咨询与建议

限定检索结果

文献类型

  • 145 篇 期刊文献
  • 75 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 195 篇 工学
    • 111 篇 电气工程
    • 103 篇 计算机科学与技术...
    • 38 篇 信息与通信工程
    • 25 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 16 篇 仪器科学与技术
    • 16 篇 软件工程
    • 9 篇 机械工程
    • 6 篇 交通运输工程
    • 3 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
  • 45 篇 理学
    • 22 篇 数学
    • 18 篇 物理学
    • 4 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 12 篇 医学
    • 10 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学

主题

  • 221 篇 computation comp...
  • 43 篇 computational co...
  • 8 篇 iterative method...
  • 8 篇 communication co...
  • 7 篇 optimisation
  • 6 篇 optimization
  • 6 篇 key distribution
  • 5 篇 multicast commun...
  • 5 篇 storage complexi...
  • 5 篇 privacy
  • 4 篇 approximation al...
  • 4 篇 markov processes
  • 4 篇 embedded systems
  • 4 篇 parity check cod...
  • 4 篇 vectors
  • 4 篇 computational mo...
  • 4 篇 radiofrequency i...
  • 4 篇 feature extracti...
  • 4 篇 vlsi
  • 4 篇 complexity theor...

机构

  • 3 篇 nanyang technol ...
  • 2 篇 srm inst sci & t...
  • 2 篇 nanjing univ sci...
  • 2 篇 anna univ chenna...
  • 2 篇 huazhong univ sc...
  • 2 篇 beijing inst tec...
  • 2 篇 mil tech coll au...
  • 2 篇 univ chinese aca...
  • 2 篇 yangzhou univ co...
  • 2 篇 univ coll engn t...
  • 2 篇 chinese acad sci...
  • 2 篇 xidian univ natl...
  • 2 篇 beijing key lab ...
  • 2 篇 xidian univ stat...
  • 2 篇 anna univ chenna...
  • 2 篇 beijing univ pos...
  • 2 篇 yamaguchi univ f...
  • 2 篇 univ auckland de...
  • 1 篇 henan univ sch m...
  • 1 篇 yamaguchi univ f...

作者

  • 3 篇 zhang lei
  • 3 篇 bose s.
  • 3 篇 kannan a.
  • 3 篇 vijayakumar p.
  • 2 篇 li sheng
  • 2 篇 amutha r.
  • 2 篇 he sun
  • 2 篇 zhang enze
  • 2 篇 deepa n.
  • 2 篇 deborah lazarus ...
  • 2 篇 li weijun
  • 2 篇 balaji l.
  • 2 篇 khoussainov bakh...
  • 2 篇 cui sheng
  • 2 篇 chen qingwei
  • 2 篇 lim olivier
  • 2 篇 mancini stephane
  • 2 篇 pandiaraja p.
  • 2 篇 chen weigang
  • 2 篇 tu yicong

语言

  • 207 篇 英文
  • 11 篇 其他
  • 2 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=computation complexity"
221 条 记 录,以下是51-60 订阅
排序:
Two secret sharing schemes based on Boolean operations
收藏 引用
PATTERN RECOGNITION 2007年 第10期40卷 2776-2785页
作者: Wang, Daoshun Zhang, Lei Ma, Ning Li, Xiaobo Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Univ Alberta Dept Comp Sci Edmonton AB Canada
Traditional secret sharing schemes involve complex computation. A visual secret sharing (VSS) scheme decodes the secret without computation, but each shadow is m times as big as the original. Probabilistic VSS solved ... 详细信息
来源: 评论
computational Scheme of Ordinary Differential Equations Integration on the Basis of Differential Taylor Transformation with Automatic Step and Order Selection
收藏 引用
JOURNAL OF AUTOMATION AND INFORMATION SCIENCES 2012年 第12期44卷 12-22页
作者: Rakushev, M. Yu. Natl Aviat Univ Zhitomir SP Korolev Mil Inst Kiev Ukraine
The computational scheme of ordinary differential equations integration with the automatic step size and order selection of the scheme developed on the basis of differential Taylor transformation is offered. The adapt... 详细信息
来源: 评论
Improved square root adaptive cubature Kalman filter
收藏 引用
IET SIGNAL PROCESSING 2019年 第7期13卷 641-649页
作者: Zhang, Lei Li, Sheng Zhang, Enze Chen, Qingwei Guo, Jian Nanjing Univ Sci & Technol Sch Automat Nanjing 210094 Jiangsu Peoples R China Yangzhou Univ Coll Informat Engn Yangzhou 225009 Jiangsu Peoples R China
In this study, an improved square root adaptive cubature Kalman filter (ISRACKF) is proposed to improve the filter performance in terms of accuracy, computation efficiency, and robustness. Through the evaluated measur... 详细信息
来源: 评论
Efficient move blocking strategy for multiple shooting-based non-linear model predictive control
收藏 引用
IET CONTROL THEORY AND APPLICATIONS 2020年 第2期14卷 343-351页
作者: Chen, Yutao Scarabottolo, Nicolo Bruschetta, Mattia Beghi, Alessandro Eindhoven Univ Technol Dept Elect Engn Eindhoven Netherlands Univ Padua Dept Informat Engn Padua Italy
Move blocking (MB) is a widely used strategy to reduce the degrees of freedom (DoFs) of the optimal control problem (OCP) arising in receding horizon control. The size of the OCP is reduced by forcing the input variab... 详细信息
来源: 评论
Symmetric Private Polynomial computation From Lagrange Encoding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2022年 第4期68卷 2704-2718页
作者: Zhu, Jinbao Yan, Qifa Tang, Xiaohu Li, Songze Southwest Jiaotong Univ Informat Coding & Transmiss Key Lab Sichuan Prov CSNMT Int Cooperat Res Ctr Most Chengdu 611756 Peoples R China Hong Kong Univ Sci & Technol Thrust Internet Things Guangzhou 511458 Peoples R China
The problem of X-secure T-colluding symmetric Private Polynomial computation (PPC) from coded storage system with B Byzantine and U unresponsive servers is studied in this paper. Specifically, a dataset consisting of ... 详细信息
来源: 评论
FACE CONTOUR EXTRACTION FROM FRONT-VIEW IMAGES
收藏 引用
PATTERN RECOGNITION 1995年 第8期28卷 1167-1179页
作者: LI, XB ROEDER, N Department of Computing Science University of Alberta Edmonton Alberta T6G 2H1 Canada
Facial feature detection is crucial for visual recognition of human faces. This paper reports on a study in detecting face contours from front-view ID-type pictures. Based on the eye and mouth positions, which can be ... 详细信息
来源: 评论
Spectrum sidelobe suppression for discrete Fourier transformation-based orthogonal frequency division multiplexing using adjacent subcarriers correlative coding
收藏 引用
IET COMMUNICATIONS 2012年 第11期6卷 1374-1381页
作者: Xu, R. Chen, M. Zhang, J. Wu, B. Wang, H. Nanjing Inst Commun Engn Nanjing Jiangsu Peoples R China Southeast Univ Natl Mobile Commun Res Lab Nanjing Jiangsu Peoples R China
The large spectrum sidelobes of orthogonal frequency division multiplexing (OFDM) signal lead to the interference with the licensed user working on the adjacent band in spectrum pooling. The power spectral leakage of ... 详细信息
来源: 评论
An efficient group key agreement protocol for secure P2P communication
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 3952-3965页
作者: Vijayakumar, Pandi Naresh, Ramu Deborah, Lazarus Jegatha Islam, Sk Hafizul Univ Coll Engn Tindivanam Dept Comp Sci & Engn Melpakkam 604001 Tamil Nadu India Birla Inst Technol & Sci Dept Comp Sci & Informat Syst Pilani Campus Pilani 333031 Rajasthan India
The efficient design of a distributed group key management for a peer to peer (P2P) network with minimal computation complexity in dynamic secure group communication is a challenging issue. This is because of the abse... 详细信息
来源: 评论
Invisible and Steganalysis-Resistant Deep Image Hiding Based on One-Way Adversarial Invertible Networks
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2024年 第7期34卷 6128-6143页
作者: Hu, Xinjue Fu, Zhangjie Zhang, Xiang Chen, Yanyu Nanjing Univ Informat Sci & Technol Engn Res Ctr Digital Forens Minist Educ Nanjing 210044 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China
Deep image hiding is a challenging image processing task that aims to hide a secret image into a cover image of equal size perfectly. How to improve the imperceptibility of deep image hiding while ensuring high comput... 详细信息
来源: 评论
Multi-server blind quantum computation protocol with limited classical communication among servers
收藏 引用
QUANTUM INFORMATION PROCESSING 2022年 第3期21卷 1-13页
作者: Sano, Yuichi Kyoto Univ Dept Nucl Engn Nishikyo Ku Kyoto Kyoto 6158540 Japan
A user who does not have a quantum computer but wants to perform quantum computations may delegate his/her computation to a quantum cloud server. For users securely using the service, it must be assured that no malici... 详细信息
来源: 评论