咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 18 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 37 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 10 篇 电气工程
    • 3 篇 环境科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 土木工程
    • 1 篇 船舶与海洋工程
  • 13 篇 理学
    • 12 篇 数学
    • 1 篇 生物学
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 56 篇 generic algorith...
  • 3 篇 computational co...
  • 3 篇 quicksort
  • 3 篇 introspective al...
  • 3 篇 hybrid algorithm...
  • 2 篇 crossover
  • 2 篇 energy storage
  • 2 篇 templates
  • 2 篇 mutation
  • 2 篇 heapsort
  • 2 篇 c++
  • 2 篇 sorting algorith...
  • 2 篇 variance ratio
  • 2 篇 voltage control
  • 2 篇 genetic algorith...
  • 2 篇 hierarchical mut...
  • 2 篇 software librari...
  • 2 篇 constraint propa...
  • 2 篇 multimodal funct...
  • 2 篇 optimization of ...

机构

  • 2 篇 suny albany dept...
  • 2 篇 eth dept comp sc...
  • 2 篇 computer science...
  • 1 篇 natl res univ hi...
  • 1 篇 osaka univ dept ...
  • 1 篇 fed polytech sch...
  • 1 篇 univ texas austi...
  • 1 篇 univ hosp bonn i...
  • 1 篇 nanchang univ en...
  • 1 篇 elect distribut ...
  • 1 篇 elect distribut ...
  • 1 篇 bell labs murray...
  • 1 篇 univ frankfurt f...
  • 1 篇 indian inst sci ...
  • 1 篇 univ bordeaux cn...
  • 1 篇 rensselaer polyt...
  • 1 篇 cwi nl-1009 ab a...
  • 1 篇 univ tubingen wi...
  • 1 篇 univ amsterdam n...
  • 1 篇 schmid & partner...

作者

  • 3 篇 musser dr
  • 2 篇 apt kr
  • 2 篇 stearns re
  • 2 篇 musial kamil
  • 2 篇 burduk anna
  • 2 篇 shaaban mohamed
  • 2 篇 maurer ueli
  • 2 篇 watt stephen m.
  • 1 篇 luo a
  • 1 篇 petinrin j. o.
  • 1 篇 xu xin
  • 1 篇 chen wc
  • 1 篇 machleidt torste...
  • 1 篇 broadwater rober...
  • 1 篇 abdullah ansari
  • 1 篇 schnorr cp
  • 1 篇 feinauer lynn r.
  • 1 篇 osawa naoki
  • 1 篇 schwarzweller c
  • 1 篇 yongxian li tran...

语言

  • 47 篇 英文
  • 9 篇 其他
检索条件"主题词=generic algorithms"
56 条 记 录,以下是11-20 订阅
排序:
On the equivalence of RSA and factoring regarding generic ring algorithms
收藏 引用
12th International Conference on the Theory of Application of Cryptology and Information Security
作者: Leander, Gregor Rupp, Andy Ruhr Univ Bochum Horst Gortz Inst IT Secur Univ Str 150 D-4630 Bochum Germany
To prove or disprove the computational equivalence of solving the RSA problem and factoring integers is a longstanding open problem in cryptography. This paper provides some evidence towards the validity of this equiv... 详细信息
来源: 评论
A generic Approach for Analysis of White-Light Interferometry Data via User-Defined algorithms
A Generic Approach for Analysis of White-Light Interferometr...
收藏 引用
14th International Conference on Computational Science and Its Applications (ICCSA)
作者: Schneider, Max Fey, Dietmar Wenzel, Kay Machleidt, Torsten Univ Erlangen Nurnberg Erlangen Germany Gesell Bild & Signalverarbeitung GBS mbH Ilmenau Germany
The non-destructive and automatic 3D surface analysis using white-light interferometry has very high demands on the required computing systems. This is due to both, the high volume of data that are collected and the t... 详细信息
来源: 评论
Breaking RSA generically Is Equivalent to Factoring
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2016年 第11期62卷 6251-6259页
作者: Aggarwal, Divesh Maurer, Ueli Natl Univ Singapore Dept Comp Sci Ctr Quantum Technol Singapore 117543 Singapore ETH Dept Comp Sci CH-8092 Zurich Switzerland
Let N be a random variable distributed according to some appropriate distribution over the set of products of two primes, such that factoring N is believed to be hard. The RSA assumption states that, given an a chosen... 详细信息
来源: 评论
Secured distributed algorithms without hardness assumptions
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2023年 171卷 130-140页
作者: Barenboim, Leonid Levin, Harel Open Univ Israel Dept Math & Comp Sci POB 808 Raanana Israel Nucl Res Ctr Negev Dept Phys POB 9001 Beer Sheva Israel
We study algorithms in the LOCAL model that produce secured output. Specifically, each vertex computes its part in the output, the entire output is correct, but each vertex cannot discover the output of other vertices... 详细信息
来源: 评论
A comparative study of global optimization approaches to MEG source localization
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2003年 第3期80卷 305-324页
作者: Jiang, TZ Luo, A Li, XD Kruggel, F Chinese Acad Sci Inst automat Natl Lab Pattern Recognit Beijing 100080 Peoples R China Max Planck Inst Cognit Neurosci D-04103 Leipzig Germany
It is well-known that the problem of MEG source localization can be cast as an optimization problem. So far, there have been many works in which various optimization methods were adopted for source localization. In th... 详细信息
来源: 评论
Automatic segmentation of dermoscopy images using self-generating neural networks seeded by genetic algorithm
收藏 引用
PATTERN RECOGNITION 2013年 第3期46卷 1012-1019页
作者: Xie, Fengying Bovik, Alan C. Beihang Univ Image Proc Ctr Sch Aeronaut & Astronaut Beijing 100191 Peoples R China Univ Texas Austin Dept Elect & Comp Engn Austin TX 78712 USA
A novel dermoscopy image segmentation algorithm is proposed using a combination of a self-generating neural network (SGNN) and the genetic algorithm (GA). Optimal samples are selected as seeds using GA;taking these se... 详细信息
来源: 评论
The essence of constraint propagation
收藏 引用
THEORETICAL COMPUTER SCIENCE 1999年 第1-2期221卷 179-210页
作者: Apt, KR CWI NL-1009 AB Amsterdam Netherlands Univ Amsterdam Dept Math Comp Sci Phys & Astron NL-1012 WX Amsterdam Netherlands
We show that several constraint propagation algorithms (also called (local) consistency, consistency enforcing, Waltz, filtering or narrowing algorithms) are instances of algorithms that deal with chaotic iteration. T... 详细信息
来源: 评论
Development of constrained-genetic-algorithm load-flow method
收藏 引用
IEE PROCEEDINGS-GENERATION TRANSMISSION AND DISTRIBUTION 1997年 第2期144卷 91-99页
作者: Wong, KP Li, A Law, MY WESTERN POWER CORP PLANNING & CONTRACTS SECTPERTHWA 6000AUSTRALIA
A genetic-algorithm load-flow algorithm is developed. Methods for satisfying the power balance requirement and the voltage magnitude constraint are then developed and incorporated into the genetic-algorithm method to ... 详细信息
来源: 评论
The role of commutativity in constraint propagation algorithms
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 2000年 第6期22卷 1002-1036页
作者: Apt, KR CWI NL-1090 GB Amsterdam Netherlands Univ Amsterdam NL-1012 WX Amsterdam Netherlands
Constraint propagation algorithms form an important part of most of the constraint programming systems. We provide here a simple, yet very general framework that allows us to explain several constraint propagation alg... 详细信息
来源: 评论
SPARE Parts: a C++ toolkit for string pattern recognition
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2004年 第7期34卷 697-710页
作者: Watson, BW Cleophas, L Univ Pretoria Dept Comp Sci ZA-0002 Pretoria South Africa Eindhoven Univ Technol Dept Math & Comp Sci NL-5600 MB Eindhoven Netherlands
In this paper, we consider the design and implementation of SPARE Parts, a C++ toolkit for pattern matching. SPARE Parts (in particular, the 2003 version presented in this article) is the second generation string patt... 详细信息
来源: 评论