咨询与建议

限定检索结果

文献类型

  • 139 篇 期刊文献
  • 66 篇 会议
  • 3 篇 学位论文
  • 1 册 图书

馆藏范围

  • 209 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 172 篇 工学
    • 143 篇 计算机科学与技术...
    • 35 篇 电气工程
    • 34 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 7 篇 材料科学与工程(可...
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 3 篇 石油与天然气工程
    • 3 篇 网络空间安全
    • 2 篇 纺织科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
  • 70 篇 理学
    • 60 篇 数学
    • 7 篇 化学
    • 5 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 23 篇 管理学
    • 22 篇 管理科学与工程(可...
  • 4 篇 教育学
    • 4 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 医学

主题

  • 209 篇 algorithm analys...
  • 11 篇 computational co...
  • 8 篇 algorithms
  • 7 篇 parallel algorit...
  • 7 篇 attenuated total...
  • 7 篇 fourier transfor...
  • 6 篇 approximation al...
  • 6 篇 optimization
  • 5 篇 visualisation
  • 5 篇 mathematical sof...
  • 5 篇 cryptography
  • 4 篇 complex networks
  • 4 篇 majority problem
  • 4 篇 adaptive time-st...
  • 4 篇 computational st...
  • 4 篇 search trajector...
  • 4 篇 combinatorial op...
  • 4 篇 np-completeness
  • 3 篇 multi-objective ...
  • 3 篇 plurality proble...

机构

  • 5 篇 lund univ ctr ma...
  • 5 篇 univ stirling st...
  • 3 篇 artificial intel...
  • 3 篇 iit dept comp sc...
  • 2 篇 univ nancy 1 lor...
  • 2 篇 ucl england
  • 2 篇 univ oklahoma sc...
  • 2 篇 aberystwyth univ...
  • 2 篇 inria lorraine f...
  • 2 篇 univ illinois de...
  • 2 篇 univ tsukuba tsu...
  • 2 篇 univ stirling st...
  • 2 篇 australian natl ...
  • 2 篇 chinese acad sci...
  • 2 篇 karlsruhe inst t...
  • 2 篇 tech univ munich...
  • 2 篇 university of st...
  • 1 篇 natl def univ ch...
  • 1 篇 prince sultan un...
  • 1 篇 department of ma...

作者

  • 10 篇 ochoa gabriela
  • 7 篇 liu yongliang
  • 6 篇 he jun
  • 5 篇 söderlind g
  • 5 篇 kim hee-jin
  • 4 篇 wang l
  • 4 篇 aranha claus
  • 4 篇 lavinas yuri
  • 4 篇 blum christian
  • 3 篇 delhom christoph...
  • 3 篇 dunke fabian
  • 3 篇 alonso laurent
  • 3 篇 liang weifa
  • 3 篇 reingold edward ...
  • 3 篇 xu zichuan
  • 3 篇 haslbeck maximil...
  • 3 篇 collins george e...
  • 3 篇 nickel stefan
  • 2 篇 lammich peter
  • 2 篇 raywardsmith vj

语言

  • 197 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"主题词=algorithm analysis"
209 条 记 录,以下是181-190 订阅
排序:
Fault tolerant placement of stateful VNFs and dynamic fault recovery in cloud networks
收藏 引用
COMPUTER NETWORKS 2020年 166卷
作者: Yuan, Guochang Xu, Zichuan Yang, Binxu Liang, Weifa Chai, Wei Koong Tuncer, Daphne Galis, Alex Pavlou, George Wu, Guowei Dalian Univ Technol Sch Software Key Lab Ubiquitous Network & Serv Software Liaoni Dalian Peoples R China UCL London England Australian Natl Univ Canberra ACT Australia Bournemouth Univ Poole Dorset England Imperial Coll London London England
Traditional network functions such as firewalls and Intrusion Detection Systems (IDS) are implemented in costly dedicated hardware, making the networks expensive to manage and inflexible to changes. Network function v... 详细信息
来源: 评论
Determining Plurality
收藏 引用
ACM TRANSACTIONS ON algorithmS 2008年 第3期4卷 26-26页
作者: Alonso, Laurent Reingold, Edward M. INRIA Lorraine F-54506 Vandoeuvre Les Nancy France Univ Nancy 1 LORIA F-54506 Vandoeuvre Les Nancy France IIT Dept Comp Sci Chicago IL 60616 USA
Given a set of n elements, each of which is colored one of c colors, we must determine an element of the plurality (most frequently occurring) color by pairwise equal/unequal color comparisons of elements. We prove th... 详细信息
来源: 评论
Search trajectory networks: A tool for analysing and visualising the behaviour of metaheuristics
收藏 引用
APPLIED SOFT COMPUTING 2021年 109卷 107492-107492页
作者: Ochoa, Gabriela Malan, Katherine M. Blum, Christian Univ Stirling Comp Sci & Math Stirling Scotland Univ South Africa Dept Decis Sci Pretoria South Africa Artificial Intelligence Res Inst IIIA CSIC Bellaterra Spain
A large number of metaheuristics inspired by natural and social phenomena have been proposed in the last few decades, each trying to be more powerful and innovative than others. However, there is a lack of accessible ... 详细信息
来源: 评论
TKFIM: Top-K frequent itemset mining technique based on equivalence classes
收藏 引用
PEERJ COMPUTER SCIENCE 2021年 7卷 e385页
作者: Iqbal, Saood Shahid, Abdul Roman, Muhammad Khan, Zahid Al-Otaibi, Shaha Yu, Lisu Kohat Univ Sci & Technol Inst Comp Kohat Kpk Pakistan Prince Sultan Univ Robot & Internet Things Lab Riyadh Saudi Arabia Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Informat Syst Dept Riyadh Saudi Arabia Nanchang Univ Sch Informat Engn Nanchang Jiangxi Peoples R China Chinese Acad Sci Inst Comp Technol State Key Lab Comp Architecture Beijing Peoples R China
Frequently used items mining is a significant subject of data mining studies. In the last ten years, due to innovative development, the quantity of data has grown exponentially. For frequent Itemset (FIs) mining appli... 详细信息
来源: 评论
Development of an Image Data Set of Construction Machines for Deep Learning Object Detection
收藏 引用
JOURNAL OF COMPUTING IN CIVIL ENGINEERING 2021年 第2期35卷
作者: Xiao, Bo Kang, Shih-Chung Univ Alberta Dept Civil & Environm Engn Edmonton AB T6G 2R3 Canada
Deep learning object detection algorithms have proven their capacity to identify a variety of objects from images and videos in near real-time speed. The construction industry can potentially benefit from this machine... 详细信息
来源: 评论
MultiDMet: Designing a Hybrid Multidimensional Metrics Framework to Predictive Modeling for Performance Evaluation and Feature Selection
收藏 引用
Intelligent Information Management 2023年 第6期15卷 391-425页
作者: Tesfay Gidey Hailu Taye Abdulkadir Edris Department of Information and Communication Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Department of Computer Science HILCOE School of Computer Science and Technology Addis Ababa Ethiopia
In a competitive digital age where data volumes are increasing with time, the ability to extract meaningful knowledge from high-dimensional data using machine learning (ML) and data mining (DM) techniques and making d... 详细信息
来源: 评论
Average-Case Lower Bounds for the Plurality Problem
收藏 引用
ACM TRANSACTIONS ON algorithmS 2008年 第3期4卷 27-27页
作者: Alonso, Laurent Reingold, Edward M. INRIA Lorraine F-54506 Vandoeuvre Les Nancy France Univ Nancy 1 LORIA F-54506 Vandoeuvre Les Nancy France IIT Dept Comp Sci Chicago IL 60616 USA
Given a set of n elements, each of which is colored one of c >= 2 colors, we have to determine an element of the plurality ( most frequently occurring) color by pairwise equal/unequal color comparisons of elements.... 详细信息
来源: 评论
Extremal behavior of the Greedy algorithm for a triangle scheduling problem
收藏 引用
COMPUTERS & OPERATIONS RESEARCH 2024年 169卷
作者: Balogh, Janos Bekesi, Jozsef Buki, Nora Dosa, Gyorgy Tuza, Zsolt Univ Szeged Fac Sci & Informat Dept Computat Optimizat Arpad Sqr 2 H-6720 Szeged Hungary Univ Szeged Fac Sci & Informat Dept Comp Algorithms & Artificial Intelligence Arpad sqr 2 H-6720 Szeged Hungary Univ Pannonia Fac Informat Technol Dept Math Egyet str 10 H-8200 Veszprem Hungary HUN REN Alfred Reny Inst Math Realtanoda str 13-15 H-1053 Budapest Hungary Univ Pannonia Fac Informat Technol Dept Comp Sci & Syst Technol Egyet str 10 H-8200 Veszprem Hungary
We study the mixed-criticality scheduling problem, where the goal is to schedule jobs with different criticality levels on a single machine. As shown by D & uuml;rr et al. (2018), the problem can be treated as a s... 详细信息
来源: 评论
The Computing Time of the Euclidean algorithm
收藏 引用
SIAM Journal on Computing 1974年 第1期3卷 1-10页
作者: George E. Collins
The minimum, maximum and average computing times of the classical Euclidean algorithm are derived. With positive integer inputs of lengths m and n, and with output (greatest common divisor) of length k, m≧n≧km≧n≧k... 详细信息