regular graphs with large girt... 详细信息
来源: 评论
Incorporating data from multiple sensors for localizing nodes in mobile ad hoc networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2007年 第9期6卷 1090-1104页
作者: Huang, Rui Zaruba, Gergely V. Univ Texas Dept Comp Sci & Engn Arlington TX 76019 USA
The ad hoc network localization problem deals with estimating the geographical location of all nodes in an ad hoc network, focusing on those nodes that do not have a direct way (for example, GPS) to determine their ow... 详细信息
来源: 评论
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2007年 第4期29卷 743-748页
作者: Marcel, Sebastien Millan, Jose del R. IDIAP Res Inst CH-1920 Martigny Switzerland
In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram ( EE... 详细信息
来源: 评论