咨询与建议

限定检索结果

文献类型

  • 1,351 篇 期刊文献
  • 909 篇 会议
  • 19 篇 学位论文
  • 1 册 图书

馆藏范围

  • 2,280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,754 篇 工学
    • 988 篇 计算机科学与技术...
    • 599 篇 电气工程
    • 358 篇 信息与通信工程
    • 208 篇 软件工程
    • 166 篇 控制科学与工程
    • 105 篇 电子科学与技术(可...
    • 102 篇 机械工程
    • 83 篇 仪器科学与技术
    • 50 篇 航空宇航科学与技...
    • 49 篇 交通运输工程
    • 48 篇 石油与天然气工程
    • 31 篇 力学(可授工学、理...
    • 25 篇 土木工程
    • 24 篇 材料科学与工程(可...
    • 21 篇 动力工程及工程热...
    • 20 篇 环境科学与工程(可...
    • 17 篇 测绘科学与技术
    • 15 篇 网络空间安全
  • 788 篇 理学
    • 573 篇 数学
    • 92 篇 物理学
    • 57 篇 生物学
    • 47 篇 系统科学
    • 36 篇 统计学(可授理学、...
    • 25 篇 化学
    • 17 篇 地球物理学
  • 306 篇 管理学
    • 293 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 78 篇 医学
    • 45 篇 临床医学
  • 60 篇 经济学
    • 46 篇 应用经济学
    • 15 篇 理论经济学
  • 20 篇 农学
  • 8 篇 法学
  • 5 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 2,280 篇 greedy algorithm
  • 100 篇 greedy algorithm...
  • 69 篇 optimization
  • 64 篇 genetic algorith...
  • 63 篇 compressed sensi...
  • 46 篇 algorithms
  • 43 篇 influence maximi...
  • 35 篇 dynamic programm...
  • 34 篇 social networks
  • 34 篇 scheduling
  • 33 篇 approximation al...
  • 32 篇 approximation al...
  • 31 篇 greedy method
  • 30 篇 matroid
  • 26 篇 combinatorial op...
  • 23 篇 compressive sens...
  • 23 篇 linear programmi...
  • 20 篇 submodular funct...
  • 20 篇 wireless sensor ...
  • 20 篇 integer programm...

机构

  • 9 篇 univ s carolina ...
  • 8 篇 univ autonoma ma...
  • 8 篇 univ texas dalla...
  • 7 篇 univ chinese aca...
  • 6 篇 nanyang technol ...
  • 6 篇 moscow mv lomono...
  • 5 篇 brown univ div a...
  • 5 篇 yerevan state un...
  • 5 篇 univ s carolina ...
  • 5 篇 mit cambridge ma...
  • 5 篇 univ sci & techn...
  • 4 篇 univ sci & techn...
  • 4 篇 nanyang technol ...
  • 4 篇 new jersey inst ...
  • 4 篇 univ texas austi...
  • 4 篇 ohio state univ ...
  • 4 篇 univ ulm inst op...
  • 4 篇 georgia state un...
  • 4 篇 univ int busines...
  • 4 篇 rutgers state un...

作者

  • 9 篇 borowiecki piotr
  • 9 篇 qian tao
  • 8 篇 zielosko beata
  • 8 篇 wang wei
  • 8 篇 moshkov mikhail
  • 7 篇 zhang zhao
  • 7 篇 michel volker
  • 7 篇 wang yu
  • 7 篇 sawada joe
  • 7 篇 faigle u
  • 6 篇 temlyakov vn
  • 6 篇 rautenbach diete...
  • 6 篇 tang yuan yan
  • 6 篇 chen yanlai
  • 6 篇 chen peng
  • 6 篇 wu weili
  • 5 篇 saito yuji
  • 5 篇 zhang xiaoyan
  • 5 篇 zhang tong
  • 5 篇 yamada keigo

语言

  • 2,124 篇 英文
  • 123 篇 其他
  • 26 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 葡萄牙文
检索条件"主题词=greedy algorithm"
2280 条 记 录,以下是491-500 订阅
排序:
Examination Timetabling Automation and Optimization using greedy-Simulated Annealing Hyper-heuristics algorithm  12
Examination Timetabling Automation and Optimization using Gr...
收藏 引用
12th International Conference on Information and Communication Technology and System (ICTS)
作者: Kusumawardani, Dian Muklason, Ahmad Supoyo, Vicha Azthanty Inst Teknol Sepuluh Nopember Dept Informat Syst Surabaya Indonesia
Examination timetabling problem (ETP) is one of challenging combinatorial optimization problems, either scientifically or practically. In the scientific literatures, ETP has been proven as a non-deterministic polynomi... 详细信息
来源: 评论
Active Manifold and Model-Order Reduction to Accelerate Multidisciplinary Analysis and Optimization
收藏 引用
AIAA JOURNAL 2021年 第11期59卷 4739-4753页
作者: Boncoraglio, Gabriele Farhat, Charbel Stanford Univ Dept Aeronaut & Astronaut Durand BldgRoom 224-2 Stanford CA 94305 USA Stanford Univ Dept Aeronaut & Astronaut Aircraft Struct Durand BldgRoom 257 Stanford CA 94305 USA
A computational framework is proposed for efficiently solving multidisciplinary analysis and optimization (MDAO) problems in a relatively high-dimensional design parameter space. It relies on projection-based reduced-... 详细信息
来源: 评论
Structured Robust Submodular Maximization: Offline and Online algorithms
收藏 引用
INFORMS JOURNAL ON COMPUTING 2021年 第4期33卷 1590-1607页
作者: Torrico, Alfredo Singh, Mohit Pokutta, Sebastian Haghtalab, Nika Naor, Joseph (Seffi) Anari, Nima Univ Montreal Polytech Montreal Montreal PQ H3T 1J4 Canada Georgia Inst Technol H Milton Stewart Sch Ind & Syst Engn Atlanta GA 30332 USA Berlin Inst Technol D-10623 Berlin Germany Zuse Inst Berlin D-14195 Berlin Germany Cornell Univ Dept Comp Sci Ithaca NY 14853 USA Technion Israel Inst Technol IL-3200003 Haifa Israel Stanford Univ Comp Sci Dept Stanford CA 94305 USA
Constrained submodular function maximization has been used in subset selection problems such as selection of most informative sensor locations. Although these models have been quite popular, the solutions obtained via... 详细信息
来源: 评论
Influence maximization algorithm based on Gaussian propagation model
收藏 引用
INFORMATION SCIENCES 2021年 568卷 386-402页
作者: Li, WeiMin Li, Zheng Luvembe, Alex Munyole Yang, Chao Shanghai Univ Sch Comp Engn & Sci Shanghai 200444 Peoples R China Shanghai Lixin Univ Accounting & Finance Shanghai 201209 Peoples R China
The influence of each entity in a network is a crucial index of the network information dissemination. greedy influence maximization algorithms suffer from time efficiency and scalability issues. In contrast, heuristi... 详细信息
来源: 评论
Efficient Layer Sharing for Application Deployment in Edge Computing Environment
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tang, Bing Ma, Yahui Liu, Yu Yang, Qing Cao, Buqing Tang, Mingdong Guangzhou Maritime University School of Computer Science Guangzhou510725 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China Hunan University of Technology School of Computer Zhuzhou412007 China Guangdong University of Foreign Studies School of Information Science and Technology Guangzhou510006 China
Edge computing provides consumer electronics with faster and smarter responses, thereby enhancing user experience. Based on container technology, in a cloud-edge collaborative environment, edge servers pull images fro... 详细信息
来源: 评论
How to pack directed acyclic graphs into small blocks
收藏 引用
DISCRETE APPLIED MATHEMATICS 2021年 288卷 91-113页
作者: Asahiro, Yuichi Furukawa, Tetsuya Ikegami, Keiichi Miyano, Eiji Yagita, Tsuyoshi Kyushu Sangyo Univ Dept Informat Sci Fukuoka 8138503 Japan Kyushu Univ Dept Econ Engn Fukuoka 8190395 Japan Kyushu Inst Technol Dept Artificial Intelligence Fukuoka 8208502 Japan Kyushu Inst Technol Dept Syst Design & Informat Fukuoka 8208502 Japan
This paper studies the following variant of clustering or laying out problems for directed acyclic graphs (DAG for short), called the minimum block transfer problem. The objective of this problem is to find a partitio... 详细信息
来源: 评论
Analysis and Optimization of Fog Radio Access Networks With Hybrid Caching: Delay and Energy Efficiency
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2021年 第1期20卷 69-82页
作者: Jiang, Yanxiang Wan, Chaoyi Tao, Meixia Zheng, Fu-Chun Zhu, Pengcheng Gao, Xiqi You, Xiaohu Southeast Univ Natl Mobile Commun Res Lab Nanjing 210096 Peoples R China Chinese Acad Sci Key Lab Wireless Sensor Network & Commun Shanghai Inst Microsyst & Informat Technol Shanghai 200050 Peoples R China Shanghai Jiao Tong Univ Dept Elect Engn Shanghai 200240 Peoples R China Harbin Inst Technol Shenzhen Sch Elect & Informat Engn Shenzhen 518055 Peoples R China
In this article, delay and energy efficiency (EE) are investigated in fog radio access networks (F-RANs) with hybrid caching. With multiple caching and transmission strategies, hybrid caching offers great flexibility ... 详细信息
来源: 评论
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2021年 第7期31卷 2535-2546页
作者: Xiao, Mengyao Li, Xiaolong Ma, Bin Zhang, Xinpeng Zhao, Yao Beijing Jiaotong Univ Inst Informat Sci Beijing 100044 Peoples R China Beijing Key Lab Adv Informat Sci & Network Techno Beijing 100044 Peoples R China Qilu Univ Technol Shandong Acad Sci Sch Cyber Secur Jinan 250353 Peoples R China Shandong Prov Key Lab Comp Networks Jinan 250353 Peoples R China Fudan Univ Sch Comp Sci Shanghai 200433 Peoples R China
Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images are more commonly used in our daily lives. Up to now, several RDH methods for JPEG images have been propo... 详细信息
来源: 评论
Heuristic Strategies for NFV-Enabled Renewable and Non-Renewable Energy Management in the Future IoT World
收藏 引用
IEEE ACCESS 2021年 9卷 125000-125031页
作者: Tipantuna, Christian Hesselbach, Xavier Unger, Walter Escuela Politec Nacl Dept Elect Telecommun & Comp Networks Quito 170517 Ecuador Univ Politecn Cataluna Dept Network Engn Barcelona 08034 Spain Rhein Westfal TH Aachen Dept Comp Sci D-52056 Aachen Germany
The ever-growing energy demand and the CO2 emissions caused by energy production and consumption have become critical concerns worldwide and drive new energy management and consumption schemes. In this regard, energy ... 详细信息
来源: 评论
Face Recognition using a greedy based warping algorithm  11
Face Recognition using a greedy based warping algorithm
收藏 引用
11th International Conference on Advanced Computing (ICoAC)
作者: Krishnaveni, B. Sridhar, S. Anna Univ Informat Sci & Technol Dept Chennai Tamil Nadu India
Recognition of faces is an important and challenging problem of a biometric system. In this paper, a greedy based warping algorithm is proposed for face recognition, which is a variant of conventional dynamic time war... 详细信息
来源: 评论