咨询与建议

限定检索结果

文献类型

  • 38 篇 会议
  • 36 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 75 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 工学
    • 43 篇 计算机科学与技术...
    • 26 篇 电气工程
    • 22 篇 控制科学与工程
    • 14 篇 信息与通信工程
    • 7 篇 软件工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 电子科学与技术(可...
  • 22 篇 理学
    • 16 篇 数学
    • 7 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 11 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 75 篇 randomised algor...
  • 9 篇 computational co...
  • 9 篇 probability
  • 8 篇 iterative method...
  • 6 篇 randomized algor...
  • 6 篇 optimisation
  • 6 篇 randomized algor...
  • 4 篇 convex programmi...
  • 4 篇 approximation th...
  • 4 篇 resource allocat...
  • 4 篇 search problems
  • 4 篇 random processes
  • 4 篇 stochastic proce...
  • 4 篇 deterministic al...
  • 3 篇 approximation al...
  • 3 篇 static-output-fe...
  • 3 篇 markov processes
  • 3 篇 gradient methods
  • 3 篇 cloud computing
  • 3 篇 linear systems

机构

  • 2 篇 simon fraser uni...
  • 1 篇 johns hopkins un...
  • 1 篇 univ sci & techn...
  • 1 篇 ctr univ morsli ...
  • 1 篇 menoufia univ de...
  • 1 篇 beijing inst tec...
  • 1 篇 politecn milan d...
  • 1 篇 katholieke univ ...
  • 1 篇 jerusalem coll t...
  • 1 篇 univ warsaw inst...
  • 1 篇 univ liege dept ...
  • 1 篇 tech univ monche...
  • 1 篇 univ washington ...
  • 1 篇 univ london impe...
  • 1 篇 univ padua dept ...
  • 1 篇 jerusalem coll t...
  • 1 篇 russian acad sci...
  • 1 篇 univ michigan de...
  • 1 篇 univ oberta cata...
  • 1 篇 countinglab ltd ...

作者

  • 3 篇 peretz y.
  • 2 篇 goldberg leslie ...
  • 2 篇 nuyens dirk
  • 2 篇 berenbrink petra
  • 2 篇 wilkes laurence
  • 1 篇 starobinski davi...
  • 1 篇 bhawani sankar b...
  • 1 篇 ge quanbo
  • 1 篇 capello elisa
  • 1 篇 dumitriu ioana
  • 1 篇 avrachenkov k.
  • 1 篇 stephan mertens
  • 1 篇 prokhorenkova l....
  • 1 篇 khanafer ali
  • 1 篇 starikovskaya ta...
  • 1 篇 larcheveque hube...
  • 1 篇 fotakis dimitris
  • 1 篇 ourbih-tari megd...
  • 1 篇 nazin alexander
  • 1 篇 schrijvers okke

语言

  • 71 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"主题词=Randomised algorithms"
75 条 记 录,以下是11-20 订阅
排序:
randomised block-coordinate Frank-Wolfe algorithm for distributed online learning over networks
收藏 引用
COGNITIVE COMPUTATION AND SYSTEMS 2020年 第2期2卷 72-79页
作者: Li, Jingchao Wu, Qingtao Zheng, Ruijuan Zhu, Junlong Ge, Quanbo Zhang, Mingchuan Henan Univ Sci & Technol Sch Informat Engn Luoyang 471023 Peoples R China Tongji Univ Sch Elect & Informat Engn Shanghai 200092 Peoples R China
The distributed online algorithms which are based on the Frank-Wolfe method can effectively deal with constrained optimisation problems. However, the calculation of the full (sub)gradient vector in those algorithms le... 详细信息
来源: 评论
randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic
收藏 引用
IET NETWORKS 2019年 第2期8卷 138-142页
作者: Jamali, Majid Ghiasian, Ali Aghigh Univ Esfahan Iran Shahrekord Univ Fac Engn Shahrekord Iran
Virtual Output Queuing (VOQ) is a well-known queuing discipline in data switch architecture that eliminates Head of Line (HOL) blocking issue. In VOQ scheme, for each output port, a separate FIFO is maintained by each... 详细信息
来源: 评论
A randomised Lattice Rule Algorithm with Pre-determined Generating Vector and Random Number of Points for Korobov Spaces with 0 < α ≤ 1/2  15th
A Randomised Lattice Rule Algorithm with Pre-determined Gene...
收藏 引用
15th International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing (MCQMC)
作者: Nuyens, Dirk Wilkes, Laurence Katholieke Univ Leuven Dept Comp Sci Celestijnenlaan 200A B-3001 Leuven Belgium
In previous work [12], we showed that a lattice rule with a pre-determined generating vector but random number of points can achieve the near optimal convergence of O(n(-alpha-1/2+epsilon)), epsilon > 0, for the wo... 详细信息
来源: 评论
Using Depth to Extend randomised Hough Forests for Object Detection and Localisation
Using Depth to Extend Randomised Hough Forests for Object De...
收藏 引用
International Conference on Digital Image Computing - Techniques and Applications (DICTA)
作者: Palmer, Richard West, Geoff Tan, Tele Curtin Univ Dept Spatial Sci Perth WA 6845 Australia Curtin Univ Dept Mech Eng Perth WA 6845 Australia
Implicit Shape Models (ISM) have been developed for object detection and localisation in 2-D (RGB) imagery and, to a lesser extent, full 3-D point clouds. Research is ongoing to extend the approach to 2-D imagery havi... 详细信息
来源: 评论
On applications of the ray-shooting method for structured and structured-sparse static-output-feedbacks
收藏 引用
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE 2017年 第9期48卷 1902-1913页
作者: Peretz, Y. Jerusalem Coll Technol Comp Sci Dept Lev Acad Ctr Jerusalem Israel
A randomised optimisation method, called the ray-shooting method that efficiently solves the minimisation problem of continuous functions over compact non-convex unconnected regions, was introduced recently. Based on ... 详细信息
来源: 评论
Balls into non-uniform bins
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2014年 第2期74卷 2065-2076页
作者: Berenbrink, Petra Brinkmann, Andre Friedetzky, Tom Nagel, Lars Simon Fraser Univ Sch Comp Sci Burnaby BC V5A 1S6 Canada Johannes Gutenberg Univ Mainz Zentrum Datenverarbeitung D-55099 Mainz Germany Univ Durham Sch Engn & Comp Sci Durham DH1 3LE England
Balls-into-bins games for uniform bins are widely used to model randomised load balancing strategies. Recently, balls-into-bins games have been analysed under the assumption that the selection probabilities for bins a... 详细信息
来源: 评论
Automatic track filter tuning by randomized algorithms
收藏 引用
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 2002年 第4期38卷 1444-1449页
作者: Boers, Y Driessen, H Laclé, N Thales Nederland NL-7554 RR Hengelo Netherlands
Tuning or fine tuning of a tracker system turns out to be a hard job in practice. The main reason for this is that in a practical (surveillance) tracker system there are a lot of design parameters and a lot of competi... 详细信息
来源: 评论
Verified Analysis of Random Binary Tree Structures
收藏 引用
JOURNAL OF AUTOMATED REASONING 2020年 第5期64卷 879-910页
作者: Eberl, Manuel Haslbeck, Max W. Nipkow, Tobias Tech Univ Monchen D-85748 Garching Germany Univ Innsbruck A-6020 Innsbruck Austria
This work is a case study of the formal verification and complexity analysis of some famous probabilistic algorithms and data structures in the proof assistant Isabelle/HOL. In particular, we consider the expected num... 详细信息
来源: 评论
Longest Common Substring with Approximately k Mismatches (vol 81, pg 2633, 2019)
收藏 引用
ALGORITHMICA 2019年 第7期81卷 3074-3074页
作者: Kociumaka, Tomasz Radoszewski, Jakub Starikovskaya, Tatiana Univ Warsaw Inst Informat Warsaw Poland PSL Univ Ecole Normale Super DIENS Paris France
In the longest common substring problem, we are given two strings of length n and must find a substring of maximal length that occurs in both strings. It is well known that the problem can be solved in linear time, bu... 详细信息
来源: 评论
Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
收藏 引用
IET INFORMATION SECURITY 2015年 第4期9卷 223-233页
作者: Elsafrawey, Amir S. Hassan, Emad S. Dessouky, Moawad I. Menoufia Univ Dept Elect & Elect Commun Fac Elect Engn Menoufia 32952 Egypt
Unattended wireless sensor networks (UWSNs) are operated in hostile environments without constant supervision by a trusted sink;so it faces the risk of compromising by adversaries (ADVs). In this study, proposed is a ... 详细信息
来源: 评论