咨询与建议

限定检索结果

文献类型

  • 22,879 篇 会议
  • 9,164 篇 期刊文献
  • 64 篇 学位论文

馆藏范围

  • 32,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,066 篇 工学
    • 10,144 篇 计算机科学与技术...
    • 4,897 篇 电气工程
    • 3,148 篇 软件工程
    • 2,691 篇 信息与通信工程
    • 1,964 篇 控制科学与工程
    • 740 篇 机械工程
    • 683 篇 电子科学与技术(可...
    • 605 篇 航空宇航科学与技...
    • 535 篇 仪器科学与技术
    • 230 篇 交通运输工程
    • 212 篇 材料科学与工程(可...
    • 196 篇 化学工程与技术
    • 171 篇 生物工程
    • 156 篇 测绘科学与技术
    • 137 篇 土木工程
    • 135 篇 生物医学工程(可授...
    • 133 篇 动力工程及工程热...
  • 10,465 篇 理学
    • 9,398 篇 数学
    • 877 篇 物理学
    • 768 篇 系统科学
    • 742 篇 统计学(可授理学、...
    • 265 篇 生物学
    • 236 篇 化学
    • 127 篇 地球物理学
  • 2,499 篇 管理学
    • 1,934 篇 管理科学与工程(可...
    • 676 篇 工商管理
    • 559 篇 图书情报与档案管...
  • 418 篇 经济学
    • 387 篇 应用经济学
  • 211 篇 医学
    • 175 篇 临床医学
  • 180 篇 法学
    • 167 篇 社会学
  • 128 篇 文学
  • 128 篇 农学
  • 37 篇 教育学
  • 27 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 32,107 篇 approximation al...
  • 2,737 篇 algorithm design...
  • 2,351 篇 optimization
  • 2,306 篇 approximation me...
  • 2,175 篇 heuristic algori...
  • 1,424 篇 linear programmi...
  • 1,418 篇 convergence
  • 1,280 篇 computational mo...
  • 1,216 篇 resource managem...
  • 1,142 篇 signal processin...
  • 957 篇 computer science
  • 914 篇 clustering algor...
  • 914 篇 polynomials
  • 911 篇 complexity theor...
  • 789 篇 mathematical mod...
  • 753 篇 vectors
  • 710 篇 programming
  • 653 篇 estimation
  • 621 篇 training
  • 614 篇 transportation

机构

  • 97 篇 univ maryland de...
  • 68 篇 technion israel ...
  • 55 篇 univ waterloo de...
  • 49 篇 cornell univ dep...
  • 44 篇 tsinghua univers...
  • 39 篇 national institu...
  • 39 篇 carnegie mellon ...
  • 38 篇 iit dept comp sc...
  • 35 篇 national mobile ...
  • 34 篇 shandong univ sc...
  • 32 篇 sichuan univ col...
  • 31 篇 school of comput...
  • 31 篇 nanjing univ sta...
  • 29 篇 univ chinese aca...
  • 29 篇 technion haifa
  • 29 篇 princeton univ p...
  • 29 篇 suny stony brook...
  • 28 篇 epfl
  • 28 篇 hong kong polyte...
  • 28 篇 tel aviv univers...

作者

  • 64 篇 woodruff david p...
  • 64 篇 ravi r.
  • 52 篇 kortsarz guy
  • 45 篇 lee euiwoong
  • 43 篇 levin asaf
  • 41 篇 chan timothy m.
  • 40 篇 kumar amit
  • 37 篇 chen zhi-zhong
  • 36 篇 friggstad zachar...
  • 33 篇 kawarabayashi ke...
  • 32 篇 manurangsi pasin
  • 31 篇 wang lusheng
  • 31 篇 chalermsook pari...
  • 30 篇 gudmundsson joac...
  • 29 篇 thai my t.
  • 29 篇 williamson david...
  • 29 篇 carmi paz
  • 28 篇 saha barna
  • 28 篇 zenklusen rico
  • 27 篇 dinitz michael

语言

  • 31,278 篇 英文
  • 679 篇 其他
  • 115 篇 中文
  • 9 篇 日文
  • 8 篇 俄文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"主题词=approximation algorithms"
32107 条 记 录,以下是4701-4710 订阅
排序:
Basic Study on Near-field Range Migration for Millimeter-wave 2D-MIMO Radar
Basic Study on Near-field Range Migration for Millimeter-wav...
收藏 引用
International Symposium on Antennas and Propagation (ISAP)
作者: Kosaku Shigeta Hiroyoshi Yamada Rhoichi Sato Hiroyuki Kamo Graduate School of Science & Technology Niigata University Niigata Japan TAIYO YUDEN Co. Ltd Japan
The main objective of our research is to construct a security system using millimeter-wave 2D-MIMO radar to check the possession of dangerous objects such as knives and guns. In our previous study, to realize 3D imagi... 详细信息
来源: 评论
Ship Detection and Classification in Adverse Weather Conditions
Ship Detection and Classification in Adverse Weather Conditi...
收藏 引用
International Conference on Computer Science and Engineering (UBMK)
作者: Yahya İzala Yaşar Becerikli Kocaeli Üniversitesi Bilgisayar Mühendisliği Kocaeli Türkiye Adli Bilişim İhtisas Dairesi Adli Tıp Kurumu İstanbul Türkiye
The use of Unmanned Aerial Vehicles (UAVs) is quite common today. Equipped with various tools, these vehicles are actively utilized in both civilian and military fields. Due to their high-altitude photography, images ... 详细信息
来源: 评论
Approximating the Geometric Knapsack Problem in Near-Linear Time and Dynamically
arXiv
收藏 引用
arXiv 2024年
作者: Buchem, Moritz Deuker, Paul Wiese, Andreas Technische Universität München Munich Germany
One important goal in algorithm design is determining the best running time for solving a problem (approximately). For some problems, we know the optimal running time, assuming certain conditional lower bounds. In thi... 详细信息
来源: 评论
The Indistinguishability Query
The Indistinguishability Query
收藏 引用
International Conference on Data Engineering
作者: Ashwin Lall Department of Computer Science Denison University Granville OH US
We propose the indistinguishability query for iden-tifying all of a user's near-optimal tuples. This query returns all the tuples that are at most a small fraction away from the optimal of the user's unknown u... 详细信息
来源: 评论
A Simple LP-Based approximation Algorithm for the Matching Augmentation Problem
arXiv
收藏 引用
arXiv 2022年
作者: Bamas, Étienne Drygala, Marina Svensson, Ola EPFL Switzerland
The Matching Augmentation Problem (MAP) has recently received significant attention as an important step towards better approximation algorithms for finding cheap 2-edge connected subgraphs. This has culminated in a 5... 详细信息
来源: 评论
Iterative Learning and Model Predictive Control for Repetitive Nonlinear Systems via Koopman Operator approximation
Iterative Learning and Model Predictive Control for Repetiti...
收藏 引用
IEEE Conference on Decision and Control
作者: M. Bahadır Saltık Bayu Jayawardhana Ashish Cherukuri Faculty of Science and Engineering University of Groningen Groningen The Netherlands
This paper presents an iterative way of computing a control algorithm with the aim of enabling reference tracking for an unknown nonlinear system. The method consists of three blocks: iterative learning control (ILC),... 详细信息
来源: 评论
Non-stationary Bandits with Habituation and Recovery Dynamics and Knapsack Constraints
Non-stationary Bandits with Habituation and Recovery Dynamic...
收藏 引用
IEEE Conference on Decision and Control
作者: Qinyang He Yonatan Mintz Department of Industrial and Systems Engineering University of Wisconsin-Madison Madison WI USA
Multi-armed bandit models have proven to be useful in modeling many real world problems in the areas of control and sequential decision making with partial information. However, in many scenarios, such as those preval... 详细信息
来源: 评论
AGV Path Planning Algorithm Based on Improved DQN
AGV Path Planning Algorithm Based on Improved DQN
收藏 引用
Information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Ge Sun Rui Zhang Peng Xia Jingwen Xu School of Automobile and Transportation Tianjin University of Technology and Education Tianjin China Tianjin Dolphin Intelligent Driving Technology Co. Ltd
In the context of rapid growth in the logistics and e-commerce industries, improving the efficiency of automated warehousing systems, particularly in sorting and throughput, has become crucial. Automated guided vehicl... 详细信息
来源: 评论
NLOS Satellites Detection Method Applying Relative Positioning
NLOS Satellites Detection Method Applying Relative Positioni...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Ryuga Hayashi Yukihiro Kubo Department of Electronical and Electronic Engineering Ritsumeikan University Shiga Japan
In this paper, we present a detection method for non-line-of-sight (NLOS) satellites applying relative positioning. NLOS satellites affect the accuracy of positioning, and conventional approach to reduce the effect of... 详细信息
来源: 评论
Secrecy Capacity Analyses and Trajectory Optimization for IRS-UAV Networks
Secrecy Capacity Analyses and Trajectory Optimization for IR...
收藏 引用
International Conference on Telecommunications and Signal Processing (TSP)
作者: Mustafa Namdar Arif Basgumus Nurullah Calik Hakan Alakoca Lutfiye Durak-Ata Electrical and Electronics Eng. Dept. Kutahya Dumlupinar University Kutahya Turkey Electrical and Electronics Eng. Dept. Bursa Uludag University Bursa Turkey Biomedical Eng. Dept. Istanbul Medeniyet University Istanbul Turkey Informatics Institute Istanbul Technical University Istanbul Turkey
In this study, an intelligent reflective surface (IRS)-assisted communication system has been investigated from the perspective of secrecy capacity analysis. Analyses have been conducted in the presence of a group of ... 详细信息
来源: 评论