咨询与建议

限定检索结果

文献类型

  • 115 篇 期刊文献
  • 64 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 139 篇 工学
    • 107 篇 计算机科学与技术...
    • 42 篇 电气工程
    • 24 篇 信息与通信工程
    • 18 篇 软件工程
    • 17 篇 控制科学与工程
    • 9 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物工程
  • 44 篇 理学
    • 33 篇 数学
    • 4 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
  • 41 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 6 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 哲学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 180 篇 approximate algo...
  • 9 篇 optimization
  • 8 篇 minimum enclosin...
  • 7 篇 exact algorithm
  • 5 篇 kernel methods
  • 5 篇 dynamic programm...
  • 4 篇 submodular
  • 4 篇 support vector m...
  • 4 篇 approximation al...
  • 4 篇 support vector m...
  • 3 篇 social network a...
  • 3 篇 core sets
  • 3 篇 computational ge...
  • 3 篇 social networks
  • 3 篇 betweenness cent...
  • 3 篇 heuristics
  • 3 篇 iterative learni...
  • 3 篇 directed graphs
  • 3 篇 motif discovery
  • 3 篇 optimal control

机构

  • 3 篇 zhengzhou inst a...
  • 3 篇 southwest jiaoto...
  • 3 篇 xidian univ stat...
  • 3 篇 hong kong univ s...
  • 2 篇 georgia state un...
  • 2 篇 college of infor...
  • 2 篇 department of co...
  • 2 篇 beijing normal u...
  • 2 篇 univ technol syd...
  • 2 篇 univ hong kong d...
  • 2 篇 univ paris sacla...
  • 2 篇 china jiliang un...
  • 2 篇 suny stony brook...
  • 2 篇 xidian univ sch ...
  • 2 篇 telecom paris ip...
  • 2 篇 shanghai jiao to...
  • 2 篇 univ new brunswi...
  • 2 篇 jiangxi univ fin...
  • 2 篇 beijing institut...
  • 2 篇 xidian univ sch ...

作者

  • 4 篇 zheng danyang
  • 4 篇 bifet albert
  • 4 篇 abdessalem talel
  • 4 篇 wang yongqing
  • 4 篇 wang meng
  • 4 篇 cui jiangtao
  • 4 篇 li hui
  • 4 篇 chehreghani most...
  • 4 篇 cao xiaojun
  • 3 篇 chen lei
  • 3 篇 xu hong-wei
  • 2 篇 liu bo
  • 2 篇 yongqing wang
  • 2 篇 zhang xudong
  • 2 篇 li dan
  • 2 篇 soh sieteng
  • 2 篇 liu xiaorong
  • 2 篇 chang liang
  • 2 篇 guoren wang
  • 2 篇 liu lei

语言

  • 171 篇 英文
  • 8 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 中文
检索条件"主题词=approximate algorithm"
180 条 记 录,以下是1-10 订阅
A real space convolution-based approximate algorithm for phase field model involving elastic strain energy
收藏 引用
NUMERICAL METHODS FOR PARTIAL DIFFERENTIAL EQUATIONS 2024年 第6期40卷
作者: Gao, YaQian Chi, XueBin Yin, JiXian Zhang, Jian Chinese Acad Sci Comp Network Informat Ctr Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
Phase field models have been employed extensively in the study of microstructure evolution in materials. Elasticity plays an important role in solid-state phase transformation processes, and it is usually introduced i... 详细信息
来源: 评论
The Theoretical and Experimental Analysis of the Maximal Information Coefficient approximate algorithm
收藏 引用
Journal of Systems Science and Information 2021年 第1期9卷 95-104页
作者: Fubo SHAO Hui LIU State Key Laboratory of Rail Trufic Control and Safety Beijing Jiaotong UniversityBeijing 100044China The Post-Doctor Stalion of the CRRC Corporation Limited Beijing 100067ChinaCRRC AcademyBeijing 100067China School of Mathematics and Physics Qingdao Universily of Science and TechnologyQingdao 266061China
In the era of big data,correlation analysis is significant because it can quickly detect the correlation between *** then,it has been received much *** to the good properties of generality and equitability of the maxi... 详细信息
来源: 评论
Fast approximate algorithm for Robust Emergency System Design  20
Fast Approximate Algorithm for Robust Emergency System Desig...
收藏 引用
20th International Carpathian Control Conference (ICCC)
作者: Kvet, Marek Univ Zilina Fac Management Sci & Informat Univ 8215-1 Zilina 01026 Slovakia
This contribution is aimed at advanced rescue system designing. Since the modelled decisions are strategic and often have a long-term impact on accessibility and effectiveness of service providing, several aspects sho... 详细信息
来源: 评论
2-approximate algorithm for Touring a Sequence of Pairwise Disjoint Simple Polygons
2-Approximate Algorithm for Touring a Sequence of Pairwise D...
收藏 引用
2017 2nd International Conference on Computational Modeling, Simulation and Applied Mathematics(CMSAM 2017)
作者: Shun LYU Bo JIANG Dalian Maritime University
In this paper, a 2-approximate algorithm is described to answer the previously open problem "What is the complexity of the TPP for disjoint non-convex simple polygons" which is known to NP-hard. We provide a... 详细信息
来源: 评论
Heuristic and approximate Steiner tree algorithms for ensuring network connectivity in mobile wireless sensor networks
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2025年 238卷
作者: Son, Nguyen Van Hanh, Nguyen Thi Minh, Trinh The Binh, Huynh Thi Thanh Thang, Nguyen Xuan PHENIKAA Univ Fac Comp Sci Hanoi 12116 Vietnam Phenikaa Univ Fac Interdisciplinary Digital Technol Hanoi 12116 Vietnam Hanoi Univ Sci & Technol Hanoi Vietnam Hanoi Univ Hanoi Vietnam
Connectivity problems are among the most challenging issues in Mobile Wireless Sensor Networks (MWSNs). Ensuring connectivity in such networks means finding network configurations in which all mobile sensors can conne... 详细信息
来源: 评论
Exact and approximate computation of the scatter halfspace depth
收藏 引用
COMPUTATIONAL STATISTICS 2025年 第1期40卷 547-572页
作者: Liu, Xiaohui Liu, Yuzi Laketa, Petra Nagy, Stanislav Chen, Yuting Jiangxi Univ Finance & Econ Sch Stat Nanchang 330013 Jiangxi Peoples R China Charles Univ Prague Fac Math & Phys Prague 18675 Czech Republic Univ Maryland Joint Program Survey Methodol College Pk MD 20742 USA
The scatter halfspace depth (sHD) is an extension of the location halfspace (also called Tukey) depth that is applicable in the nonparametric analysis of scatter. Using sHD, it is possible to define minimax optimal ro... 详细信息
来源: 评论
Exact and approximate algorithms for Computing Betweenness Centrality in Directed Graphs
收藏 引用
FUNDAMENTA INFORMATICAE 2021年 第3期182卷 219-242页
作者: Chehreghani, Mostafa Haghir Bifet, Albert Abdessalem, Talel Amirkabir Univ Technol Dept Comp Engn Tehran Polytech Tehran Iran Telecom Paris IP Paris LTCI Paris France
Graphs (networks) are an important tool to model data in different domains. Real-world graphs are usually directed, where the edges have a direction and they are not symmetric. Betweenness centrality is an important i... 详细信息
来源: 评论
FABLE: approximate Butterfly Counting in Bipartite Graph Stream with Duplicate Edges  24
FABLE: Approximate Butterfly Counting in Bipartite Graph Str...
收藏 引用
33rd ACM International Conference on Information and Knowledge Management (CIKM)
作者: Sun, Guozhang Zhao, Yuhai Li, Yuan Northeastern Univ Shenyang Peoples R China North China Univ Technol Beijing Peoples R China
Bipartite graph models the relationship between two different sets of entities. Such graph data become more dynamic and are organized as stream with duplicate edges in real-word applications such as customer-product i... 详细信息
来源: 评论
Improving density peak clustering on multi-dimensional time series: rediscover and subdivide
收藏 引用
KNOWLEDGE AND INFORMATION SYSTEMS 2025年 第2期67卷 1573-1596页
作者: Wang, Huina Liu, Bo Zhao, Huaipu Qu, Guangzhi Beijing Univ Technol Fac Informat Technol Sch Software Engn Beijing 100124 Peoples R China Massey Univ Sch Math & Computat Sci Auckland 0745 New Zealand Oakland Univ Comp Sci & Engn Dept Rochester MI 48309 USA
The density peak clustering (DPC) algorithm identifies patterns in high-dimensional data and obtains robust outcomes across diverse data types with minimal hyperparameters. However, DPC may produce inaccurate pattern ... 详细信息
来源: 评论
An on-the-fly framework for usable access control policy mining
收藏 引用
COMPUTERS & SECURITY 2025年 150卷
作者: Guo, Yunchuan Wang, Xiao Yu, Mingjie Li, Fenghua Pang, Zhen Fang, Liang Chinese Acad Sci Inst Informat Engn Beijing 100095 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Key Lab Cyberspace Secur Def Beijing 100085 Peoples R China Univ Sci & Technol China Sch Cyber Secur Hefei 230027 Peoples R China Xiyuan Hosp CACMS Beijing 100091 Peoples R China
Access control policy mining, which extracts or infers access control policies from existing system logs or configurations within a given environment, is widely applied in policy migration. No policy mining algorithm ... 详细信息
来源: 评论