咨询与建议

限定检索结果

文献类型

  • 1,286 篇 期刊文献
  • 60 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,138 篇 工学
    • 998 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 101 篇 力学(可授工学、理...
    • 70 篇 电气工程
    • 34 篇 控制科学与工程
    • 29 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 食品科学与工程(可...
  • 497 篇 理学
    • 390 篇 数学
    • 103 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 161 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 2 篇 医学
    • 2 篇 临床医学
  • 2 篇 军事学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 1,349 篇 analysis of algo...
  • 111 篇 computational co...
  • 87 篇 data structures
  • 81 篇 algorithms
  • 80 篇 design of algori...
  • 79 篇 combinatorial pr...
  • 71 篇 computational ge...
  • 56 篇 approximation al...
  • 49 篇 graph algorithms
  • 40 篇 parallel algorit...
  • 35 篇 random graphs
  • 35 篇 networks
  • 35 篇 online algorithm...
  • 31 篇 sorting
  • 28 篇 scheduling
  • 27 篇 dynamic programm...
  • 25 篇 parallel process...
  • 24 篇 on-line algorith...
  • 23 篇 heuristics
  • 22 篇 hashing

机构

  • 11 篇 vidyasagar univ ...
  • 8 篇 technion israel ...
  • 8 篇 purdue univ dept...
  • 7 篇 univ calif river...
  • 7 篇 zhejiang univ de...
  • 6 篇 univ freiburg in...
  • 6 篇 purdue univ dept...
  • 6 篇 at&t bell labs m...
  • 5 篇 columbia univ gr...
  • 5 篇 univ illinois de...
  • 5 篇 brown univ dept ...
  • 5 篇 columbia univ de...
  • 5 篇 inst math sci ma...
  • 5 篇 univ stellenbosc...
  • 4 篇 tel aviv univ sc...
  • 4 篇 ibm corp thomas ...
  • 4 篇 univ waterloo de...
  • 4 篇 georgia inst tec...
  • 4 篇 univ paris 09 la...
  • 4 篇 brown univ dept ...

作者

  • 11 篇 neininger r
  • 11 篇 pal madhumangal
  • 11 篇 lee dt
  • 10 篇 vitter js
  • 9 篇 devroye l
  • 9 篇 hassin r
  • 8 篇 atallah mj
  • 8 篇 pal m
  • 7 篇 flajolet p
  • 7 篇 zdeborova lenka
  • 7 篇 italiano gf
  • 7 篇 apostolico a
  • 7 篇 hambrusch se
  • 7 篇 han yj
  • 7 篇 rubinstein s
  • 7 篇 ward mark daniel
  • 7 篇 preparata fp
  • 6 篇 szpankowski w
  • 6 篇 tang cy
  • 6 篇 mondal sukumar

语言

  • 1,287 篇 英文
  • 62 篇 其他
检索条件"主题词=analysis of algorithms"
1349 条 记 录,以下是31-40 订阅
排序:
Non-traditional spectral clustering algorithms for the detection of community structure in complex networks: a comparative analysis
收藏 引用
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT 2011年 第5期2011卷 P05012-P05012页
作者: Ma, Xiaoke Gao, Lin Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China
The detection of community structure in complex networks is crucial since it provides insight into the substructures of the whole network. Spectral clustering algorithms that employ the eigenvalues and eigenvectors of... 详细信息
来源: 评论
A statistical physics approach for the analysis of machine learning algorithms on real data
收藏 引用
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT 2005年 第11期2005卷 17-49页
作者: Malzahn, D Opper, M Univ Karlsruhe Inst Math Stochast D-76218 Karlsruhe Germany Univ Gottingen Dept Genet Epidemiol D-37073 Gottingen Germany Univ Southampton Sch Elect & Comp Sci Southampton SO17 1BJ Hants England
We combine the replica approach of statistical physics with a variational technique to make it applicable for the analysis of machine learning algorithms on real data. The method is applied to Gaussian process models ... 详细信息
来源: 评论
The binomial transform and the analysis of skip lists
收藏 引用
THEORETICAL COMPUTER SCIENCE 2006年 第1-3期352卷 136-158页
作者: Poblete, PV Munro, JI Papadakis, T Univ Chile Dept Comp Sci Santiago Chile Univ Waterloo Dept Comp Sci Waterloo ON N2L 3G1 Canada Legato Syst Canada Inc Burlington ON L7N 3J5 Canada
To any sequence of real numbers (n >= 0), we can associate another sequence (s >= 0), which Knuth calls its binomial transform. This transform is defined through the rule as = Bsan = Sigma(n) (-1)(n) ((s)(n)) a(... 详细信息
来源: 评论
Dynamical sources in information theory:: A general analysis of trie structures
收藏 引用
ALGORITHMICA 2001年 第1-2期29卷 307-369页
作者: Clément, J Flajolet, P Vallée, B Univ Caen GREYC F-14032 Caen France INRIA Rocquencourt Algorithms Project F-78150 Le Chesnay France
Digital trees, also known as tries, are a general purpose flexible data structure that implements dictionaries built on sets of words. An analysis is given of three major representations of tries in the form of array-... 详细信息
来源: 评论
On the cavity method for decimated random constraint satisfaction problems and the analysis of belief propagation guided decimation algorithms
收藏 引用
JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT 2009年 第9期2009卷 P09001-P09001页
作者: Ricci-Tersenghi, Federico Semerjian, Guilhem Univ Roma La Sapienza Dipartimento Fis I-00185 Rome Italy Univ Paris 06 LPTENS CNRS UMR 8549 F-75231 Paris 05 France Univ Paris 06 ENS Associee F-75231 Paris 05 France
We introduce a version of the cavity method for diluted mean field spin models that allows the computation of thermodynamic quantities similar to the Franz-Parisi quenched potential in sparse random graph models. This... 详细信息
来源: 评论
DESIGN AND analysis OF PARALLEL MONTE-CARLO algorithms
收藏 引用
SIAM JOURNAL ON SCIENTIFIC AND STATISTICAL COMPUTING 1987年 第1期8卷 S73-S95页
作者: BHAVSAR, VC ISAAC, JR INDIAN INST TECHNOL DEPT COMP SCI & ENGNBOMBAY 400076INDIA
This paper demonstrates that the potential of intrinsic parallelism in Monte Carlo methods, which has remained essentially untapped so far, can be exploited to implement these methods efficiently on SIMD and MIMD comp... 详细信息
来源: 评论
Security analysis of an RFID tag search protocol
收藏 引用
INFORMATION PROCESSING LETTERS 2016年 第10期116卷 618-622页
作者: Jannati, Hoda Bahrak, Behnam Inst Res Fundamental Sci IPM Sch Comp Sci Tehran Iran Univ Tehran Dept Elect & Comp Engn Tehran Iran
Over the past decade, tag search protocols have been suggested to efficiently acquire a specific RFID tag among a large group of tags by an RFID reader. For instance, in a warehouse, where there are thousands of packa... 详细信息
来源: 评论
On the analysis of linear probing hashing
收藏 引用
ALGORITHMICA 1998年 第4期22卷 490-515页
作者: Flajolet, P Poblete, P Viola, A Univ Chile Dept Comp Sci Santiago Chile Pedeciba Informat Montevideo Uruguay
This paper presents moment analyses and characterizations of limit distributions for the construction cost of hash tables under the linear probing strategy. Two models are considered, that of full tables and that of s... 详细信息
来源: 评论
THE DESIGN AND analysis OF BUCKETSORT FOR BUBBLE MEMORY SECONDARY STORAGE
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1985年 第3期34卷 218-234页
作者: LINDSTROM, EE VITTER, JS BROWN UNIV DEPT COMP SCIPROVIDENCERI 02912
BucketSort is a new external sorting algorithm for very large files that is a substantial improvement over merge sorting with disks. BucketSort requires an associative secondary storage device, which can be realized b... 详细信息
来源: 评论
AN APPROXIMATE analysis OF THE PERFORMANCE OF EXTENDIBLE HASHING WITH ELASTIC BUCKETS
收藏 引用
INFORMATION PROCESSING LETTERS 1993年 第1期48卷 13-20页
作者: HACHEM, NI Department of Computer Science Worcester Polytechnic Institute Worcester MA 01609 USA
This paper extends the analysis of extendible hashing to cover partial expansions with elastic buckets. Although previous studies of elastic buckets can be adapted to extendible hashing, the approach taken here provid... 详细信息
来源: 评论