咨询与建议

限定检索结果

文献类型

  • 115 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 228 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 工学
    • 142 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 21 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 14 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 测绘科学与技术
    • 1 篇 矿业工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
  • 82 篇 理学
    • 57 篇 数学
    • 20 篇 物理学
    • 5 篇 系统科学
    • 4 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 13 篇 管理学
    • 13 篇 管理科学与工程(可...
  • 3 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学

主题

  • 228 篇 deterministic al...
  • 20 篇 randomized algor...
  • 19 篇 algorithms
  • 15 篇 distributed algo...
  • 8 篇 stochastic proce...
  • 7 篇 lower bound
  • 7 篇 optimisation
  • 7 篇 deterministic
  • 6 篇 runtime
  • 6 篇 computational co...
  • 6 篇 deterministic al...
  • 5 篇 network topology
  • 5 篇 optimization
  • 5 篇 computational mo...
  • 5 篇 stochastic algor...
  • 5 篇 probability
  • 5 篇 stochastic analy...
  • 5 篇 approximate comp...
  • 4 篇 parallel algorit...
  • 4 篇 graph algorithms

机构

  • 3 篇 indian inst tech...
  • 3 篇 univ liverpool d...
  • 3 篇 nanyang technol ...
  • 2 篇 it univ copenhag...
  • 2 篇 tel aviv univers...
  • 2 篇 dhirubhai ambani...
  • 2 篇 university of li...
  • 2 篇 univ granada dep...
  • 2 篇 univ hong kong d...
  • 2 篇 microsoft res re...
  • 2 篇 univ wroclaw wro...
  • 2 篇 cheriton school ...
  • 2 篇 univ politecn va...
  • 2 篇 indian inst tech...
  • 2 篇 computer science...
  • 2 篇 univ granada dep...
  • 2 篇 mit 77 massachus...
  • 2 篇 univ chinese aca...
  • 2 篇 univ salerno dip...
  • 2 篇 indian inst tech...

作者

  • 9 篇 kowalski dariusz...
  • 5 篇 cano andres
  • 5 篇 gomez-olmedo man...
  • 4 篇 moral serafin
  • 4 篇 de marco gianluc...
  • 3 篇 gorain barun
  • 3 篇 jurdzinski tomas...
  • 3 篇 moses william k....
  • 3 篇 ruzic milan
  • 2 篇 moran feldman
  • 2 篇 aaron bernstein
  • 2 篇 pandit supantha
  • 2 篇 lopez pedro
  • 2 篇 bhattacharya adr...
  • 2 篇 mondal kaushik
  • 2 篇 buchbinder niv
  • 2 篇 dimov ivan t.
  • 2 篇 garg mohit
  • 2 篇 gomez crispin
  • 2 篇 feldman moran

语言

  • 216 篇 英文
  • 11 篇 其他
  • 1 篇 荷兰文
检索条件"主题词=deterministic algorithms"
228 条 记 录,以下是161-170 订阅
排序:
Binary Probability Trees for Bayesian Networks Inference
收藏 引用
10th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty
作者: Cano, Andres Gomez-Olmedo, Manuel Moral, Serafin Univ Granada Dept Comp Sci & Artificial Intelligence E-18071 Granada Spain
The present paper introduces a new kind of representation for the potentials in a Bayesian network: Binary Probability Trees. They allow to represent finer grain context-specific independences than those which can be ... 详细信息
来源: 评论
Learning of Fuzzy Cognitive Maps for modelling Gene Regulatory Networks through Big Bang-Big Crunch Algorithm
Learning of Fuzzy Cognitive Maps for modelling Gene Regulato...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Acampora, Giovanni Vitiello, Autilia Nottingham Trent Univ Sch Sci & Technol Nottingham NG11 8NS England Univ Salerno Dept Comp Sci I-84084 Salerno Italy
Inferring Gene Regulatory Networks (GRNs) from expression data is one of the most challenging topic in computational biology. Indeed, the reasoning about GRN behaviours is a crucial biological task useful to provide a... 详细信息
来源: 评论
Hybrid hierarchical optical cross-connect node and network applications
Hybrid hierarchical optical cross-connect node and network a...
收藏 引用
Asia-Pacific Optical and Wireless Communications Conference (APOC 2003)
作者: Wang, T Izmailov, R Kukita, S Emura, K NEC Labs Amer Princeton NJ 08540 USA
Hybrid hierarchical optical cross-connects enhance the performance/cost ratio of optical networks by providing transparent (optical) switching of sets of wavelengths (wavebands) in addition to opaque (electrical) swit... 详细信息
来源: 评论
MODELING AND ANALYSIS OF STEPPING STONE ATTACKS
MODELING AND ANALYSIS OF STEPPING STONE ATTACKS
收藏 引用
Winter Simulation Conference
作者: Nicol, David M. Mallapura, Vikas Univ Illinois Dept Elect & Comp Engn 619 South Wright St Urbana IL 61801 USA Univ Illinois Dept Comp Sci Urbana IL 61801 USA
Computer exploits often involve an attacker being able to compromise a sequence of hosts, creating a chain of "stepping stones" from his source to ultimate target. Stepping stones are usually necessary to ac... 详细信息
来源: 评论
XORAdap: A HoL-blocking aware adaptive routing algorithm  23
XORAdap: A HoL-blocking aware adaptive routing algorithm
收藏 引用
23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
作者: Penaranda, Roberto Gomez, Crispin Engracia Gomez, Maria Lopez, Pedro Univ Politecn Valencia Valencia Spain
Routing is a key parameter in the design of the interconnection network of large parallel computers. Depending on the number of routing options available for each packet, routing algorithms can be deterministic (one a... 详细信息
来源: 评论
Computing Static Schedule for the Hosts in a Real-Time Distributed System with Component Based Applications  9
Computing Static Schedule for the Hosts in a Real-Time Distr...
收藏 引用
9th Int Conf Ind Information Syst (ICIIS2014)
作者: Canute, Julius Kumar, Atul IIIT Bangalore Karnataka India Siemens Corp Res & Technol Bangalore Karnataka India ABB Corp Res Bangalore Karnataka India
We consider cyclic real-time applications built using nearly autonomous components. These components can run on any of the available hosts subject to certain constraints. The hosts in the system are allowed to be hete... 详细信息
来源: 评论
Pairwise Test Set Calculation using k-partite Graphs
Pairwise Test Set Calculation using k-partite Graphs
收藏 引用
International Conference on Software Maintenance
作者: Salecker, Elke Glesner, Sabine Berlin Inst Technol TU Berlin Berlin Germany
of input values and can be detected using pairwise test sets that cover each pair of input values. The generation of pairwise test sets with a minimal size is an NP-complete problem which implies that many algorithms ... 详细信息
来源: 评论
Balancing of Legged Mechanism with Multiple Segments
Balancing of Legged Mechanism with Multiple Segments
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Joo, Chang B. Kim, Joo H. NYU Mech & Aerosp Engn Dept Polytech Inst Brooklyn NY 11201 USA
The purpose of this paper is to investigate what kinds of effects the multi-segmental body with actively controlled body part have on balancing. As part of the research, a biped mechanism is simplified to multi-segmen... 详细信息
来源: 评论
The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization
The Constrained Ski-Rental Problem and its Application to On...
收藏 引用
32nd IEEE INFOCOM Conference
作者: Khanafer, Ali Kodialam, Murali Puttaswamy, Krishna P. N. Univ Illinois Coordinated Sci Lab 1101 W Springfield Ave Urbana IL 61801 USA Bell Labs Alcatel Lucent Murray Hill NJ 07974 USA
Cloud service providers (CSPs) enable tenants to elastically scale their resources to meet their demands. In fact, there are various types of resources offered at various price points. While running applications on th... 详细信息
来源: 评论
Treasure Hunt in Graph Using Pebbles  24th
Treasure Hunt in Graph Using Pebbles
收藏 引用
24th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
作者: Bhattacharya, Adri Gorain, Barun Mandal, Partha Sarathi Indian Inst Technol Guwahati Gauhati 781039 India Indian Inst Technol Bhilai Bhilai India
In this paper, we study the treasure hunt problem in a graph by a mobile agent. The nodes in the graph G = (V, E) are anonymous and the edges incident to a vertex v is an element of V whose degree is deg(v) and they a... 详细信息
来源: 评论