咨询与建议

限定检索结果

文献类型

  • 477 篇 期刊文献
  • 144 篇 会议
  • 5 篇 学位论文
  • 2 册 图书

馆藏范围

  • 628 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 116 篇 电气工程
    • 78 篇 软件工程
    • 42 篇 控制科学与工程
    • 40 篇 信息与通信工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 石油与天然气工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 测绘科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 航空宇航科学与技...
  • 305 篇 理学
    • 274 篇 数学
    • 29 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 5 篇 生物学
  • 60 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 17 篇 经济学
    • 15 篇 应用经济学
    • 2 篇 理论经济学
  • 6 篇 医学
    • 5 篇 临床医学
  • 4 篇 农学
    • 2 篇 作物学
  • 3 篇 法学
    • 3 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 628 篇 randomized algor...
  • 31 篇 approximation al...
  • 25 篇 distributed algo...
  • 19 篇 low-rank approxi...
  • 17 篇 computational ge...
  • 15 篇 approximation
  • 14 篇 lower bound
  • 13 篇 clustering
  • 12 篇 optimization
  • 11 篇 dimension reduct...
  • 11 篇 parallel algorit...
  • 10 篇 load balancing
  • 10 篇 linear programmi...
  • 10 篇 combinatorial op...
  • 9 篇 competitive anal...
  • 9 篇 singular value d...
  • 9 篇 sketching
  • 8 篇 computational co...
  • 8 篇 big data
  • 8 篇 leader election

机构

  • 11 篇 chongqing univ c...
  • 6 篇 fudan univ sch m...
  • 6 篇 stanford univ de...
  • 5 篇 univ hong kong d...
  • 5 篇 univ colorado de...
  • 5 篇 city univ hong k...
  • 5 篇 natl univ singap...
  • 4 篇 n carolina state...
  • 4 篇 wuhan univ sch m...
  • 4 篇 max planck inst ...
  • 4 篇 tsinghua univ in...
  • 4 篇 stanford univ ic...
  • 4 篇 fudan univ key l...
  • 4 篇 purdue univ dept...
  • 4 篇 univ michigan de...
  • 3 篇 univ elect sci &...
  • 3 篇 univ chicago dep...
  • 3 篇 iit dept comp sc...
  • 3 篇 xiamen univ wang...
  • 3 篇 chongqing univ k...

作者

  • 11 篇 li hanyu
  • 9 篇 pandurangan gopa...
  • 6 篇 yang haizhao
  • 6 篇 wei yimin
  • 5 篇 robinson peter
  • 5 篇 tropp joel a.
  • 5 篇 wang mengyu
  • 5 篇 kaltofen e
  • 5 篇 alipour sharareh
  • 5 篇 gulwani s
  • 5 篇 ghodsi mohammad
  • 5 篇 wang jianxin
  • 5 篇 molla anisur rah...
  • 5 篇 lau francis c. m...
  • 5 篇 necula gc
  • 5 篇 chen jianer
  • 4 篇 sauerwald thomas
  • 4 篇 kumar manish
  • 4 篇 liu yang
  • 4 篇 mostefaoui achou...

语言

  • 585 篇 英文
  • 38 篇 其他
  • 5 篇 中文
  • 1 篇 德文
检索条件"主题词=Randomized algorithm"
628 条 记 录,以下是561-570 订阅
排序:
Fast algorithms for Large-Scale Phylogenetic Reconstruction
Fast Algorithms for Large-Scale Phylogenetic Reconstruction
收藏 引用
作者: Truszkowski, Jakub University of Waterloo
学位级别:master
One of the most fundamental computational problems in biology is that of inferring evolutionary histories of groups of species from sequence data. Such evolutionary histories, known as phylogenies are usually represen... 详细信息
来源: 评论
A Packet Scheduling Mechanism for Wireless Peer-to-Peer Content Distribution
A Packet Scheduling Mechanism for Wireless Peer-to-Peer Cont...
收藏 引用
作者: Liu, Yao Texas A&M University
学位级别:硕士
This thesis studies the problem of content distribution in wireless peer-to-peer networks with selfish nodes. In this problem a group of wireless nodes need to exchange a set of files over a lossless broadcast channel... 详细信息
来源: 评论
Topology optimization with multiple materials, multiple constraints, and multiple load cases
Topology optimization with multiple materials, multiple cons...
收藏 引用
作者: Zhang, Xiaojia Shelly Georgia Institute of Technology
学位级别:博士
Topology optimization is a practical tool that allows for improved structural designs. This thesis focuses on developing both theoretical foundations and computational algorithms for topology optimization to effective... 详细信息
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-651
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-651 by published by
来源: 评论
Signature-Free Asynchronous Byzantine Consensus with t < n/3 and O(n2) Messages  14
Signature-Free Asynchronous Byzantine Consensus with <i>t</i...
收藏 引用
ACM Symposium on Principles of Distributed Computing (PODC)
作者: Mostefaoui, Achour Moumen, Hamouma Raynal, Michel Univ Nantes LINA F-44322 Nantes France Univ Bejaia Bejaia Algeria Univ Rennes Inst Univ France Rennes France Univ Rennes IRISA Rennes France
This paper presents a new round-based asynchronous consensus algorithm that copes with up to t < n/3 Byzantine processes, where n is the total number of processes. In addition of not using signature, not assuming a... 详细信息
来源: 评论
randomized self-updating process for clustering large-scale data
收藏 引用
Statistics and Computing 2024年 第1期34卷 47-47页
作者: Shiu, Shang-Ying Chin, Yen-Shiu Lin, Szu-Han Chen, Ting-Li Department of Statistics National Taipei University New Taipei Taiwan Institute of Statistics National Tsing Hua University Hsinchu Taiwan Institute of Statistical Science Academia Sinica Taipei Taiwan
This paper introduces the randomized self-updating process (rSUP) algorithm for clustering large-scale data. rSUP is an extension of the self-updating process (SUP) algorithm, which has shown effectiveness in clusteri... 详细信息
来源: 评论
FLIP-FLOP SPECTRUM-REVEALING QR FACTORIZATION AND ITS APPLICATIONS TO SINGULAR VALUE DECOMPOSITION
收藏 引用
ELECTRONIC TRANSACTIONS ON NUMERICAL ANALYSIS 2019年 51卷 469-494页
作者: Feng, Yuehua Xiao, Jianwei Gu, Ming Shanghai Univ Engn Sci Sch Math Phys & Stat Shanghai Peoples R China Univ Calif Berkeley Dept Math Berkeley CA 94720 USA
We present the Flip-Flop Spectrum-Revealing QR (Flip-Flop SRQR) factorization, a significantly faster and more reliable variant of the QLP factorization of Stewart for low-rank matrix approximations. Flip-Flop SRQR us... 详细信息
来源: 评论
Blockchain-based immunization against kleptographic attacks
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 172-183页
作者: Changsong JIANG Chunxiang XU Jie CHEN Kefei CHEN School of Computer Science and Engineering University of Electronic Science and Technology of China Yangtze Delta Region Institute (Huzhou) University of Electronic Science and Technology of China Department of Mathematics Hangzhou Normal University
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel attacks are one of the kleptographic attacks. In such attacks, backdoors... 详细信息
来源: 评论
Volume formula and growth rates of the balls of strings under the edit distances
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2023年 第1期458卷
作者: Koyano, Hitoshi Hayashida, Morihiro Natl Agr & Food Res Org Res Ctr Agr Informat Technol 1-31-1 Kannondai Tsukuba Ibaraki 3050856 Japan Matsue Coll Natl Inst Technol Dept Elect Engn & Comp Sci 14-4 Nishiikumacho Matsue Shimane 6908518 Japan
Analogs of balls in n-dimensional Euclidean space are defined in the monoid of strings composed of letters of an alphabet if a metric is defined on the monoid. These analogs are not only balls in the monoid of strings... 详细信息
来源: 评论
COUNTING WEIGHTED INDEPENDENT SETS BEYOND THE PERMANENT
收藏 引用
SIAM JOURNAL ON DISCRETE MATHEMATICS 2021年 第2期35卷 1503-1524页
作者: Dyer, Martin Jerrum, Mark Muller, Haiko Vuskovic, Kristina Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England Queen Mary Univ London Sch Math Sci Mile End Rd London E1 4NS England
Jerrum, Sinclair, and Vigoda [J. ACM, 51 (2004), pp. 671-697] showed that the permanent of any square matrix can be estimated in polynomial time. This computation can be viewed as approximating the partition function ... 详细信息
来源: 评论