咨询与建议

限定检索结果

文献类型

  • 976 篇 期刊文献
  • 420 篇 会议
  • 15 篇 学位论文
  • 2 册 图书

馆藏范围

  • 1,413 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,157 篇 工学
    • 882 篇 计算机科学与技术...
    • 240 篇 电气工程
    • 225 篇 控制科学与工程
    • 176 篇 软件工程
    • 51 篇 信息与通信工程
    • 22 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 12 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 土木工程
  • 583 篇 理学
    • 531 篇 数学
    • 64 篇 系统科学
    • 30 篇 统计学(可授理学、...
    • 15 篇 物理学
    • 7 篇 生物学
    • 1 篇 生态学
  • 111 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 19 篇 经济学
    • 17 篇 应用经济学
    • 2 篇 理论经济学
  • 5 篇 医学
    • 4 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 4 篇 法学
    • 4 篇 法学
  • 4 篇 农学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 1,413 篇 randomized algor...
  • 116 篇 approximation al...
  • 69 篇 algorithms
  • 53 篇 online algorithm...
  • 48 篇 parallel algorit...
  • 44 篇 competitive anal...
  • 43 篇 distributed algo...
  • 35 篇 distributed comp...
  • 33 篇 computational co...
  • 31 篇 optimization
  • 29 篇 property testing
  • 27 篇 graph algorithms
  • 23 篇 probabilistic ro...
  • 21 篇 load balancing
  • 21 篇 analysis of algo...
  • 21 篇 computational ge...
  • 21 篇 consensus
  • 21 篇 convex optimizat...
  • 20 篇 robust control
  • 20 篇 deterministic al...

机构

  • 15 篇 politecn torino ...
  • 15 篇 technion israel ...
  • 13 篇 politecn torino ...
  • 12 篇 univ maryland de...
  • 11 篇 rensselaer polyt...
  • 11 篇 max planck inst ...
  • 10 篇 politecn milan d...
  • 10 篇 univ calif berke...
  • 9 篇 fudan univ sch m...
  • 9 篇 univ maryland in...
  • 9 篇 tel aviv univ sc...
  • 8 篇 cornell univ dep...
  • 8 篇 mit cambridge ma...
  • 8 篇 univ maryland co...
  • 8 篇 univ waterloo sc...
  • 8 篇 yale univ dept c...
  • 8 篇 fudan univ key l...
  • 8 篇 politecn torino ...
  • 7 篇 tel aviv univ sc...
  • 7 篇 univ connecticut...

作者

  • 15 篇 srinivasan aravi...
  • 15 篇 dabbene fabrizio
  • 15 篇 tempo roberto
  • 11 篇 patt-shamir boaz
  • 11 篇 drineas petros
  • 10 篇 rajasekaran s
  • 10 篇 wei yimin
  • 9 篇 calafiore giusep...
  • 9 篇 xu pan
  • 9 篇 mahoney michael ...
  • 9 篇 saibaba arvind k...
  • 8 篇 chan timothy m.
  • 8 篇 prandini maria
  • 8 篇 woelfel philipp
  • 8 篇 alistarh dan
  • 8 篇 piroddi luigi
  • 8 篇 doerr benjamin
  • 7 篇 chen zhi-zhong
  • 7 篇 rajasekaran sang...
  • 7 篇 tempo r

语言

  • 1,351 篇 英文
  • 57 篇 其他
  • 4 篇 中文
  • 1 篇 西班牙文
检索条件"主题词=Randomized Algorithms"
1413 条 记 录,以下是1051-1060 订阅
排序:
Evolutionary programming using a mixed mutation strategy
收藏 引用
INFORMATION SCIENCES 2007年 第1期177卷 312-327页
作者: Dong, Hongbin He, Jun Huang, Houkuan Hou, Wei Beijing Jiaotong Univ Sch Comp Sci & Informat Technol Beijing 100044 Peoples R China Beijing Jiaotong Univ Dept Comp Sci & Informat Technol Beijing 100044 Peoples R China Harbin Normal Univ Dept Comp Sci Harbin 150080 Peoples R China Univ Birmingham Sch Comp Sci Birmingham B15 2TT W Midlands England
Different mutation operators have been proposed in evolutionary programming, but for each operator there are some types of optimization problems that cannot be solved efficiently. A mixed strategy, integrating several... 详细信息
来源: 评论
On the longest increasing subsequence of a circular list
收藏 引用
INFORMATION PROCESSING LETTERS 2007年 第2期101卷 55-59页
作者: Albert, M. H. Atkinson, M. D. Nussbaum, Doron Sack, Jorg-Rudiger Santoro, Nicola Univ Otago Dept Comp Sci Dunedin New Zealand Carleton Univ Sch Comp Sci Ottawa ON K1S 5B6 Canada
The longest increasing circular subsequence (LICS) of a list is considered. A Monte Carlo algorithm to compute it is given which has worst case execution time 0(n(3/2) log n) and storage requirement 0(n). It is proved... 详细信息
来源: 评论
New approaches for virtual private network design
收藏 引用
SIAM JOURNAL ON COMPUTING 2007年 第3期37卷 706-721页
作者: Eisenbrand, Friedrich Grandoni, Fabrizio Oriolo, Gianpaolo Skutella, Martin Univ Dortmund Fachbereich Informat D-44221 Dortmund Germany Univ Roma La Sapienza Dipartimento Informat I-00198 Rome Italy Univ Roma Tor Vergata Dipartimento Ingn Impresa I-00165 Rome Italy Univ Dortmund Fachbereich Math D-44221 Dortmund Germany
Virtual private network design is the following NP-hard problem. We are given a communication network represented as a weighted graph with thresholds on the nodes which represent the amount of flow that a node can sen... 详细信息
来源: 评论
Choosing a random peer in Chord
收藏 引用
ALGORITHMICA 2007年 第2期49卷 147-169页
作者: King, Valerie Lewis, Scott Saia, Jared Young, Maxwell Univ New Mexico Dept Comp Sci Albuquerque NM 87131 USA Univ Victoria Dept Comp Sci Victoria BC V8W 3P6 Canada
We present two new algorithms, Arc Length and Peer Count, for choosing a peer uniformly at random from the set of all peers in Chord (Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001). We show analytical... 详细信息
来源: 评论
Approximate counting in bounded arithmetic
收藏 引用
JOURNAL OF SYMBOLIC LOGIC 2007年 第3期72卷 959-993页
作者: Jerabek, Emil Acad Sci Czech Republic Inst Math CR-11567 Prague Czech Republic
We develop approximate counting of sets definable by Boolean circuits in bounded arithmetic using the dual weak pigeonhole principle (dWPHP(PV)), as a generalization of results from [15]. We discuss applications to fo... 详细信息
来源: 评论
Exterminator: Automatically correcting memory errors with high probability  07
Exterminator: Automatically correcting memory errors with hi...
收藏 引用
Conference on Programming Language Design and Implementation
作者: Novark, Gene Berger, Emery D. Zorn, Benjamin G. Univ Massachusetts Dept Comp Sci Amherst MA 01003 USA Microsoft Res One Microsoft Way Redmond WA 98052 USA
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. These errors, which can lead to crashes, erroneous execution, and security vulnerabilities, are notorio... 详细信息
来源: 评论
Communication in Dynamic Radio Networks
Communication in Dynamic Radio Networks
收藏 引用
16th Annual ACM Symposium on Principles of Distributed Computing
作者: Clementi, Andrea E. F. Pasquale, Francesco Monti, Angelo Silvestri, Riccardo Univ Roma Tor Vergata Dipartimento Matemat I-00133 Rome Italy
We study the completion time of distributed broadcast protocols in dynamic radio networks. The dynamic network is modelled by means of adversaries: we consider two of them that somewhat axe the extremal cases. We firs... 详细信息
来源: 评论
Energy Efficient Randomised Communication in Unknown AdHoc Networks  07
Energy Efficient Randomised Communication in Unknown AdHoc N...
收藏 引用
19th Annual Symposium on Parallelism in algorithms and Architectures
作者: Berenbrink, Petra Hu, Zengjian Cooper, Colin Simon Fraser Univ Sch Comp Sci Burnaby BC V5A 1S6 Canada
This paper studies broadcasting and gossiping algorithms in random and general AdHoc networks. Our goal is not only to minimise the broadcasting and gossiping time, but also to minimise the energy consumption, which i... 详细信息
来源: 评论
Infrastructure leasing problems
收藏 引用
12th International Integer Programming and Combinatorial Optimization Conference
作者: Anthony, Barbara M. Gupta, Anupam Carnegie Mellon Univ Dept Math Sci Pittsburgh PA 15213 USA Carnegie Mellon Univ Dept Comp Sci Pittsburgh PA USA
Consider the following Steiner Tree leasing problem. Given a graph G = (V, E) with root r, and a sequence of terminal sets D-t subset of V for each day t is an element of [T]. A feasible solution to the problem is a s... 详细信息
来源: 评论
New results on the scenario design approach
New results on the scenario design approach
收藏 引用
46th IEEE Conference on Decision and Control
作者: Campi, M. C. Calafiore, G. C. Univ Brescia Dipartimento Elettron Automaz Via Branze 38 I-25123 Brescia Italy Politecn Torino Dipartimento Automat & Informat Turin Italy
ne scenario optimization method developed in [1] is a theoretically sound and practically effective technique for solving in a probabilistic setting robust convex optimization problems arising in systems and control d... 详细信息
来源: 评论