咨询与建议

限定检索结果

文献类型

  • 145 篇 期刊文献
  • 75 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 195 篇 工学
    • 111 篇 电气工程
    • 103 篇 计算机科学与技术...
    • 38 篇 信息与通信工程
    • 25 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 软件工程
    • 9 篇 机械工程
    • 6 篇 交通运输工程
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
  • 46 篇 理学
    • 23 篇 数学
    • 18 篇 物理学
    • 4 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 12 篇 医学
    • 10 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学

主题

  • 221 篇 computation comp...
  • 43 篇 computational co...
  • 8 篇 iterative method...
  • 8 篇 communication co...
  • 7 篇 optimisation
  • 6 篇 optimization
  • 6 篇 key distribution
  • 5 篇 multicast commun...
  • 5 篇 storage complexi...
  • 5 篇 privacy
  • 4 篇 approximation al...
  • 4 篇 markov processes
  • 4 篇 embedded systems
  • 4 篇 parity check cod...
  • 4 篇 vectors
  • 4 篇 computational mo...
  • 4 篇 radiofrequency i...
  • 4 篇 feature extracti...
  • 4 篇 vlsi
  • 4 篇 complexity theor...

机构

  • 3 篇 nanyang technol ...
  • 2 篇 srm inst sci & t...
  • 2 篇 nanjing univ sci...
  • 2 篇 anna univ chenna...
  • 2 篇 huazhong univ sc...
  • 2 篇 beijing inst tec...
  • 2 篇 mil tech coll au...
  • 2 篇 univ chinese aca...
  • 2 篇 yangzhou univ co...
  • 2 篇 univ coll engn t...
  • 2 篇 chinese acad sci...
  • 2 篇 xidian univ natl...
  • 2 篇 beijing key lab ...
  • 2 篇 xidian univ stat...
  • 2 篇 anna univ chenna...
  • 2 篇 beijing univ pos...
  • 2 篇 yamaguchi univ f...
  • 2 篇 univ auckland de...
  • 1 篇 henan univ sch m...
  • 1 篇 yamaguchi univ f...

作者

  • 3 篇 zhang lei
  • 3 篇 bose s.
  • 3 篇 kannan a.
  • 3 篇 vijayakumar p.
  • 2 篇 li sheng
  • 2 篇 amutha r.
  • 2 篇 he sun
  • 2 篇 zhang enze
  • 2 篇 deepa n.
  • 2 篇 deborah lazarus ...
  • 2 篇 li weijun
  • 2 篇 balaji l.
  • 2 篇 khoussainov bakh...
  • 2 篇 cui sheng
  • 2 篇 chen qingwei
  • 2 篇 lim olivier
  • 2 篇 mancini stephane
  • 2 篇 pandiaraja p.
  • 2 篇 chen weigang
  • 2 篇 tu yicong

语言

  • 207 篇 英文
  • 11 篇 其他
  • 2 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=computation complexity"
221 条 记 录,以下是161-170 订阅
排序:
A Nearest Transmitter Classification Method for VLC Based Positioning System
A Nearest Transmitter Classification Method for VLC Based Po...
收藏 引用
22nd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Sertthin, Chinnapat Ohtsuki, Tomoaki Takyu, Osamu Fujii, Takeo Umeda, Yohtaro Keio Univ Fac Sci & Technol Dept Informat & Comp Sci Tokyo 108 Japan Shinshu Univ Div Sci & Technol Dept Elect Engn Matsumoto Nagano Japan Univ Electrocommun AWCC Chofu Tokyo Japan Tokyo Univ Sci Dept Elect Engn Fac Sci & Technol Tokyo Japan
Nearest transmitter information is a mandatory requirement for utilizing Switching Estimated Receiver Position (SwERP) scheme, of which was proposed to enhance accuracy of Visible Light ID (VLID) positioning system. T... 详细信息
来源: 评论
THE STUDY OF AN M-ARY MC-CDMA SYSTEM BASED ON CYCLIC SPREADING CODES & PRE-EQUALIZATION
收藏 引用
Journal of Electronics(China) 2005年 第3期22卷 273-280页
作者: ChuZhenyong YingXiaofan YiKechu TianHongxin NationalKeyLab.ofISN XidianUniversityXi'an710071China//TheTelecommunicationEngineeringInstituteAirForceEngineeringUniversityXi'an710077China NationalKeyLab.ofISN XidianUniversityXi'an710071China
A novel fast despreading scheme for M-ary Multi-Carrier Code-Division Multiple Access (MC-CDMA) system is proposed based on cyclic spreading codes and pre-equalizer. In the transmitter, the M spreading codes of each u... 详细信息
来源: 评论
Rai-Choo! Evolving Blind Signatures to the Next Level  42nd
Rai-Choo! Evolving Blind Signatures to the Next Level
收藏 引用
42nd Annual International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt)
作者: Hanzlik, Lucjan Loss, Julian Wagner, Benedikt CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Saarland Univ Saarbrucken Germany
Blind signatures are a fundamental tool for privacy-preserving applications. Known constructions of concurrently secure blind signature schemes either are prohibitively inefficient or rely on nonstandard assumptions, ... 详细信息
来源: 评论
A New Approach for Affine-invariant Image Matching
A New Approach for Affine-invariant Image Matching
收藏 引用
International Conference on Mechatronics and Semiconductor Materials (ICMSCM 2013)
作者: Chen, Wenlong Xiao, Baihua Wang, Chunheng Chinese Acad Sci Inst Automat State Key Lab Management & Control Complex Syst Beijing Peoples R China
Affine-invariant matching is one of the challenging fields for image matching. Although several algorithms (ASIFT, Fair-SURF) have been proposed and achieved expressive performance, all these method need to simulate p... 详细信息
来源: 评论
An optimization on GLRT-based detection for LTE PUCCH
An optimization on GLRT-based detection for LTE PUCCH
收藏 引用
IEEE/CIC International Conference on Communications in China (ICCC)
作者: Xie, Lijun Peng, Tao Wang, Wenbo Beijing Univ Posts & Telecommun Wireless Signal Proc & Network Beijing Peoples R China
This paper gives a basic optimization on the detection of Uplink Control Information (UCI) transmitted in Long Term Evolution (LTE) Physical Uplink Control Channel (PUCCH). UCI includes HARQ-ACK and Channel Quality In... 详细信息
来源: 评论
Design and Implementation of Extended Predictive Functional Control for Boiler-Turbine Unit of Power Plant  24
Design and Implementation of Extended Predictive Functional ...
收藏 引用
24th Mediterranean Conference on Control and Automation (MED)
作者: Farahani, Maryam Amirabadi Haeri, Mohammad Islamic Azad Univ Dept Elect Engn Sci & Res Branch Tehran Iran Sharif Univ Technol Dept Elect Engn Adv Control Syst Lab Tehran Iran
In this paper, a new model predictive controller is introduced to control a power unit process with three inputs and three outputs. This method is proposed to reduce the complexity of the required computation. In fact... 详细信息
来源: 评论
Delay-Optimal User Scheduling and Inter-Cell Interference Management in Cellular Network via Distributive Stochastic Learning
Delay-Optimal User Scheduling and Inter-Cell Interference Ma...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 2010)
作者: Huang, Huang Lau, Vincent K. N. Hong Kong Univ Sci & Technol Kowloon Hong Kong Peoples R China
In this paper, we propose a distributive queue-aware intra-cell user scheduling and inter-cell interference (ICI) management control design for a delay-optimal cellular downlink system with M base stations(BSs). Each ... 详细信息
来源: 评论
Efficient Encoder Structures for Non-Binary Cycle Codes
Efficient Encoder Structures for Non-Binary Cycle Codes
收藏 引用
6th International Conference on Wireless Communications, Networking and Mobile Computing (WICOM)
作者: Chen, Weigang Tianjin Univ Sch Elect & Informat Engn Tianjin 300072 Peoples R China
Low-density parity-check codes with variable node degree two over high order Galois fields, also called non-binary cycle codes, exhibit good error correction performance. In this paper, several efficient encoder struc... 详细信息
来源: 评论
Asymptotically Optimal Interconnection Networks from Two-State Cells
收藏 引用
IEEE Transactions on Computers 1979年 第7期C-28卷 500-505页
作者: Chung, Kin-Man Department of Computer Science University of Illinois Urbana IL 61801 United States IBM Thomas J. Watson Research Center Yorktown Heights NY 10598 United States
Some special classes of interconnection networks for n terminals are considered, namely, partitioning networks and full switches. Constructions for them are presented. For the former, the resulting total count of (two... 详细信息
来源: 评论
Study on multiscale least squares and application in parameter identification
Study on multiscale least squares and application in paramet...
收藏 引用
5th International Conference on Machine Learning and Cybernetics
作者: Wen, Cheng-Lin Wang, Guang-Jiang Wang, Song-Wei Zheng, Zhu-Lin Henan Inst Sci & Technol Xinxiang 453003 Peoples R China Henan Univ Sch Comp & Informat Engn Kaifeng 475001 Peoples R China
In various theoretical research and engineering, the long memory processes are widely found and studied in many applications. Maximum likelihood Estimation is usually used to capture the relevant parameters, but it ca... 详细信息
来源: 评论