咨询与建议

限定检索结果

文献类型

  • 1,352 篇 期刊文献
  • 911 篇 会议
  • 19 篇 学位论文
  • 1 册 图书

馆藏范围

  • 2,283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,757 篇 工学
    • 991 篇 计算机科学与技术...
    • 602 篇 电气工程
    • 359 篇 信息与通信工程
    • 208 篇 软件工程
    • 166 篇 控制科学与工程
    • 106 篇 电子科学与技术(可...
    • 102 篇 机械工程
    • 83 篇 仪器科学与技术
    • 50 篇 航空宇航科学与技...
    • 49 篇 交通运输工程
    • 48 篇 石油与天然气工程
    • 31 篇 力学(可授工学、理...
    • 26 篇 材料科学与工程(可...
    • 24 篇 土木工程
    • 21 篇 动力工程及工程热...
    • 21 篇 环境科学与工程(可...
    • 17 篇 测绘科学与技术
    • 15 篇 网络空间安全
  • 793 篇 理学
    • 576 篇 数学
    • 95 篇 物理学
    • 58 篇 生物学
    • 47 篇 系统科学
    • 36 篇 统计学(可授理学、...
    • 25 篇 化学
    • 17 篇 地球物理学
  • 306 篇 管理学
    • 293 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 78 篇 医学
    • 45 篇 临床医学
  • 60 篇 经济学
    • 46 篇 应用经济学
    • 15 篇 理论经济学
  • 20 篇 农学
  • 8 篇 法学
  • 5 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 2,283 篇 greedy algorithm
  • 100 篇 greedy algorithm...
  • 68 篇 optimization
  • 64 篇 genetic algorith...
  • 63 篇 compressed sensi...
  • 46 篇 algorithms
  • 43 篇 influence maximi...
  • 35 篇 dynamic programm...
  • 34 篇 social networks
  • 34 篇 scheduling
  • 33 篇 approximation al...
  • 32 篇 approximation al...
  • 31 篇 greedy method
  • 30 篇 matroid
  • 26 篇 combinatorial op...
  • 23 篇 compressive sens...
  • 23 篇 linear programmi...
  • 20 篇 submodular funct...
  • 20 篇 wireless sensor ...
  • 20 篇 integer programm...

机构

  • 9 篇 univ s carolina ...
  • 8 篇 univ autonoma ma...
  • 8 篇 univ texas dalla...
  • 7 篇 univ chinese aca...
  • 6 篇 nanyang technol ...
  • 6 篇 moscow mv lomono...
  • 5 篇 brown univ div a...
  • 5 篇 yerevan state un...
  • 5 篇 univ s carolina ...
  • 5 篇 mit cambridge ma...
  • 5 篇 univ sci & techn...
  • 4 篇 univ sci & techn...
  • 4 篇 nanyang technol ...
  • 4 篇 new jersey inst ...
  • 4 篇 univ texas austi...
  • 4 篇 ohio state univ ...
  • 4 篇 univ ulm inst op...
  • 4 篇 georgia state un...
  • 4 篇 univ int busines...
  • 4 篇 rutgers state un...

作者

  • 9 篇 borowiecki piotr
  • 9 篇 qian tao
  • 8 篇 zielosko beata
  • 8 篇 wang wei
  • 8 篇 moshkov mikhail
  • 7 篇 zhang zhao
  • 7 篇 michel volker
  • 7 篇 wang yu
  • 7 篇 sawada joe
  • 7 篇 faigle u
  • 6 篇 temlyakov vn
  • 6 篇 rautenbach diete...
  • 6 篇 tang yuan yan
  • 6 篇 chen yanlai
  • 6 篇 chen peng
  • 6 篇 wu weili
  • 5 篇 saito yuji
  • 5 篇 zhang xiaoyan
  • 5 篇 zhang tong
  • 5 篇 yamada keigo

语言

  • 2,124 篇 英文
  • 125 篇 其他
  • 27 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 葡萄牙文
检索条件"主题词=greedy algorithm"
2283 条 记 录,以下是151-160 订阅
排序:
Dependency between consecutive local conformations helps assemble protein structures from secondary structures using Go potential and greedy algorithm
收藏 引用
PROTEINS-STRUCTURE FUNCTION AND BIOINFORMATICS 2005年 第4期61卷 732-740页
作者: Tuffery, P Derreumaux, P Univ Paris 07 INSERM U726 Equipe Bioinformat Genom & Mol F-75251 Paris France CNRS UPR 9080 Lab Biochim Theor Paris France
Discretization of protein conformational space and fragment assembly methods simplify the search of native structures. These methods, mostly of Monte Carlo and genetic-type, do not exploit, however, the fact that shor... 详细信息
来源: 评论
RETRACTED: Path planning for autonomous robots - a comprehensive analysis by a greedy algorithm (Retracted Article)
收藏 引用
JOURNAL OF VIBRATION AND CONTROL 2013年 第1期19卷 130-142页
作者: Shih, Bih-Yaw Chang, Hsiang Chen, Chen-Yuan Natl Pingtung Univ Educ Dept & Grad Sch Comp Sci Pingtung 90003 Taiwan Natl Cheng Kung Univ GEODAC Tainan 70101 Taiwan Natl Kaohsiung First Univ Sci & Technol Dept Informat Management Kaohsiung Taiwan
The so-called problem of path planning refers to the computation of an optimal path for the movement of a robot from the origin to the destination without colliding with any obstacles. In this study, three main steps ... 详细信息
来源: 评论
A Novel Approach for Mining Temporal Pattern Database Using greedy algorithm
A Novel Approach for Mining Temporal Pattern Database Using ...
收藏 引用
International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
作者: Vimali, J. S. Gupta, Sanjay Srivastava, Piyush Sathyabama Univ Informat Technol Madras Tamil Nadu India
Consecutive example mining is a critical subfield in information mining and it's a troublesome issue since mining may require assembling or looking at expansive number of subsequence blends. Instructions to viably... 详细信息
来源: 评论
On Convergence of greedy algorithm by Walsh System in the Space C(0,1)
收藏 引用
JOURNAL OF CONTEMPORARY MATHEMATICAL ANALYSIS-ARMENIAN ACADEMY OF SCIENCES 2008年 第4期43卷 206-213页
作者: Amirkhanyan, G. Institute of Mathematics National Academy of Sciences of Armenia Yerevan Armenia
The paper studies convergence of the greedy algorithm by the Walsh system in the space C(0, 1). Some sufficient conditions for uniform convergence are given. It is proved that there exists a function satisfying more r... 详细信息
来源: 评论
Optimal arrangement of fixed heliostat field based on genetic algorithm and greedy algorithm  4
Optimal arrangement of fixed heliostat field based on geneti...
收藏 引用
4th International Conference on Computer Communication and Information Systems (CCCIS)
作者: Peng, Shaozhuo Chen, Guanye Zhou, Jiaqi Tan, Dingying Chen, Pingping Guangzhou Univ Chinese Med Sch Med Informat Engn Guangzhou Peoples R China
The optimal configuration of heliostat field is one of the key technologies in the design of tower solar collector system, and its layout and configuration directly affect the solar collector efficiency. This work pre... 详细信息
来源: 评论
Design and analysis on greedy algorithm based on distribution center location
Design and analysis on greedy algorithm based on distributio...
收藏 引用
International Conference on Advanced Design and Manufacturing Engineering (ADME 2011)
作者: Liu, Cheng Cent South Univ Sch Math Sci & Comp Technol Changsha 410075 Hunan Peoples R China
For the problem of distribution center location about 0-1 mixed integer programming, the necessary and sufficient conditions for the solvable model are given. A heuristic algorithm is designed with the idea of the gre... 详细信息
来源: 评论
Optimal Multi-objective Units Start-up Strategy Based on greedy algorithm
Optimal Multi-objective Units Start-up Strategy Based on Gre...
收藏 引用
IEEE International Conference of Region 10 (TENCON)
作者: Zhang, Bowen Shi, Libao Ni, Yixin Yao, Liangzhong Bazargan, Masoud Tsinghua Univ Grad Sch Shenzhen Natl Key Lab Power Syst Shenzhen Shenzhen 518055 Peoples R China China Elect Power Res Inst Beijing 100192 Peoples R China Alstom Grid Res & Technol Ctr Stafford ST17 4LX England
In this paper, a multi-objective units start-up optimization strategy is proposed. In the proposed model, the economic factors during generator start-up are introduced into the conventional units start-up objective fu... 详细信息
来源: 评论
Generalized greedy algorithm for Shortest Superstring
Generalized Greedy Algorithm for Shortest Superstring
收藏 引用
1st International Conference on Complex Sciences: Theory and Applications (Complex 2009)
作者: Cao, Zhengjun Liu, Lihua Markowitch, Olivier Shanghai Univ Dept Math Shanghai Peoples R China Univ Libre Bruxelles Dept Comp Sci Brussels Belgium Shanghai Maritime Univ Dept Math Shanghai Peoples R China
In the primitive greedy algorithm for shortest superstring, if a pair of strings with maximum overlap picked out, they are subsequently merged. In this paper, we introduce the concept of optimal set and generalize the... 详细信息
来源: 评论
Analysis and Discussion of Radar Construction Problems with greedy algorithm
Analysis and Discussion of Radar Construction Problems with ...
收藏 引用
International Conference on Computer, Communication and Computational Sciences (IC4S)
作者: Jiang, Wenrong Shanghai Polytech Univ Sch Comp & Informat Shanghai 201209 Peoples R China
greedy algorithm always makes the best choice at moment. In other words, without considering the overall optimality, what it has done is a partial optimal in a situation. The greedy algorithm is not the best solution ... 详细信息
来源: 评论
A greedy algorithm for Checking Normality of Cryptographic Boolean Functions
A Greedy Algorithm for Checking Normality of Cryptographic B...
收藏 引用
International Symposium on Information Theory and its Applications (ISITA)
作者: Kolokotronis, Nicholas Limniotis, Konstantinos Univ Peloponnese Dept Comp Sci & Technol End Karaiskaki St Tripolis 22100 Greece Hellen Data Protect Author Athens 11523 Greece Univ Athens Dept Informat & Telecomm Athens 15784 Greece
The cryptographic property of normality for cubic Boolean functions is studied in this paper. This property is highly relevant for the analysis and design of important building blocks in cryptosystems. We develop a no... 详细信息
来源: 评论