咨询与建议

限定检索结果

文献类型

  • 22,880 篇 会议
  • 9,162 篇 期刊文献
  • 64 篇 学位论文

馆藏范围

  • 32,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,066 篇 工学
    • 10,144 篇 计算机科学与技术...
    • 4,899 篇 电气工程
    • 3,159 篇 软件工程
    • 2,690 篇 信息与通信工程
    • 1,954 篇 控制科学与工程
    • 740 篇 机械工程
    • 682 篇 电子科学与技术(可...
    • 606 篇 航空宇航科学与技...
    • 534 篇 仪器科学与技术
    • 230 篇 交通运输工程
    • 212 篇 材料科学与工程(可...
    • 196 篇 化学工程与技术
    • 171 篇 生物工程
    • 157 篇 测绘科学与技术
    • 137 篇 土木工程
    • 135 篇 生物医学工程(可授...
    • 133 篇 动力工程及工程热...
  • 10,469 篇 理学
    • 9,403 篇 数学
    • 876 篇 物理学
    • 768 篇 系统科学
    • 744 篇 统计学(可授理学、...
    • 265 篇 生物学
    • 236 篇 化学
    • 126 篇 地球物理学
  • 2,501 篇 管理学
    • 1,935 篇 管理科学与工程(可...
    • 676 篇 工商管理
    • 560 篇 图书情报与档案管...
  • 418 篇 经济学
    • 387 篇 应用经济学
  • 211 篇 医学
    • 175 篇 临床医学
  • 180 篇 法学
    • 167 篇 社会学
  • 128 篇 文学
  • 128 篇 农学
  • 37 篇 教育学
  • 27 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 32,106 篇 approximation al...
  • 2,737 篇 algorithm design...
  • 2,351 篇 optimization
  • 2,306 篇 approximation me...
  • 2,175 篇 heuristic algori...
  • 1,424 篇 linear programmi...
  • 1,418 篇 convergence
  • 1,279 篇 computational mo...
  • 1,217 篇 resource managem...
  • 1,143 篇 signal processin...
  • 957 篇 computer science
  • 914 篇 clustering algor...
  • 914 篇 polynomials
  • 910 篇 complexity theor...
  • 789 篇 mathematical mod...
  • 752 篇 vectors
  • 710 篇 programming
  • 654 篇 estimation
  • 622 篇 training
  • 614 篇 transportation

机构

  • 97 篇 univ maryland de...
  • 68 篇 technion israel ...
  • 55 篇 univ waterloo de...
  • 49 篇 cornell univ dep...
  • 44 篇 tsinghua univers...
  • 39 篇 national institu...
  • 39 篇 carnegie mellon ...
  • 38 篇 iit dept comp sc...
  • 35 篇 national mobile ...
  • 34 篇 shandong univ sc...
  • 32 篇 sichuan univ col...
  • 31 篇 school of comput...
  • 31 篇 nanjing univ sta...
  • 29 篇 univ chinese aca...
  • 29 篇 technion haifa
  • 29 篇 princeton univ p...
  • 29 篇 suny stony brook...
  • 28 篇 epfl
  • 28 篇 hong kong polyte...
  • 28 篇 tel aviv univers...

作者

  • 64 篇 woodruff david p...
  • 64 篇 ravi r.
  • 52 篇 kortsarz guy
  • 45 篇 lee euiwoong
  • 43 篇 levin asaf
  • 41 篇 chan timothy m.
  • 40 篇 kumar amit
  • 37 篇 chen zhi-zhong
  • 36 篇 friggstad zachar...
  • 33 篇 kawarabayashi ke...
  • 32 篇 manurangsi pasin
  • 31 篇 wang lusheng
  • 31 篇 chalermsook pari...
  • 30 篇 gudmundsson joac...
  • 29 篇 thai my t.
  • 29 篇 williamson david...
  • 29 篇 carmi paz
  • 28 篇 saha barna
  • 28 篇 zenklusen rico
  • 27 篇 dinitz michael

语言

  • 31,287 篇 英文
  • 669 篇 其他
  • 115 篇 中文
  • 9 篇 日文
  • 8 篇 俄文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"主题词=approximation algorithms"
32106 条 记 录,以下是2071-2080 订阅
排序:
Simple Combinatorial Construction of the ko(1)-Lower Bound for Approximating the Parameterized k-Clique  8
Simple Combinatorial Construction of the ko(1)-Lower Bound f...
收藏 引用
8th SIAM Symposium on Simplicity of algorithms, SOSA 2025
作者: Chen, Yijia Feng, Yi Laekhanukit, Bundit Liu, Yanlin Shanghai Jiao Tong University China Shanghai University of Finance and Economics China School of Mathematical Sciences Ocean University of China China
In the parameterized k-clique problem, or k-Clique for short, we are given a graph G and a parameter k ≥ 1. The goal is to decide whether there exist k vertices in G that induce a complete subgraph (i.e., a k-clique)... 详细信息
来源: 评论
Partitioning Friends Fairly  37
Partitioning Friends Fairly
收藏 引用
37th AAAI Conference on Artificial Intelligence (AAAI) / 35th Conference on Innovative Applications of Artificial Intelligence / 13th Symposium on Educational Advances in Artificial Intelligence
作者: Li, Lily Micha, Evi Nikolov, Aleksandar Shah, Nisarg Univ Toronto Dept Comp Sci Toronto ON Canada
We consider the problem of partitioning n agents in an undirected social network into k almost equal in size (differing by at most one) groups, where the utility of an agent for a group is the number of her neighbors ... 详细信息
来源: 评论
AirNN: A Featherweight Framework for Dynamic Input-Dependent approximation of CNNs
收藏 引用
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 2021年 第10期40卷 2090-2103页
作者: Hemmat, Maedeh San Miguel, Joshua Davoodi, Azadeh Univ Wisconsin Dept Elect & Comp Engn 1415 Johnson Dr Madison WI 53706 USA
In this work, we propose AirNN, a novel framework which enables dynamic approximation of an already-trained convolutional neural network (CNN) in hardware during inference. AirNN enables input-dependent approximation ... 详细信息
来源: 评论
Network-Level Optimization for Unbalanced Power Distribution System: approximation and Relaxation
收藏 引用
IEEE TRANSACTIONS ON POWER SYSTEMS 2021年 第5期36卷 4126-4139页
作者: Jha, Rahul Ranjan Dubey, Anamika Washington State Univ Sch Elect Engn & Comp Sci Pullman WA 99164 USA
The nonlinear programming (NLP) problem to solve distribution-level optimal power flow (D-OPF) poses convergence issues and does not scale well for unbalanced distribution systems. The existing scalable D-OPF algorith... 详细信息
来源: 评论
approximation of the Constrained Joint Spectral Radius via Algebraic Lifting
收藏 引用
IEEE TRANSACTIONS ON AUTOMATIC CONTROL 2021年 第7期66卷 3386-3392页
作者: Xu, Xiangru Ackmese, Behcet Univ Wisconsin Dept Mech Engn Madison WI 53706 USA Univ Washington Dept Aeronaut & Astronaut Seattle WA 98195 USA
This article studies the constrained switching (linear) system which is a discrete-time switched linear system whose switching sequences are constrained by a deterministic finite automaton. The stability of a constrai... 详细信息
来源: 评论
An approximation algorithm for the balanced capacitated minimum spanning tree problem
收藏 引用
SCIENTIA IRANICA 2021年 第3期28卷 1479-1492页
作者: Fallah, H. Didehvar, F. Rahmati, F. Amirkabir Univ Technol Dept Math & Comp Sci POB 15875-4418 Tehran Iran
Capacitated Minimum Spanning Tree Problem (CMSTP), a well-known combinatorial optimization problem, holds the central place in telecommunication network design. This problem involves finding a minimum cost spanning tr... 详细信息
来源: 评论
Soft Capacitated Two-Stage Stochastic Facility Location Problem  25th
Soft Capacitated Two-Stage Stochastic Facility Location Prob...
收藏 引用
25th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2024
作者: Guo, Yingying Li, Qiaoliang Zhang, Li School of Mathematics and Statistics Hunan Normal University Hunan Changsha410081 China College of Information and Intelligence Hunan Agricultural University Hunan Changsha410000 China
The two-stage stochastic facility location problem (SFL) has been extensively studied in the literature. However, as a crucial and worthwhile direction of SFL, the capacity variant of the SFL remains relatively u... 详细信息
来源: 评论
Simultaneous Perturbation Stochastic approximation-Based Consensus for Tracking Under Unknown-But-Bounded Disturbances
收藏 引用
IEEE TRANSACTIONS ON AUTOMATIC CONTROL 2021年 第8期66卷 3710-3717页
作者: Granichin, Oleg Erofeeva, Victoria Ivanskiy, Yury Jiang, Yuming St Petersburg State Univ Sci & Educ Ctr Math Robot & Artificial Intelligen St Petersburg 198504 Russia Norwegian Univ Sci & Technol NTNU Dept Informat Secur & Commun Technol NO-7491 Trondheim Norway
We consider a setup where a distributed set of sensors working cooperatively can estimate an unknown signal of interest, whereas any individual sensor cannot fulfill the task due to lack of necessary information diver... 详细信息
来源: 评论
Fast Greedy Subset Selection From Large Candidate Solution Sets in Evolutionary Multiobjective Optimization
收藏 引用
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 2022年 第4期26卷 750-764页
作者: Chen, Weiyu Ishibuchi, Hisao Shang, Ke Southern Univ Sci & Technol Dept Comp Sci & Engn Guangdong Prov Key Lab Brain Inspired Intelligent Shenzhen 518055 Peoples R China
Subset selection plays an important role in the field of evolutionary multiobjective optimization (EMO). Especially, in an EMO algorithm with an unbounded external archive (UEA), subset selection is an essential post-... 详细信息
来源: 评论
Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2022年 第12期44卷 9536-9548页
作者: Dong, Yinpeng Cheng, Shuyu Pang, Tianyu Su, Hang Zhu, Jun Tsinghua Univ Beijing Natl Res Ctr Informat Sci & Technol Tsinghua Bosch Joint Ctr Machine Learning Inst Artificial IntelligenceDept Comp Sci & Tech Beijing 100084 Peoples R China Pazhou Lab Guangzhou 510330 Peoples R China
Adversarial attacks have been extensively studied in recent years since they can identify the vulnerability of deep learning models before deployed. In this paper, we consider the black-box adversarial setting, where ... 详细信息
来源: 评论