咨询与建议

限定检索结果

文献类型

  • 22,880 篇 会议
  • 9,162 篇 期刊文献
  • 64 篇 学位论文

馆藏范围

  • 32,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,066 篇 工学
    • 10,144 篇 计算机科学与技术...
    • 4,899 篇 电气工程
    • 3,159 篇 软件工程
    • 2,690 篇 信息与通信工程
    • 1,954 篇 控制科学与工程
    • 740 篇 机械工程
    • 682 篇 电子科学与技术(可...
    • 606 篇 航空宇航科学与技...
    • 534 篇 仪器科学与技术
    • 230 篇 交通运输工程
    • 212 篇 材料科学与工程(可...
    • 196 篇 化学工程与技术
    • 171 篇 生物工程
    • 157 篇 测绘科学与技术
    • 137 篇 土木工程
    • 135 篇 生物医学工程(可授...
    • 133 篇 动力工程及工程热...
  • 10,469 篇 理学
    • 9,403 篇 数学
    • 876 篇 物理学
    • 768 篇 系统科学
    • 744 篇 统计学(可授理学、...
    • 265 篇 生物学
    • 236 篇 化学
    • 126 篇 地球物理学
  • 2,501 篇 管理学
    • 1,935 篇 管理科学与工程(可...
    • 676 篇 工商管理
    • 560 篇 图书情报与档案管...
  • 418 篇 经济学
    • 387 篇 应用经济学
  • 211 篇 医学
    • 175 篇 临床医学
  • 180 篇 法学
    • 167 篇 社会学
  • 128 篇 文学
  • 128 篇 农学
  • 37 篇 教育学
  • 27 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 32,106 篇 approximation al...
  • 2,737 篇 algorithm design...
  • 2,351 篇 optimization
  • 2,306 篇 approximation me...
  • 2,175 篇 heuristic algori...
  • 1,424 篇 linear programmi...
  • 1,418 篇 convergence
  • 1,279 篇 computational mo...
  • 1,217 篇 resource managem...
  • 1,143 篇 signal processin...
  • 957 篇 computer science
  • 914 篇 clustering algor...
  • 914 篇 polynomials
  • 910 篇 complexity theor...
  • 789 篇 mathematical mod...
  • 752 篇 vectors
  • 710 篇 programming
  • 654 篇 estimation
  • 622 篇 training
  • 614 篇 transportation

机构

  • 97 篇 univ maryland de...
  • 68 篇 technion israel ...
  • 55 篇 univ waterloo de...
  • 49 篇 cornell univ dep...
  • 44 篇 tsinghua univers...
  • 39 篇 national institu...
  • 39 篇 carnegie mellon ...
  • 38 篇 iit dept comp sc...
  • 35 篇 national mobile ...
  • 34 篇 shandong univ sc...
  • 32 篇 sichuan univ col...
  • 31 篇 school of comput...
  • 31 篇 nanjing univ sta...
  • 29 篇 univ chinese aca...
  • 29 篇 technion haifa
  • 29 篇 princeton univ p...
  • 29 篇 suny stony brook...
  • 28 篇 epfl
  • 28 篇 hong kong polyte...
  • 28 篇 tel aviv univers...

作者

  • 64 篇 woodruff david p...
  • 64 篇 ravi r.
  • 52 篇 kortsarz guy
  • 45 篇 lee euiwoong
  • 43 篇 levin asaf
  • 41 篇 chan timothy m.
  • 40 篇 kumar amit
  • 37 篇 chen zhi-zhong
  • 36 篇 friggstad zachar...
  • 33 篇 kawarabayashi ke...
  • 32 篇 manurangsi pasin
  • 31 篇 wang lusheng
  • 31 篇 chalermsook pari...
  • 30 篇 gudmundsson joac...
  • 29 篇 thai my t.
  • 29 篇 williamson david...
  • 29 篇 carmi paz
  • 28 篇 saha barna
  • 28 篇 zenklusen rico
  • 27 篇 dinitz michael

语言

  • 31,287 篇 英文
  • 669 篇 其他
  • 115 篇 中文
  • 9 篇 日文
  • 8 篇 俄文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"主题词=approximation algorithms"
32106 条 记 录,以下是1991-2000 订阅
排序:
Modeling of Spatial-temporal Sea Clutter with I/Q Components Based on the Data-driven approximation of Koopman Theory
Modeling of Spatial-temporal Sea Clutter with I/Q Components...
收藏 引用
Photonics and Electromagnetics Research Symposium (PIERS)
作者: Zhang, Y. M. Jiang, L. J. Univ Hong Kong Dept Elect & Elect Engn Hong Kong Peoples R China
In this paper, a novel data-driven approximation of the Koopman theory algorithm is proposed to simulate the coherent and spatial-temporal correlated sea clutter. The evolution of sea clutter's in-phase and quadra... 详细信息
来源: 评论
Cost Minimization for Equilibrium Transition  38
Cost Minimization for Equilibrium Transition
收藏 引用
38th AAAI Conference on Artificial Intelligence (AAAI) / 36th Conference on Innovative Applications of Artificial Intelligence / 14th Symposium on Educational Advances in Artificial Intelligence
作者: Huang, Haoqiang Wang, Zihe Wei, Zhide Zhang, Jie Hong Kong Univ Sci & Technol Hong Kong Peoples R China Renmin Univ China Beijing Peoples R China Peking Univ Beijing Peoples R China Univ Bath Bath Avon England
In this paper, we delve into the problem of using monetary incentives to encourage players to shift from an initial Nash equilibrium to a more favorable one within a game. Our main focus revolves around computing the ... 详细信息
来源: 评论
Covering a Graph with Densest Subgraphs
收藏 引用
Matematica 2024年 第4期3卷 1360-1378页
作者: Dondi, Riccardo Popa, Alexandru Dipartimento di Lettere Filosofia Comunicazione Università degli Studi di Bergamo Bergamo Italy Department of Computer Science University of Bucharest Bucharest Romania
Finding densest subgraphs is a fundamental problem in graph mining, with several applications in different fields. In this paper, we consider two variants of the problem of covering a graph with k densest subgraphs, w... 详细信息
来源: 评论
Graph Partitioning with a Move Budget  27
Graph Partitioning with a Move Budget
收藏 引用
27th International Conference on Artificial Intelligence and Statistics (AISTATS)
作者: Behbahani, Majid Dalirrooyfard, Mina Fata, Elaheh Nevmyvaka, Yuriy Morgan Stanley Montreal PQ Canada Queens Univ Kingston ON Canada
In many real world networks, there already exists a (not necessarily optimal) k-partitioning of the network. Oftentimes, one aims to find a k-partitioning with a smaller cut value for such networks by moving only a fe... 详细信息
来源: 评论
Total Variation Distance Meets Probabilistic Inference  41
Total Variation Distance Meets Probabilistic Inference
收藏 引用
41st International Conference on Machine Learning (ICML)
作者: Bhattacharyya, Arnab Gayen, Sutanu Meel, Kuldeep S. Myrisiotis, Dimitrios Pavan, A. Vinodchandran, N. V. Natl Univ Singapore Sch Comp Singapore Singapore Indian Inst Technol Kanpur Dept Comp Sci & Engn Kanpur Uttar Pradesh India Univ Toronto Dept Comp Sci Toronto ON Canada CNRS CREATE LTD Singapore Singapore Iowa State Univ Dept Comp Sci Ames IA USA Univ Nebraska Lincoln Sch Comp Lincoln NE USA
In this paper, we establish a novel connection between total variation (TV) distance estimation and probabilistic inference. In particular, we present an efficient, structure-preserving reduction from relative approxi... 详细信息
来源: 评论
Promoting Counterfactual Robustness through Diversity  38
Promoting Counterfactual Robustness through Diversity
收藏 引用
38th AAAI Conference on Artificial Intelligence (AAAI) / 36th Conference on Innovative Applications of Artificial Intelligence / 14th Symposium on Educational Advances in Artificial Intelligence
作者: Leofante, Francesco Potyka, Nico Imperial Coll London Dept Comp London England Cardiff Univ Sch Comp Sci & Informat Cardiff Wales
Counterfactual explanations shed light on the decisions of black-box models by explaining how an input can be altered to obtain a favourable decision from the model (e.g., when a loan application has been rejected). H... 详细信息
来源: 评论
Decimated Prony's Method for Stable Super-Resolution
收藏 引用
IEEE Signal Processing Letters 2023年 30卷 1467-1471页
作者: Katz, Rami Diab, Nuha Batenkov, Dmitry University of Trento Department of Industrial Engineering Trento38122 Italy Tel Aviv University Department of Applied Mathematics School of Mathematical Sciences Tel Aviv6997801 Israel
We study recovery of amplitudes and nodes of a finite impulse train from noisy frequency samples. This problem is known as super-resolution under sparsity constraints and has numerous applications. An especially chall... 详细信息
来源: 评论
A Better-Than-2 approximation for Weighted Tree Augmentation  62
A Better-Than-2 Approximation for Weighted Tree Augmentation
收藏 引用
62nd IEEE Annual Symposium on Foundations of Computer Science (FOCS)
作者: Traub, Vera Zenklusen, Rico Swiss Fed Inst Technol Dept Math Zurich Switzerland
We present an approximation algorithm for Weighted Tree Augmentation with approximation factor 1 + ln 2+ epsilon < 1.7. This is the first algorithm beating the longstanding factor of 2, which can be achieved throug... 详细信息
来源: 评论
Semantic Communication-assisted Physical Layer Security over Fading Wiretap Channels  59
Semantic Communication-assisted Physical Layer Security over...
收藏 引用
59th Annual IEEE International Conference on Communications (IEEE ICC)
作者: Mu, Xidong Liu, Yuanwei Queen Mary Univ London Sch Elect Engn & Comp Sci London England
A novel semantic communication (SC)-assisted secrecy transmission framework is proposed. In particular, the legitimate transmitter (Tx) sends the superimposed semantic and bit stream to the legitimate receiver (Rx), w... 详细信息
来源: 评论
Fault-Tolerant Total Domination via Submodular Function approximation  17th
Fault-Tolerant Total Domination via Submodular Function Appr...
收藏 引用
17th Annual Conference on Theory and Applications of Models of Computation (TAMC)
作者: Lamprou, Ioannis Sigalas, Ioannis Vaxevanakis, Ioannis Zissimopoulos, Vassilis Natl & Kapodistrian Univ Athens Dept Informat & Telecommun Athens Greece
In total domination, given a graph G = (V, E), we seek a minimum-size set of nodes S subset of V, such that every node in V \ S has at least one neighbor in S and every node in S also has at least one neighbor in S. W... 详细信息
来源: 评论