咨询与建议

限定检索结果

文献类型

  • 4,046 篇 会议
  • 2,180 篇 期刊文献
  • 26 篇 学位论文

馆藏范围

  • 6,252 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,943 篇 工学
    • 2,164 篇 计算机科学与技术...
    • 1,886 篇 电气工程
    • 962 篇 信息与通信工程
    • 917 篇 控制科学与工程
    • 411 篇 软件工程
    • 156 篇 仪器科学与技术
    • 156 篇 电子科学与技术(可...
    • 135 篇 机械工程
    • 71 篇 交通运输工程
    • 41 篇 石油与天然气工程
    • 23 篇 网络空间安全
    • 22 篇 动力工程及工程热...
    • 17 篇 测绘科学与技术
    • 16 篇 土木工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 材料科学与工程(可...
    • 8 篇 航空宇航科学与技...
  • 692 篇 理学
    • 372 篇 数学
    • 274 篇 系统科学
    • 77 篇 物理学
    • 18 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 7 篇 化学
  • 237 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 37 篇 医学
    • 32 篇 临床医学
    • 11 篇 特种医学
  • 20 篇 文学
    • 20 篇 新闻传播学
  • 10 篇 经济学
    • 7 篇 理论经济学
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 教育学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 法学

主题

  • 6,252 篇 distributed algo...
  • 546 篇 convergence
  • 545 篇 wireless sensor ...
  • 523 篇 algorithm design...
  • 415 篇 optimization
  • 381 篇 computer science
  • 372 篇 distributed comp...
  • 363 篇 network topology
  • 329 篇 routing
  • 279 篇 resource managem...
  • 218 篇 protocols
  • 212 篇 computational mo...
  • 207 篇 computer network...
  • 203 篇 costs
  • 202 篇 approximation al...
  • 200 篇 fault tolerance
  • 185 篇 ad hoc networks
  • 183 篇 bandwidth
  • 179 篇 peer to peer com...
  • 178 篇 interference

机构

  • 25 篇 carnegie mellon ...
  • 19 篇 univ illinois de...
  • 19 篇 cent south univ ...
  • 19 篇 nanyang technol ...
  • 19 篇 univ cyprus dept...
  • 16 篇 ege univ int com...
  • 16 篇 univ minnesota d...
  • 16 篇 mit cambridge ma...
  • 15 篇 univ liverpool d...
  • 14 篇 suny stony brook...
  • 14 篇 swiss fed inst t...
  • 14 篇 purdue univ sch ...
  • 13 篇 northeastern uni...
  • 12 篇 shanghai jiao to...
  • 12 篇 univ penn dept e...
  • 12 篇 department of el...
  • 12 篇 weizmann inst sc...
  • 11 篇 department of in...
  • 11 篇 georgia state un...
  • 11 篇 purdue univ sch ...

作者

  • 35 篇 hadjicostis chri...
  • 23 篇 kowalski dariusz...
  • 22 篇 notarstefano giu...
  • 21 篇 hong yiguang
  • 21 篇 scutari gesualdo
  • 20 篇 dagdeviren orhan
  • 18 篇 dominguez-garcia...
  • 17 篇 deng zhenhua
  • 17 篇 pandurangan gopa...
  • 17 篇 mosbah mohamed
  • 16 篇 christoforos n. ...
  • 16 篇 cortes jorge
  • 16 篇 khan usman a.
  • 16 篇 schmid stefan
  • 16 篇 sharma gokarna
  • 15 篇 peleg david
  • 15 篇 korman amos
  • 15 篇 navarra alfredo
  • 15 篇 mou shaoshuai
  • 15 篇 zeng xianlin

语言

  • 6,145 篇 英文
  • 64 篇 其他
  • 38 篇 中文
  • 3 篇 德文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"主题词=distributed algorithms"
6252 条 记 录,以下是1261-1270 订阅
Fast and Parallelizable Ranking with Outliers from Pairwise Comparisons
Fast and Parallelizable Ranking with Outliers from Pairwise ...
收藏 引用
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)
作者: Im, Sungjin Qaem, Mahshid Montazer Univ Calif EECS 5200 N Lake Rd Merced CA 95343 USA
In this paper, we initiate the study of the problem of ordering objects from their pairwise comparison results when allowed to discard up to a certain number of objects as outliers. More specifically, we seek to find ... 详细信息
来源: 评论
Solving Billion-Scale Knapsack Problems  20
Solving Billion-Scale Knapsack Problems
收藏 引用
29th World Wide Web Conference (WWW)
作者: Zhang, Xingwen Qi, Feng Hua, Zhigang Yang, Shuang Ant Financial Serv Grp San Mateo CA 94402 USA
Knapsack problems (KPs) are common in industry, but solving KPs is known to be NP-hard and has been tractable only at a relatively small scale. This paper examines KPs in a slightly generalized form and shows that the... 详细信息
来源: 评论
Caching Policies for Delay Minimization in Small Cell Networks with Joint Transmissions
Caching Policies for Delay Minimization in Small Cell Networ...
收藏 引用
IEEE International Conference on Communications (IEEE ICC) / Workshop on NOMA for 5G and Beyond
作者: Ricardo, Guilherme Neglia, Giovanni Spyropoulos, Thrasyvoulos Univ Cote dAzur INRIA Sophia Antipolis France EURECOM Commun Syst Dept Sophia Antipolis France
In 5G and beyond network architectures, operators and content providers base their content distribution strategies on Heterogeneous Networks, where macro and small(er) cells are combined to offer better Quality of Ser... 详细信息
来源: 评论
Localized Identification of Malicious Nodes in Wireless Sensor Networks  28
Localized Identification of Malicious Nodes in Wireless Sens...
收藏 引用
28th Signal Processing and Communications Applications Conference (SIU)
作者: Akram, Vahid Khalilpour Erten, Yusuf Murat Izmir Bakircay Univ Dept Comp Engn Izmir Turkey
Securing a wireless sensor network against the various attacks with minimal energy consumption is a challenging task because the nodes usually have limited energy source, are distributed in harsh environments and comm... 详细信息
来源: 评论
Wireless Crowd Charging Applications: Taxonomy and Research Directions  16
Wireless Crowd Charging Applications: Taxonomy and Research ...
收藏 引用
16th Annual International Conference on distributed Computing in Sensor Systems (DCOSS)
作者: Raptis, Theofanis P. CNR Inst Informat & Telemat Pisa Italy
Wireless power transfer technologies lead the way towards new paradigms for pervasive networking and have already penetrated the mobile and portable user device research and market. Their use is not only limited to ch... 详细信息
来源: 评论
Robust one-dimensional calibration and localisation of a distributed camera sensor network
收藏 引用
PATTERN RECOGNITION 2020年 98卷 107058-000页
作者: Halloran, Brendan Premaratne, Prashan Vial, Peter James Univ Wollongong Sch Elect Comp & Telecommun Engn Northfields Ave Wollongong NSW 2522 Australia
Calibration and localisation of a camera sensor network is an essential requirement for higher-level computer vision tasks, such as mapping or tracking. Additionally, distributed algorithms are being increasingly used... 详细信息
来源: 评论
Resilient Consensus against Mobile Malicious Agents  21st
Resilient Consensus against Mobile Malicious Agents
收藏 引用
21st IFAC World Congress on Automatic Control - Meeting Societal Challenges
作者: Wang, Yuan Ishii, Hideaki Bonnet, Francois Defago, Xavier Tokyo Inst Technol Dept Comp Sci Tokyo Japan
This paper addresses consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By employing mobile adversary models from the computer scienc... 详细信息
来源: 评论
On the Termination of Flooding  37
On the Termination of Flooding
收藏 引用
37th International Symposium on Theoretical Aspects of Computer Science (STACS)
作者: Hussak, Walter Trehan, Amitabh Loughborough Univ Comp Sci Loughborough Leics England
Flooding is among the simplest and most fundamental of all graph/network algorithms. Consider a (distributed network in the form of a) finite undirected graph G with a distinguished node v that begins flooding by send... 详细信息
来源: 评论
A Time- and Message-Optimal distributed Algorithm for Minimum Spanning Trees
收藏 引用
ACM TRANSACTIONS ON algorithms 2020年 第1期16卷 13-13页
作者: Pandurangan, Gopal Robinson, Peter Scquizzato, Michele Univ Houston Dept Comp Sci 3551 Cullen Blvd Houston TX 77204 USA City Univ Hong Kong Dept Comp Sci Kowloon 83 Tat Chee Ave Hong Kong Peoples R China Univ Padua Dept Math Via Trieste 63 I-35121 Padua Italy
This article presents a randomized (Las Vegas) distributed algorithm that constructs a minimum spanning tree (MST) in weighted networks with optimal (up to polylogarithmic factors) time and message complexity. This al... 详细信息
来源: 评论
distributed least squares solver for network linear equations
收藏 引用
AUTOMATICA 2020年 第0期113卷 108798-000页
作者: Yang, Tao George, Jemin Qin, Jiahu Yi, Xinlei Wu, Junfeng Northeastern Univ State Key Lab Synthet Automat Proc Ind Shenyang 110819 Peoples R China US Army Res Lab Adelphi MD 20783 USA Univ Sci & Technol China Dept Automat Hefei 230027 Peoples R China KTH Royal Inst Technol Sch Elect Engn & Comp Sci Div Decis & Control Syst S-10044 Stockholm Sweden Zhejiang Univ Coll Control Sci & Engn Hangzhou 310027 Peoples R China
In this paper, we study the problem of finding the least square solutions of over-determined linear algebraic equations over networks in a distributed manner. Each node has access to one of the linear equations and ho... 详细信息
来源: 评论