咨询与建议

限定检索结果

文献类型

  • 14,455 篇 会议
  • 1,287 篇 期刊文献
  • 2 篇 资讯
  • 1 篇 学位论文

馆藏范围

  • 15,745 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,673 篇 工学
    • 1,946 篇 计算机科学与技术...
    • 1,735 篇 电气工程
    • 710 篇 信息与通信工程
    • 554 篇 控制科学与工程
    • 546 篇 软件工程
    • 286 篇 机械工程
    • 232 篇 电子科学与技术(可...
    • 231 篇 仪器科学与技术
    • 46 篇 测绘科学与技术
    • 38 篇 交通运输工程
    • 30 篇 网络空间安全
    • 22 篇 航空宇航科学与技...
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 矿业工程
    • 13 篇 土木工程
    • 12 篇 石油与天然气工程
    • 9 篇 动力工程及工程热...
  • 371 篇 管理学
    • 368 篇 管理科学与工程(可...
  • 310 篇 理学
    • 131 篇 系统科学
    • 73 篇 数学
    • 55 篇 物理学
    • 28 篇 生物学
    • 25 篇 地球物理学
    • 12 篇 统计学(可授理学、...
  • 82 篇 医学
    • 75 篇 临床医学
  • 59 篇 文学
    • 59 篇 新闻传播学
  • 21 篇 艺术学
    • 21 篇 设计学(可授艺术学...
  • 16 篇 农学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 教育学
    • 9 篇 教育学
  • 2 篇 经济学
  • 2 篇 法学

主题

  • 15,745 篇 partitioning alg...
  • 4,684 篇 clustering algor...
  • 3,088 篇 algorithm design...
  • 1,673 篇 computer science
  • 1,281 篇 heuristic algori...
  • 1,133 篇 data mining
  • 889 篇 computational mo...
  • 749 篇 hardware
  • 735 篇 costs
  • 724 篇 optimization
  • 720 篇 image segmentati...
  • 658 篇 iterative algori...
  • 593 篇 parallel process...
  • 576 篇 approximation al...
  • 576 篇 testing
  • 561 篇 routing
  • 505 篇 computer archite...
  • 477 篇 concurrent compu...
  • 461 篇 very large scale...
  • 444 篇 shape

机构

  • 40 篇 ibm thomas j. wa...
  • 38 篇 department of co...
  • 31 篇 school of comput...
  • 25 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 department of el...
  • 18 篇 at and t bell la...
  • 17 篇 department of co...
  • 17 篇 school of electr...
  • 16 篇 school of comput...
  • 16 篇 department of el...
  • 16 篇 institute of com...
  • 16 篇 department of el...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 15 篇 department of el...
  • 15 篇 school of electr...

作者

  • 25 篇 xianlong hong
  • 19 篇 hichem frigui
  • 15 篇 yici cai
  • 14 篇 sanghamitra band...
  • 13 篇 jun wang
  • 13 篇 g. karypis
  • 13 篇 li li
  • 13 篇 jing wang
  • 12 篇 sriparna saha
  • 12 篇 tzung-pei hong
  • 12 篇 a.k. jain
  • 12 篇 thambipillai sri...
  • 11 篇 suleyman s. koza...
  • 11 篇 hau-san wong
  • 11 篇 yu wang
  • 11 篇 hui wang
  • 11 篇 jian-jia chen
  • 11 篇 p. banerjee
  • 11 篇 sanjoy baruah
  • 11 篇 francisco de a.t...

语言

  • 15,591 篇 英文
  • 122 篇 其他
  • 32 篇 中文
检索条件"主题词=partitioning algorithms"
15745 条 记 录,以下是4941-4950 订阅
排序:
Efficient compositing methods for the sort-last-sparse parallel volume rendering system on distributed memory multicomputers
Efficient compositing methods for the sort-last-sparse paral...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Don-Lin Yang Jen-Chih Yu Yeh-Ching Chung Department of Information Engineering Feng Chia University FCU Taichung Taiwan
In the sort-last-sparse parallel volume rendering system on distributed memory multicomputers, as the number of processors increases, in the rendering phase, we can get a good speedup because each processor renders im... 详细信息
来源: 评论
Bandwidth efficient and error resilient image coding for Rayleigh fading channels
Bandwidth efficient and error resilient image coding for Ray...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: S. Manji G. Djuknic Lucent Technologies Inc. Whippany NJ USA
The transmission of still images over wireless channels is an exercise in tradeoffs. For bandwidth efficiency, a high source compression rate is required. However, the transmission must be robust towards channel error... 详细信息
来源: 评论
Reconfigurable hardware for addition chains based modular exponentiation
Reconfigurable hardware for addition chains based modular ex...
收藏 引用
International Conference on Information Technology: Coding and Computing (ITCC)
作者: L. de Macedo Mourelle N. Nedjah Department of Systems Engineering and Computation State University of Rio de Janeiro Brazil Department of Electronics Engineering and Telecommunications Faculty of Engineering State University of Rio de Janeiro Brazil
In several public-key cryptosystems, the main operation consists of the modular exponentiation, which is performed using successive modular multiplications. The size of the operands that are used in these cryptosystem... 详细信息
来源: 评论
Event log analysis with the LogCluster tool
Event log analysis with the LogCluster tool
收藏 引用
MILCOM, Military Communications Conference
作者: Risto Vaarandi Markus Kont Mauno Pihelgas Tallinna Tehnikaulikool Tallinn Harjumaa EE Technology Branch NATO CCD COE Tallinn Estonia
Today, event logging is a widely accepted concept with a number of event formatting standards and event collection protocols. Event logs contain valuable information not only about system faults and performance issues... 详细信息
来源: 评论
A public mesh watermarking algorithm based on addition property of Fourier transform
A public mesh watermarking algorithm based on addition prope...
收藏 引用
International Conference on Image and Graphics (ICIG)
作者: Li Li Zhigeng Pan David Zhang Hangzhou Dianzi University Hangzhou China State Key Laboratory of CAD&CG University of Zhejiang Hangzhou China Multimedia Signal Processing and Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China
This paper presents a public mesh watermarking algorithm. First, the resultant watermarked image minus the original image is the watermark information. According to the addition property of the Fourier transform, a ch... 详细信息
来源: 评论
Optimizing Mobile Computational Offloading with Delay Constraints
Optimizing Mobile Computational Offloading with Delay Constr...
收藏 引用
IEEE Global Communications Conference
作者: Yi-Hsuan Kao Bhaskar Krishnamachari Dept. of Electr. Eng. Univ. of Southern California Los Angeles CA USA
Computation Offloading, sending computational tasks to more resourceful servers, is becoming a widely-used approach to save limited resources on mobile devices like battery life, storage, processor, etc. Given an appl... 详细信息
来源: 评论
Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data Base
Performance Tuning of Steganography Algorithm for Privacy Pr...
收藏 引用
New Technologies, Mobility and Security (NTMS)
作者: Mahmoud Hussein Ashraf El-Sisi Nabil Ismail Computer Science Department Faculty of computers and Information Menoufia University Shibin El Kom Egypt
Privacy and security issues in data mining become an important property in any data mining system. A considerable research has focused on developing new data mining algorithms that incorporate privacy constraints. In ... 详细信息
来源: 评论
GDILC: a grid-based density-isoline clustering algorithm
GDILC: a grid-based density-isoline clustering algorithm
收藏 引用
International Conferences on Info-tech and Info-net (ICII)
作者: Zhao Yanchang Song Junde CTI Centre of BUPT Electronic Engineering School Beijing University of Posts and Telecommunications Beijing China
A novel clustering algorithm, the grid-based density-isoline clustering (GDILC) algorithm is put forward in this paper. The central idea of GDILC is that the density-isoline figure depicts the distribution of data sam... 详细信息
来源: 评论
A multiple description coding method based on 3-D SPIHT for videos
A multiple description coding method based on 3-D SPIHT for ...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Shung-Fu Yang Chin-Pan Huang Bor-Jiunn Hwang Department of Computer and Communication Engineering Ming Chuan University Taoyuan Taiwan
This study presents a new multiple description coding method based on a three-dimensional set partitioning in hierarchical trees (3-D SPIHT) algorithm in WiMAX for videos. Applying a poly-phase sampling technique to s... 详细信息
来源: 评论
Efficient search approaches for k-medoids-based algorithms
Efficient search approaches for k-medoids-based algorithms
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Shu-Chuan Chu J.F. Roddick Tsong-Yi Chen Jeng-Shyang Pan School of Informatics and Engineering Flinders University of South Australia Australia Department of Electronic Engineering National Kaohsiung University of Applied Sciences Taiwan Department of Electrical and Electronic Engineering University of Adelaide Australia
In this paper, the concept of previous medoid index is introduced. The utilization of memory for efficient medoid search is also presented. We propose a hybrid search approach for the problem of nearest neighbor searc... 详细信息
来源: 评论