咨询与建议

限定检索结果

文献类型

  • 1,354 篇 期刊文献
  • 910 篇 会议
  • 19 篇 学位论文
  • 1 册 图书

馆藏范围

  • 2,284 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,759 篇 工学
    • 992 篇 计算机科学与技术...
    • 601 篇 电气工程
    • 359 篇 信息与通信工程
    • 208 篇 软件工程
    • 167 篇 控制科学与工程
    • 105 篇 电子科学与技术(可...
    • 102 篇 机械工程
    • 83 篇 仪器科学与技术
    • 51 篇 航空宇航科学与技...
    • 49 篇 交通运输工程
    • 48 篇 石油与天然气工程
    • 31 篇 力学(可授工学、理...
    • 25 篇 土木工程
    • 24 篇 材料科学与工程(可...
    • 21 篇 动力工程及工程热...
    • 20 篇 环境科学与工程(可...
    • 17 篇 测绘科学与技术
    • 15 篇 网络空间安全
  • 786 篇 理学
    • 573 篇 数学
    • 91 篇 物理学
    • 56 篇 生物学
    • 47 篇 系统科学
    • 36 篇 统计学(可授理学、...
    • 24 篇 化学
    • 17 篇 地球物理学
  • 307 篇 管理学
    • 294 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 77 篇 医学
    • 44 篇 临床医学
  • 60 篇 经济学
    • 46 篇 应用经济学
    • 15 篇 理论经济学
  • 20 篇 农学
  • 8 篇 法学
  • 5 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 2,284 篇 greedy algorithm
  • 101 篇 greedy algorithm...
  • 69 篇 optimization
  • 64 篇 genetic algorith...
  • 63 篇 compressed sensi...
  • 46 篇 algorithms
  • 43 篇 influence maximi...
  • 35 篇 dynamic programm...
  • 34 篇 social networks
  • 34 篇 scheduling
  • 33 篇 approximation al...
  • 32 篇 approximation al...
  • 31 篇 greedy method
  • 30 篇 matroid
  • 26 篇 combinatorial op...
  • 23 篇 compressive sens...
  • 23 篇 linear programmi...
  • 20 篇 submodular funct...
  • 20 篇 wireless sensor ...
  • 20 篇 integer programm...

机构

  • 9 篇 univ s carolina ...
  • 8 篇 univ autonoma ma...
  • 8 篇 univ texas dalla...
  • 7 篇 univ chinese aca...
  • 6 篇 nanyang technol ...
  • 6 篇 moscow mv lomono...
  • 5 篇 brown univ div a...
  • 5 篇 yerevan state un...
  • 5 篇 univ s carolina ...
  • 5 篇 mit cambridge ma...
  • 5 篇 univ sci & techn...
  • 4 篇 univ sci & techn...
  • 4 篇 nanyang technol ...
  • 4 篇 new jersey inst ...
  • 4 篇 univ texas austi...
  • 4 篇 ohio state univ ...
  • 4 篇 univ ulm inst op...
  • 4 篇 georgia state un...
  • 4 篇 univ int busines...
  • 4 篇 rutgers state un...

作者

  • 9 篇 borowiecki piotr
  • 9 篇 qian tao
  • 8 篇 zielosko beata
  • 8 篇 wang wei
  • 8 篇 moshkov mikhail
  • 7 篇 zhang zhao
  • 7 篇 michel volker
  • 7 篇 wang yu
  • 7 篇 sawada joe
  • 7 篇 faigle u
  • 6 篇 temlyakov vn
  • 6 篇 rautenbach diete...
  • 6 篇 tang yuan yan
  • 6 篇 chen yanlai
  • 6 篇 chen peng
  • 6 篇 wu weili
  • 5 篇 saito yuji
  • 5 篇 zhang xiaoyan
  • 5 篇 zhang tong
  • 5 篇 yamada keigo

语言

  • 2,125 篇 英文
  • 123 篇 其他
  • 26 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"主题词=greedy algorithm"
2284 条 记 录,以下是931-940 订阅
排序:
Selecting Sequence of Refactoring Techniques Usage for Code Changing Using greedy algorithm
Selecting Sequence of Refactoring Techniques Usage for Code ...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: Ratapong Wongpiang Pornsiri Muenchaisri Center of Excellence in Software Engineering Department of Computer Engineering Chulalongkorn University Bangkok 10330Thailand
Refactoring is the process of changing the internal structure of software but it preserves external behavior of software. To improve software maintainability, we may apply several refactoring techniques to source code... 详细信息
来源: 评论
A greedy algorithm for Checking Normality of Cryptographic Boolean Functions
A Greedy Algorithm for Checking Normality of Cryptographic B...
收藏 引用
International Symposium on Information Theory and its Applications (ISITA)
作者: Kolokotronis, Nicholas Limniotis, Konstantinos Univ Peloponnese Dept Comp Sci & Technol End Karaiskaki St Tripolis 22100 Greece Hellen Data Protect Author Athens 11523 Greece Univ Athens Dept Informat & Telecomm Athens 15784 Greece
The cryptographic property of normality for cubic Boolean functions is studied in this paper. This property is highly relevant for the analysis and design of important building blocks in cryptosystems. We develop a no... 详细信息
来源: 评论
A GPU accelerated parallel heuristic for the 2D knapsack problem with rectangular pieces  9
A GPU accelerated parallel heuristic for the 2D knapsack pro...
收藏 引用
9th Annual IEEE Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
作者: Rashid, Mohammad Harun Pace Univ New York NY 10038 USA
The 2D Knapsack Problem is a NP hard problem in combinatorial optimization which can be described easily, but it is very difficult to solve. If we take a rectangular container as well as a set of rectangular pieces in... 详细信息
来源: 评论
A New Two Level Cluster-based Routing Protocol for Vehicular Ad hoc NETwork (VANET)  20
A New Two Level Cluster-based Routing Protocol for Vehicular...
收藏 引用
20th UKSim-AMSS International Conference on Computer Modelling and Simulation (UKSim)
作者: Hamedani, Parisa Saraj Rezazadeh, Arshin Shahid Chamran Univ Ahvaz Fac Engn Dept Comp Engn Ahvaz Iran
Vehicular ad hoc networks (VANETs) are a subset of mobile ad hoc networks (MANETs). These networks do not have a specific structure, in which network-forming nodes are moving vehicles. Therefore, routing is essential ... 详细信息
来源: 评论
GPS Signal Acquisition Based on Compressive Sensing  18
GPS Signal Acquisition Based on Compressive Sensing
收藏 引用
18th IEEE International Conference on Communication Technology (IEEE ICCT)
作者: He, Guodong Song, Maozhong Song, Peng Key Lab Jiangsu Prov Internet Things & Control Te Nanjing Jiangsu Peoples R China Nanjing Univ Aeronaut & Astronaut Coll Elect & Informat Engn Nanjing Jiangsu Peoples R China
The first task of GPS receiver is to acquire the signal, which tests the all likely 2-D hypotheses of the code phase and the Doppler frequency of the incoming GPS signal. If the code phase and frequency of locally gen... 详细信息
来源: 评论
MATCHING PROJECTION DECODING METHOD FOR AMBISONICS SYSTEM
MATCHING PROJECTION DECODING METHOD FOR AMBISONICS SYSTEM
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
作者: Qu, Tianshu Huang, Zhichao Qiao, Yue Wu, Xihong Peking Univ Speech & Hearing Res Ctr Key Lab Machine Percept Minist Educ Beijing Peoples R China
The basic Ambisonics decoding method will break down when the playback loudspeakers distribute unevenly. This paper proposes a modified Ambisonics method, the matching projection decoding method, for solving this prob... 详细信息
来源: 评论
Energy-Efficient Offloading in Mobile Edge Computing with Edge-Cloud Collaboration  18th
Energy-Efficient Offloading in Mobile Edge Computing with Ed...
收藏 引用
18th International Conference on algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Long, Xin Wu, Jigang Chen, Long Guangdong Univ Technol Sch Comp Sci & Technol Guangzhou Peoples R China
Multiple access mobile edge computing is an emerging technique to bring computation resources close to end mobile users. By deploying edge servers at WiFi access points or cellular base stations, the computation capab... 详细信息
来源: 评论
A predictive Energy Management Strategy for Hybrid Electric Bus Based on greedy algorithm
A predictive Energy Management Strategy for Hybrid Electric ...
收藏 引用
10th World Congress on Intelligent Control and Automation (WCICA)
作者: Pan, Zheng Song, Chunyue Zhejiang Univ Inst Ind Proc Control State Key Lab Ind Control Technol Hangzhou 310027 Zhejiang Peoples R China
Buses run on fix routes, which makes it possible to design a predictive Energy Management Strategy (EMS) for hybrid electric bus to achieve better overall efficiency. A new predictive EMS is proposed based on the pred... 详细信息
来源: 评论
An Improved Dynamic Spectrum Access Protocol Based on the greedy algorithm
An Improved Dynamic Spectrum Access Protocol Based on the Gr...
收藏 引用
8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)
作者: Wang, Hui Zhang, Yun Gao, Ren Hubei Univ Econ Dept Elect Engn Wuhan Peoples R China Wuhan Univ Int Sch Software Wuhan Peoples R China
In cognitive radio networks, media access control protocol decides the method how the nodes in the networks receive and send data by shared wireless channels. Whether the MAC protocol can use the limited channel effec... 详细信息
来源: 评论
A greedy sparse meshless method for solving heat conduction problems
收藏 引用
ENGINEERING WITH COMPUTERS 2017年 第3期33卷 631-645页
作者: Fadaei, Y. Moghadam, M. Mohseni Shahid Bahonar Univ Kerman Dept Math Kerman Iran
In this paper, we introduce a greedy approximation algorithm for solving the transient heat conduction problem. This algorithm can overcome on some of challenges of the full meshless kernel-based methods such as ill-c... 详细信息
来源: 评论