咨询与建议

限定检索结果

文献类型

  • 108 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 129 篇 工学
    • 103 篇 计算机科学与技术...
    • 30 篇 电气工程
    • 22 篇 软件工程
    • 13 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 6 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 57 篇 理学
    • 49 篇 数学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 5 篇 医学
    • 4 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 艺术学

主题

  • 149 篇 deterministic al...
  • 12 篇 mobile agent
  • 9 篇 distributed algo...
  • 9 篇 rendezvous
  • 8 篇 optimization
  • 7 篇 randomized algor...
  • 7 篇 gathering
  • 6 篇 network
  • 6 篇 deterministic al...
  • 5 篇 matroid constrai...
  • 4 篇 graph
  • 4 篇 mobile robots
  • 4 篇 multiple access ...
  • 4 篇 global optimizat...
  • 4 篇 probabilistic al...
  • 4 篇 cost
  • 4 篇 dispersion
  • 3 篇 mobile agents
  • 3 篇 computational ge...
  • 3 篇 anonymous graphs

机构

  • 7 篇 univ quebec outa...
  • 4 篇 univ picardie ju...
  • 4 篇 univ liverpool d...
  • 4 篇 univ picardie ju...
  • 4 篇 univ quebec outa...
  • 3 篇 indian inst tech...
  • 3 篇 shandong normal ...
  • 3 篇 univ colorado de...
  • 2 篇 aix marseille un...
  • 2 篇 dhirubhai ambani...
  • 2 篇 beijing univ tec...
  • 2 篇 augusta univ sch...
  • 2 篇 indian inst tech...
  • 2 篇 univ liverpool d...
  • 2 篇 cnrs lif marseil...
  • 2 篇 univ picardie ju...
  • 2 篇 kyoto univ grad ...
  • 2 篇 univ new south w...
  • 2 篇 univ quebec dept...
  • 2 篇 indian inst tech...

作者

  • 16 篇 pelc andrzej
  • 14 篇 dieudonne yoann
  • 6 篇 mondal kaushik
  • 5 篇 kowalski dariusz...
  • 4 篇 bouchard sebasti...
  • 4 篇 chlebus bogdan s...
  • 3 篇 gorain barun
  • 3 篇 li min
  • 3 篇 suter david
  • 3 篇 anantharamu laks...
  • 3 篇 de marco gianluc...
  • 3 篇 miller avery
  • 3 篇 matousek j
  • 3 篇 kaur tanvir
  • 2 篇 ibaraki t
  • 2 篇 ivanyos gabor
  • 2 篇 guo longkun
  • 2 篇 xiao guobao
  • 2 篇 pandit supantha
  • 2 篇 rousseeuw peter ...

语言

  • 144 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"主题词=deterministic algorithm"
149 条 记 录,以下是111-120 订阅
排序:
algorithmic research on surface roughness in laser-melted claddings: A review
收藏 引用
SURFACE ENGINEERING 2024年 第9-10期40卷 933-944页
作者: Zhao, Changlong Zhang, Zihao Yu, Zice Du, Weilong Changchun Univ Coll Mech & Vehicle Engn Changchun 130022 Jilin Peoples R China
As a breakthrough of the additive manufacturing technology being achieved, many fields have broadly applied laser cladding due to its unique advantages. But the surface characteristics of the cladding layer are not fr... 详细信息
来源: 评论
HOW TO MEET ASYNCHRONOUSLY AT POLYNOMIAL COST
收藏 引用
SIAM JOURNAL ON COMPUTING 2015年 第3期44卷 844-867页
作者: Dieudonne, Yoann Pelc, Andrzej Villain, Vincent Univ Picardie Jules Verne MIS F-80000 Amiens France Univ Quebec Outaouais Dept Informat & Ingn Gatineau PQ J8X 3X7 Canada
Two mobile agents starting at different nodes of an unknown network have to meet. This task is known in the literature as rendezvous. Each agent has a different label which is a positive integer known to it but unknow... 详细信息
来源: 评论
Nested Multiplicative Random Number Generator An efficient tool for increasing security in social networking  2
Nested Multiplicative Random Number Generator An efficient t...
收藏 引用
2nd International Conference on Computer, Communication, and Signal Processing (ICCCSP) - Special Focus on Technology and Innovation for Smart Environment
作者: Thomas, Antu Annam Paul, Varghese Mar Thoma Coll Dept Comp Applicat Thiruvalla Kerala India Cochin Univ Sci & Technol Dept Informat Technol Cochi Kerala India
Randomness plays an important role in cryptography algorithms. Increasing randomness of the seed value increases the security offered by any algorithms in cryptography. In this work a novel random number generator was... 详细信息
来源: 评论
Maximization of k-Submodular Function with a Matroid Constraint  17th
Maximization of k-Submodular Function with a Matroid Constra...
收藏 引用
17th Annual Conference on Theory and Applications of Models of Computation (TAMC)
作者: Sun, Yunjing Liu, Yuezhu Li, Min Shandong Normal Univ Sch Math & Stat Jinan 250014 Peoples R China
A k-submodular function is a promotion of a submodular function, whose domain is composed of k disjoint subsets rather than a single subset. In this paper, we give a deterministic algorithm for the non-monotone k-subm... 详细信息
来源: 评论
Fault-Tolerant Rendezvous in Networks
Fault-Tolerant Rendezvous in Networks
收藏 引用
41st International Colloquium on Automata, Languages and Programming (ICALP)
作者: Chalopin, Jeremie Dieudonne, Yoann Labourel, Arnaud Pelc, Andrzej CNRS LIF Marseille France Aix Marseille Univ Marseille France Univ Picardie Jules Verne MIS Amiens France Univ Quebec Outaouais Dept Informat Gatineau PQ Canada
Two mobile agents, starting from different nodes of an unknown network, have to meet at the same node. Agents move in synchronous rounds using a deterministic algorithm. Each agent has a different label, which it can ... 详细信息
来源: 评论
Testing primality deterministically
Testing primality deterministically
收藏 引用
International Meeting on Quantum Information Science
作者: Toffalori, C Univ Camerino Dept Math & Comp Sci I-62032 Camerino Italy
We introduce and discuss the recent Agrawal-Kayal-Saxena deterministic algorithm solving primality in polynomial time.
来源: 评论
An Investigation on Tree-Based Tags Anti-Collision algorithms in RFID
An Investigation on Tree-Based Tags Anti-Collision Algorithm...
收藏 引用
International Conference on Computer Network, Electronic and Automation (ICCNEA)
作者: Su Xiaohao Liu Baolong Xian Technol Univ Sch Comp Sci & Engn Xian 710021 Shaanxi Peoples R China
The tree-based tags anti-collision algorithm is an important method in the anti-collision algorithms. In this paper, several typical tree algorithms are evaluated. The comparison of algorithms is summarized including ... 详细信息
来源: 评论
Towards derandomising Markov chain Monte Carlo  64
Towards derandomising Markov chain Monte Carlo
收藏 引用
64th Annual IEEE Symposium on the Foundations of Computer Science (FOCS)
作者: Feng, Weiming Guo, Heng Wang, Chunyang Wang, Jiaheng Yin, Yitong Univ Calif Berkeley Simons Inst Berkeley CA 94720 USA Univ Edinburgh Sch Informat Edinburgh Scotland Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
We present a new framework to derandomise certain Markov chain Monte Carlo (MCMC) algorithms. As in MCMC, we first reduce counting problems to sampling from a sequence of marginal distributions. For the latter task, w... 详细信息
来源: 评论
Distributed algorithms for Maximum Clique in Wireless Networks  11
Distributed Algorithms for Maximum Clique in Wireless Networ...
收藏 引用
11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
作者: Luo, Chuanwen Yu, Jiguo Yu, Dongxiao Cheng, Xiuzhen Qufu Normal Univ Sch Informat Sci & Engn Rizhao 276826 Shandong Peoples R China Univ Hong Kong Dept Comp Sci Pokfulam Hong Kong Peoples R China George Washington Univ Dept Comp Sci Washington DC USA
In communication networks such as social networks, wireless networks and biology networks, it is of importance to find all cliques which can help understand the network topology. The clique structures can also be util... 详细信息
来源: 评论
Area and Power Efficient Network on Chip Router Architecture
Area and Power Efficient Network on Chip Router Architecture
收藏 引用
IEEE Conference on Information and Communication Technologies (ICT)
作者: Sahu, Sweta Kittur, Harish M. VIT Univ VLSI Div Sch Elect Engn Vellore Tamil Nadu India
In System on Chip, buses and point to point links are used as a communication infrastructure between one IP to another, but these cannot provide efficient interconnect from performance point of view. So NoC architectu... 详细信息
来源: 评论