咨询与建议

限定检索结果

文献类型

  • 108 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 129 篇 工学
    • 103 篇 计算机科学与技术...
    • 30 篇 电气工程
    • 22 篇 软件工程
    • 13 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 6 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 57 篇 理学
    • 49 篇 数学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 5 篇 医学
    • 4 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 艺术学

主题

  • 149 篇 deterministic al...
  • 12 篇 mobile agent
  • 9 篇 distributed algo...
  • 9 篇 rendezvous
  • 8 篇 optimization
  • 7 篇 randomized algor...
  • 7 篇 gathering
  • 6 篇 network
  • 6 篇 deterministic al...
  • 5 篇 matroid constrai...
  • 4 篇 graph
  • 4 篇 mobile robots
  • 4 篇 multiple access ...
  • 4 篇 global optimizat...
  • 4 篇 probabilistic al...
  • 4 篇 cost
  • 4 篇 dispersion
  • 3 篇 mobile agents
  • 3 篇 computational ge...
  • 3 篇 anonymous graphs

机构

  • 7 篇 univ quebec outa...
  • 4 篇 univ picardie ju...
  • 4 篇 univ liverpool d...
  • 4 篇 univ picardie ju...
  • 4 篇 univ quebec outa...
  • 3 篇 indian inst tech...
  • 3 篇 shandong normal ...
  • 3 篇 univ colorado de...
  • 2 篇 aix marseille un...
  • 2 篇 dhirubhai ambani...
  • 2 篇 beijing univ tec...
  • 2 篇 augusta univ sch...
  • 2 篇 indian inst tech...
  • 2 篇 univ liverpool d...
  • 2 篇 cnrs lif marseil...
  • 2 篇 univ picardie ju...
  • 2 篇 kyoto univ grad ...
  • 2 篇 univ new south w...
  • 2 篇 univ quebec dept...
  • 2 篇 indian inst tech...

作者

  • 16 篇 pelc andrzej
  • 14 篇 dieudonne yoann
  • 6 篇 mondal kaushik
  • 5 篇 kowalski dariusz...
  • 4 篇 bouchard sebasti...
  • 4 篇 chlebus bogdan s...
  • 3 篇 gorain barun
  • 3 篇 li min
  • 3 篇 suter david
  • 3 篇 anantharamu laks...
  • 3 篇 de marco gianluc...
  • 3 篇 miller avery
  • 3 篇 matousek j
  • 3 篇 kaur tanvir
  • 2 篇 ibaraki t
  • 2 篇 ivanyos gabor
  • 2 篇 guo longkun
  • 2 篇 xiao guobao
  • 2 篇 pandit supantha
  • 2 篇 rousseeuw peter ...

语言

  • 144 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"主题词=deterministic algorithm"
149 条 记 录,以下是81-90 订阅
排序:
PROBABILISTIC CLOCK SYNCHRONIZATION IN DISTRIBUTED SYSTEMS
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1994年 第5期5卷 474-487页
作者: ARVIND, K Digital Equipment Corporation Littleton MA USA
This paper presents and analyzes a new probabilistic clock synchronization algorithm that can guarantee a much smaller bound on the clock skew than most existing algorithms. The algorithm is probabilistic in the sense... 详细信息
来源: 评论
Anonymous Meeting in Networks
收藏 引用
algorithmICA 2016年 第2期74卷 908-946页
作者: Dieudonne, Yoann Pelc, Andrzej Univ Picardie Jules Verne Amiens MIS Amiens France Univ Quebec Outaouais Dept Informat Gatineau PQ J8X 3X7 Canada
A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the s... 详细信息
来源: 评论
On the complexity of computing quadrature formulas for marginal distributions of SDEs
收藏 引用
JOURNAL OF COMPLEXITY 2015年 第1期31卷 110-145页
作者: Mueller-Gronbach, Thomas Ritter, Klaus Yaroslavtseva, Larisa Univ Passau Fak Informat & Math D-94032 Passau Germany Tech Univ Kaiserslautern Fachbereich Math D-67653 Kaiserslautern Germany
We study the problem of approximating the distribution of the solution of a d-dimensional system of stochastic differential equations (SDEs) at a single time point by a probability measure with finite support, i.e., b... 详细信息
来源: 评论
Byzantine gathering in networks
收藏 引用
DISTRIBUTED COMPUTING 2016年 第6期29卷 435-457页
作者: Bouchard, Sebastien Dieudonne, Yoann Ducourthial, Bertrand UPMC Sorbonne Univ INRIA LIP6 Regal Paris France Univ Picardie Jules Verne MIS Amiens France CNRS Heudiasyc Compiegne France Univ Technol Compiegne Compiegne France
This paper investigates an open problem introduced in Dieudonn, et al. (ACM Trans algorithms 11(1):1, 2014). Two or more mobile agents start from nodes of a network and have to accomplish the task of gathering which c... 详细信息
来源: 评论
High-performance binary and non-binary Low-density parity-check codes based on affine permutation matrices
收藏 引用
IET COMMUNICATIONS 2015年 第17期9卷 2114-2123页
作者: Gholami, Mohammad Alinia, Masoumeh Inst Res Fundamental Sci IPM Sch Math Tehran Iran Shahrekord Univ Dept Math Shahrekord 115 Iran
Low-density parity-check (LDPC) codes from affine permutation matrices, called APM-LDPC codes, are a class of LDPC codes whose parity-check matrices consist of zero matrices or APMs of the same orders. APM-LDPC codes ... 详细信息
来源: 评论
A multi-start central force optimization for global optimization
收藏 引用
APPLIED SOFT COMPUTING 2015年 27卷 92-98页
作者: Liu, Yong Tian, Peng Shanghai Jiao Tong Univ Antai Coll Econ & Management Shanghai 200052 Peoples R China Yancheng Inst Technol Dept Fundamental Sci Yancheng 224051 Jiangsu Peoples R China
Central force optimization (CFO) is an efficient and powerful population-based intelligence algorithm for optimization problems. CFO is deterministic in nature, unlike the most widely used metaheuristics. CFO, however... 详细信息
来源: 评论
Polynomial Interpolation and Identity Testing from High Powers Over Finite Fields
收藏 引用
algorithmICA 2018年 第2期80卷 560-575页
作者: Ivanyos, Gabor Karpinski, Marek Santha, Miklos Saxena, Nitin Shparlinski, Igor E. Hungarian Acad Sci Inst Comp Sci & Control H-1111 Budapest Hungary Univ Bonn Dept Comp Sci D-53113 Bonn Germany Univ Paris Diderot CNRS F-75013 Paris France Natl Univ Singapore CQT Singapore 117543 Singapore Indian Inst Technol Dept Comp Sci & Engn Kanpur 208016 Uttar Pradesh India Univ New South Wales Dept Pure Math Sydney NSW 2052 Australia
We consider the problem of recovering (that is, interpolating) and identity testing of a "hidden" monic polynomial f, given an oracle access to for , where is finite field of q elements (extension fields acc... 详细信息
来源: 评论
A divide-and-conquer approach to the minimum k-way cut problem
收藏 引用
algorithmICA 2002年 第2期32卷 262-276页
作者: Kamidoi, Y Wakabayashi, S Yoshida, N Hiroshima City Univ Fac Informat Sci Asaminami Ku Hiroshima 7313194 Japan Hiroshima Univ Grad Sch Engn Higashihiroshima 7398597 Japan
This paper presents algorithms for computing a minimum 3-way cut and a minimum 4-way cut of an undirected weighted graph G. Let G = (V, E) bean undirected graph with n vertices, m edges, and positive edge weights. Gol... 详细信息
来源: 评论
Product range spaces, sensitive sampling, and derandomization
收藏 引用
SIAM JOURNAL ON COMPUTING 1999年 第5期28卷 1552-1575页
作者: Brönnimann, H Chazelle, B Matousek, J INRIA Sophia Antipolis F-06902 Sophia Antipolis France Princeton Univ Dept Comp Sci Princeton NJ 08544 USA Charles Univ Dept Appl Math CR-11800 Prague Czech Republic
We introduce the concept of a sensitive epsilon-approximation and use it to derive a more efficient algorithm for computing epsilon-nets. We define and investigate product range spaces, for which we establish sampling... 详细信息
来源: 评论
Identity testing and interpolation from high powers of polynomials of large degree over finite fields
收藏 引用
JOURNAL OF COMPLEXITY 2018年 第Dec.期49卷 74-84页
作者: Karpinski, Marek Merai, Laszlo Shparlinski, Igor E. Univ Bonn Dept Comp Sci D-53113 Bonn Germany Johannes Kepler Univ Linz Austrian Acad Sci Johann Radon Inst Computat & Appl Math Altenberger Str 69 A-4040 Linz Austria Johannes Kepler Univ Linz Inst Financial Math & Appl Number Theory Altenberger Str 69 A-4040 Linz Austria Univ New South Wales Dept Pure Math Sydney NSW 2052 Australia
We consider the problem of identity testing and recovering (that is, interpolating) of a "hidden" monic polynomial f, given an oracle access to f(x)(e) for x is an element of F-q, where F-q is the finite fie... 详细信息
来源: 评论