咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 106 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 201 篇 工学
    • 191 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 35 篇 电气工程
    • 7 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 88 篇 理学
    • 86 篇 数学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 2 篇 系统科学
    • 1 篇 生物学
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 217 篇 streaming algori...
  • 14 篇 approximation al...
  • 12 篇 communication co...
  • 11 篇 algorithms
  • 9 篇 submodular maxim...
  • 9 篇 heavy hitters
  • 8 篇 clustering
  • 8 篇 theory
  • 8 篇 online algorithm...
  • 8 篇 lower bounds
  • 8 篇 randomized algor...
  • 6 篇 graph partitioni...
  • 6 篇 graph algorithms
  • 6 篇 sketches
  • 6 篇 data streams
  • 6 篇 sampling
  • 5 篇 distinct element...
  • 5 篇 triangle countin...
  • 5 篇 set cover
  • 5 篇 quantiles

机构

  • 10 篇 carnegie mellon ...
  • 5 篇 charles univ pra...
  • 4 篇 mit cambridge ma...
  • 4 篇 harvard univ sch...
  • 4 篇 johns hopkins un...
  • 4 篇 univ warwick cov...
  • 3 篇 indian stat inst...
  • 3 篇 univ nebraska li...
  • 3 篇 univ penn philad...
  • 3 篇 univ waterloo sc...
  • 3 篇 xi an jiao tong ...
  • 3 篇 tel aviv univ te...
  • 3 篇 natl univ singap...
  • 3 篇 univ penn dept c...
  • 2 篇 weizmann inst sc...
  • 2 篇 alan turing inst...
  • 2 篇 georgetown univ ...
  • 2 篇 peking univ peop...
  • 2 篇 univ michigan an...
  • 2 篇 sandia natl labs...

作者

  • 12 篇 woodruff david p...
  • 9 篇 braverman vladim...
  • 9 篇 cormode graham
  • 7 篇 vesely pavel
  • 7 篇 zhou samson
  • 6 篇 assadi sepehr
  • 6 篇 khanna sanjeev
  • 6 篇 velusamy santhos...
  • 5 篇 sudan madhu
  • 5 篇 wang pinghui
  • 5 篇 chou chi-ning
  • 4 篇 golovnev alexand...
  • 4 篇 meel kuldeep s.
  • 4 篇 czumaj artur
  • 4 篇 bender michael a...
  • 4 篇 farach-colton ma...
  • 4 篇 vinodchandran n....
  • 4 篇 indyk piotr
  • 4 篇 guan xiaohong
  • 4 篇 hernandez cecili...

语言

  • 214 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Streaming algorithms"
217 条 记 录,以下是101-110 订阅
排序:
An approximate L1-difference algorithm or massive data streams
收藏 引用
SIAM JOURNAL ON COMPUTING 2003年 第1期32卷 131-151页
作者: Feigenbaum, J Kannan, S Strauss, MJ Viswanathan, M Yale Univ Dept Comp Sci New Haven CT 06520 USA Univ Penn Dept Comp & Informat Sci Philadelphia PA 19104 USA AT&T Labs Res Florham Pk NJ 07932 USA Univ Illinois Dept Comp Sci Urbana IL 61801 USA
Massive data sets are increasingly important in a wide range of applications, including observational sciences, product marketing, and the monitoring and operations of large systems. In network operations, raw data ty... 详细信息
来源: 评论
An Optimal Algorithm for l1-Heavy Hitters in Insertion Streams and Related Problems
收藏 引用
ACM TRANSACTIONS ON algorithms 2019年 第1期15卷 1–27页
作者: Bhattacharyya, Arnab Dey, Palash Woodruff, David P. Indian Inst Sci CSA Dept Bangalore Karnataka India IIT Kharagpur CSE Dept Kharagpur W Bengal India Carnegie Mellon Univ Sch Comp Sci Pittsburgh PA 15213 USA Indian Inst Technol Dept Comp Sci & Engn A-204 Kharagpur 721302 W Bengal India
We give the first optimal bounds for returning the l(1)-heavy hitters in a data stream of insertions, together with their approximate frequencies, closing a long line of work on this problem. For a stream of m items i... 详细信息
来源: 评论
Tracking triadic cardinality distributions for burst detection in high-speed graph streams
收藏 引用
KNOWLEDGE AND INFORMATION SYSTEMS 2021年 第4期63卷 939-969页
作者: Zhao, Junzhou Wang, Pinghui Chen, Zhouguo Ding, Jianwei Lui, John C. S. Towsley, Don Guan, Xiaohong Xi An Jiao Tong Univ MOE Key Lab Intelligent Networks & Network Secur Xian 710049 Peoples R China Xi An Jiao Tong Univ Shenzhen Res Inst Shenzhen 518057 Peoples R China China Elect Technol Grp Corp Sci & Technol Commun Secur Lab Res Inst 30 Chengdu 610041 Peoples R China Chinese Univ Hong Kong Dept Comp Sci & Engn Shatin Hong Kong Peoples R China Univ Massachusetts Sch Comp Sci Amherst MA 01003 USA
In everyday life, we often observe unusually frequent interactions among people before or during important events, e.g., people send/receive more greetings to/from their friends on holidays than regular days. We also ... 详细信息
来源: 评论
A High-Throughput Hardware Accelerator for Network Entropy Estimation Using Sketches
收藏 引用
IEEE ACCESS 2021年 9卷 85823-85838页
作者: Soto, Javier E. Ubisse, Paulo Fernandez, Yaime Hernandez, Cecilia Figueroa, Miguel Univ Concepcion Elect Engn Dept Concepcion 4030000 Chile Univ Concepcion Comp Sci Dept Concepcion 4030000 Chile Ctr Biotechnol & Bioengn CeBiB Santiago 8370456 Chile
Network traffic monitoring uses empirical entropy to detect anomalous events such as various types of attacks. However, the exact computation of the entropy in high-speed networks is a difficult process due to the lim... 详细信息
来源: 评论
Identifying Taxonomic Units in Metagenomic DNA Streams on Mobile Devices
收藏 引用
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS 2023年 第2期20卷 1092-1103页
作者: Zheng, Vicky Sariyuce, Ahmet Erdem Zola, Jaroslaw Univ Buffalo Dept Comp Sci Buffalo NY 14260 USA
With the emergence of portable DNA sequencers, such as Oxford Nanopore Technology MinION, metagenomic DNA sequencing can be performed in real-time and directly in the field. However, because metagenomic DNA analysis t... 详细信息
来源: 评论
Tight Bounds for Sliding Bloom Filters
收藏 引用
ALGORITHMICA 2015年 第4期73卷 652-672页
作者: Naor, Moni Yogev, Eylon Weizmann Inst Sci Dept Comp Sci & Appl Math IL-76100 Rehovot Israel
A Bloom filter is a method for reducing the space (memory) required for representing a set by allowing a small error probability. In this paper we consider a Sliding Bloom Filter: a data structure that, given a stream... 详细信息
来源: 评论
ProbMinHash - A Class of Locality-Sensitive Hash algorithms for the (Probability) Jaccard Similarity
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2022年 第7期34卷 3491-3506页
作者: Ertl, Otmar Dynatrace Res A-4020 Linz Austria
The probability Jaccard similarity was recently proposed as a natural generalization of the Jaccard similarity to measure the proximity of sets whose elements are associated with relative frequencies or probabilities.... 详细信息
来源: 评论
An Improved Frequent Directions Algorithm for Low-Rank Approximation via Block Krylov Iteration
收藏 引用
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024年 第7期35卷 9428-9442页
作者: Wang, Chenhao Yi, Qianxin Liao, Xiuwu Wang, Yao Xi An Jiao Tong Univ Ctr Intelligent Decis Making & Machine Learning Sch Management Xian 710049 Peoples R China
Frequent Directions, as a deterministic matrix sketching technique, has been proposed for tackling low-rank approximation problems. This method has a high degree of accuracy and practicality, but experiences a lot of ... 详细信息
来源: 评论
Periodicity in Data Streams with Wildcards
收藏 引用
THEORY OF COMPUTING SYSTEMS 2020年 第1期64卷 177-197页
作者: Ergun, Funda Grigorescu, Elena Azer, Erfan Sadeqi Zhou, Samson Indiana Univ Sch Informat & Comp Bloomington IN 47405 USA Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
We investigate the problem of detecting periodic trends within a string S of length n, arriving in the streaming model, containing at most k wildcard characters, where k = o(n). A wildcard character is a special chara... 详细信息
来源: 评论
On scalable attack detection in the network
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2007年 第1期15卷 14-25页
作者: Kompella, Ramana Rao Singh, Sumeet Varghese, George Univ Calif San Diego Dept Comp Sci La Jolla CA 92093 USA
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we kno... 详细信息
来源: 评论