咨询与建议

限定检索结果

文献类型

  • 1,351 篇 期刊文献
  • 909 篇 会议
  • 19 篇 学位论文
  • 1 册 图书

馆藏范围

  • 2,280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,754 篇 工学
    • 988 篇 计算机科学与技术...
    • 599 篇 电气工程
    • 358 篇 信息与通信工程
    • 208 篇 软件工程
    • 166 篇 控制科学与工程
    • 105 篇 电子科学与技术(可...
    • 102 篇 机械工程
    • 83 篇 仪器科学与技术
    • 50 篇 航空宇航科学与技...
    • 49 篇 交通运输工程
    • 48 篇 石油与天然气工程
    • 31 篇 力学(可授工学、理...
    • 25 篇 土木工程
    • 24 篇 材料科学与工程(可...
    • 21 篇 动力工程及工程热...
    • 20 篇 环境科学与工程(可...
    • 17 篇 测绘科学与技术
    • 15 篇 网络空间安全
  • 788 篇 理学
    • 573 篇 数学
    • 92 篇 物理学
    • 57 篇 生物学
    • 47 篇 系统科学
    • 36 篇 统计学(可授理学、...
    • 25 篇 化学
    • 17 篇 地球物理学
  • 306 篇 管理学
    • 293 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 78 篇 医学
    • 45 篇 临床医学
  • 60 篇 经济学
    • 46 篇 应用经济学
    • 15 篇 理论经济学
  • 20 篇 农学
  • 8 篇 法学
  • 5 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 2,280 篇 greedy algorithm
  • 100 篇 greedy algorithm...
  • 69 篇 optimization
  • 64 篇 genetic algorith...
  • 63 篇 compressed sensi...
  • 46 篇 algorithms
  • 43 篇 influence maximi...
  • 35 篇 dynamic programm...
  • 34 篇 social networks
  • 34 篇 scheduling
  • 33 篇 approximation al...
  • 32 篇 approximation al...
  • 31 篇 greedy method
  • 30 篇 matroid
  • 26 篇 combinatorial op...
  • 23 篇 compressive sens...
  • 23 篇 linear programmi...
  • 20 篇 submodular funct...
  • 20 篇 wireless sensor ...
  • 20 篇 integer programm...

机构

  • 9 篇 univ s carolina ...
  • 8 篇 univ autonoma ma...
  • 8 篇 univ texas dalla...
  • 7 篇 univ chinese aca...
  • 6 篇 nanyang technol ...
  • 6 篇 moscow mv lomono...
  • 5 篇 brown univ div a...
  • 5 篇 yerevan state un...
  • 5 篇 univ s carolina ...
  • 5 篇 mit cambridge ma...
  • 5 篇 univ sci & techn...
  • 4 篇 univ sci & techn...
  • 4 篇 nanyang technol ...
  • 4 篇 new jersey inst ...
  • 4 篇 univ texas austi...
  • 4 篇 ohio state univ ...
  • 4 篇 univ ulm inst op...
  • 4 篇 georgia state un...
  • 4 篇 univ int busines...
  • 4 篇 rutgers state un...

作者

  • 9 篇 borowiecki piotr
  • 9 篇 qian tao
  • 8 篇 zielosko beata
  • 8 篇 wang wei
  • 8 篇 moshkov mikhail
  • 7 篇 zhang zhao
  • 7 篇 michel volker
  • 7 篇 wang yu
  • 7 篇 sawada joe
  • 7 篇 faigle u
  • 6 篇 temlyakov vn
  • 6 篇 rautenbach diete...
  • 6 篇 tang yuan yan
  • 6 篇 chen yanlai
  • 6 篇 chen peng
  • 6 篇 wu weili
  • 5 篇 saito yuji
  • 5 篇 zhang xiaoyan
  • 5 篇 zhang tong
  • 5 篇 yamada keigo

语言

  • 2,124 篇 英文
  • 123 篇 其他
  • 26 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 葡萄牙文
检索条件"主题词=greedy algorithm"
2280 条 记 录,以下是621-630 订阅
排序:
Minimizing Influence of Rumors by Blockers on Social Networks: algorithms and Analysis
收藏 引用
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 2020年 第3期7卷 1067-1078页
作者: Yan, Ruidong Li, Deying Wu, Weili Du, Ding-Zhu Wang, Yongcai Rennain Univ China Sch Informat Beijing 100872 Peoples R China Univ Texas Dallas Dept Comp Sci Richardson TX 75080 USA
Online social networks, such as Facebook, Twitter, and Wechat have become major social tools. The users can not only keep in touch with family and friends, but also send and share the instant information. However, in ... 详细信息
来源: 评论
Sensor Placement for Optimal Control of Infinite-Dimensional Systems
收藏 引用
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS 2020年 第1期7卷 360-371页
作者: Hou, Qiqiang Clark, Andrew Worcester Polytech Inst Dept Elect & Comp Engn Worcester MA 01609 USA
An important challenge in controlling distributed parameter systems is implementing feedback control laws over an infinite-dimensional space. One widely studied approach is to place sensors at a set of discrete locati... 详细信息
来源: 评论
A Risk Management Approach to Defending Against the Advanced Persistent Threat
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2020年 第6期17卷 1163-1172页
作者: Yang, Lu-Xing Li, Pengdeng Yang, Xiaofan Tang, Yuan Yan Deakin Univ Sch Informat Technol Melbourne Vic 3125 Australia Chongqing Univ Sch Software Engn Chongqing 400044 Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing 100083 Peoples R China Univ Macau Dept Comp & Informat Sci Taipa 999078 Macau Peoples R China
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe threat to modern organizations. When the APT has been detected, the organization has to deal with the APT response problem, i.e., t... 详细信息
来源: 评论
Efficient multiscale methods for the semiclassical Schrodinger equation with time-dependent potentials
收藏 引用
COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING 2020年 369卷 113232-113232页
作者: Chen, Jingrun Li, Sijing Zhang, Zhiwen Soochow Univ Math Ctr Interdisciplinary Res Suzhou Peoples R China Soochow Univ Sch Math Sci Suzhou Peoples R China Univ Hong Kong Dept Math Pokfulam Rd Hong Kong Peoples R China
The semiclassical Schrodinger equation with time-dependent potentials is an important model to study electron dynamics under external controls in the mean-field picture. In this paper, we propose two multiscale finite... 详细信息
来源: 评论
Propagation-Model-Free Base Station Deployment for Mobile Networks: Integrating Machine Learning and Heuristic Methods
收藏 引用
IEEE ACCESS 2020年 8卷 83375-83386页
作者: Dai, Lingcheng Zhang, Hongtao Beijing Univ Posts & Telecommun Sch Informat & Commun Engn Beijing 100876 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China
As densification is the promising trend of future mobile networks, deployment of base stations (BSs) becomes increasingly difficult due to the laborious procedures in network planning;besides, unreasonable layout may ... 详细信息
来源: 评论
Multiuser Space-Time Line Code With Transmit Antenna Selection
收藏 引用
IEEE ACCESS 2020年 8卷 71930-71939页
作者: Joung, Jingon Choi, Jihoon Chung Ang Univ Sch Elect & Elect Engn Seoul 06974 South Korea Korea Aerosp Univ Sch Elect & Informat Engn Goyang 10540 South Korea
In this paper, a multiuser space-time line code (MU-STLC) scheme is newly designed that concurrently delivers multiple STLC signals to multiple users, and a preprocessing matrix for the MU-STLC is derived based on the... 详细信息
来源: 评论
Online action recognition from RGB-D cameras based on reduced basis decomposition
收藏 引用
JOURNAL OF REAL-TIME IMAGE PROCESSING 2020年 第2期17卷 341-356页
作者: Arunraj, Muniandi Srinivasan, Andy Juliet, A. Vimala SRM Inst Sci & Technol Dept EIE Kattankulathur Campus Kattankulathur 603203 Tamil Nadu India Valliammai Engn Coll Dept EIE Kattankulathur Campus Kattankulathur 603203 Tamil Nadu India
Human action recognition from RGB-D cameras has recently become one of the major fields of research. While accuracy improvement was given more importance in previous action/gesture recognition methods, there are oppor... 详细信息
来源: 评论
A greedy region growing algorithm for anisotropic stretch adaptive triangulation of geometry images
收藏 引用
GRAPHICAL MODELS 2019年 106卷 101045-000页
作者: Bayazit, Ulug Istanbul Tech Univ Istanbul Turkey
The geometry image representation is a remeshing of an irregular triangle surface mesh onto a rectangular grid of points and facilitates the processing of surface geometry. Its connectivity is commonly generated by sp... 详细信息
来源: 评论
Computation Offloading and Task Scheduling for DNN-Based Applications in Cloud-Edge Computing
收藏 引用
IEEE ACCESS 2020年 8卷 115537-115547页
作者: Chen, Zheyi Hu, Junqin Chen, Xing Hu, Jia Zheng, Xianghan Min, Geyong Univ Exeter Coll Engn Math & Phys Sci Exeter EX4 4QF Devon England Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Peoples R China
Due to the high demands of deep neural network (DNN) based applications on computational capability, it is hard for them to be directly run on mobile devices with limited resources. Computation offloading technology o... 详细信息
来源: 评论
Sparse Identification of Volterra Models for Power Amplifiers Without Pseudoinverse Computation
收藏 引用
IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES 2020年 第11期68卷 4570-4578页
作者: Becerra, Juan A. Ayora, Maria Jose Madero Reina-Tosina, Javier Crespo-Cadenas, Carlos Univ Seville Escuela Tecn Super Ingn Dept Teoria Senal & Comunicac Seville 41092 Spain
We present a new formulation of the doubly orthogonal matching pursuit (DOMP) algorithm for the sparse recovery of Volterra series models. The proposal works over the covariance matrices by taking advantage of the ort... 详细信息
来源: 评论