咨询与建议

限定检索结果

文献类型

  • 478 篇 期刊文献
  • 145 篇 会议
  • 5 篇 学位论文
  • 2 册 图书

馆藏范围

  • 630 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 458 篇 工学
    • 363 篇 计算机科学与技术...
    • 116 篇 电气工程
    • 78 篇 软件工程
    • 43 篇 控制科学与工程
    • 41 篇 信息与通信工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 仪器科学与技术
    • 4 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 石油与天然气工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 测绘科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
  • 307 篇 理学
    • 276 篇 数学
    • 29 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 5 篇 生物学
  • 61 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 17 篇 经济学
    • 15 篇 应用经济学
    • 2 篇 理论经济学
  • 6 篇 医学
    • 5 篇 临床医学
  • 4 篇 农学
  • 3 篇 法学
    • 3 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 630 篇 randomized algor...
  • 31 篇 approximation al...
  • 25 篇 distributed algo...
  • 19 篇 low-rank approxi...
  • 17 篇 computational ge...
  • 15 篇 approximation
  • 14 篇 lower bound
  • 13 篇 clustering
  • 12 篇 optimization
  • 11 篇 dimension reduct...
  • 11 篇 parallel algorit...
  • 10 篇 load balancing
  • 10 篇 linear programmi...
  • 10 篇 combinatorial op...
  • 9 篇 competitive anal...
  • 9 篇 singular value d...
  • 9 篇 sketching
  • 8 篇 computational co...
  • 8 篇 big data
  • 8 篇 leader election

机构

  • 11 篇 chongqing univ c...
  • 6 篇 fudan univ sch m...
  • 6 篇 stanford univ de...
  • 5 篇 univ hong kong d...
  • 5 篇 univ colorado de...
  • 5 篇 city univ hong k...
  • 5 篇 natl univ singap...
  • 4 篇 n carolina state...
  • 4 篇 wuhan univ sch m...
  • 4 篇 max planck inst ...
  • 4 篇 tsinghua univ in...
  • 4 篇 stanford univ ic...
  • 4 篇 fudan univ key l...
  • 4 篇 purdue univ dept...
  • 4 篇 univ michigan de...
  • 3 篇 univ elect sci &...
  • 3 篇 univ chicago dep...
  • 3 篇 iit dept comp sc...
  • 3 篇 xiamen univ wang...
  • 3 篇 chongqing univ k...

作者

  • 11 篇 li hanyu
  • 9 篇 pandurangan gopa...
  • 6 篇 yang haizhao
  • 6 篇 wei yimin
  • 5 篇 robinson peter
  • 5 篇 tropp joel a.
  • 5 篇 wang mengyu
  • 5 篇 kaltofen e
  • 5 篇 alipour sharareh
  • 5 篇 gulwani s
  • 5 篇 ghodsi mohammad
  • 5 篇 wang jianxin
  • 5 篇 molla anisur rah...
  • 5 篇 lau francis c. m...
  • 5 篇 necula gc
  • 5 篇 chen jianer
  • 4 篇 sauerwald thomas
  • 4 篇 kumar manish
  • 4 篇 liu yang
  • 4 篇 mostefaoui achou...

语言

  • 586 篇 英文
  • 37 篇 其他
  • 5 篇 中文
  • 1 篇 德文
检索条件"主题词=randomized algorithm"
630 条 记 录,以下是501-510 订阅
排序:
VECTOR ADDRESSING FOR NON-SEQUENTIAL SAMPLING IN FIR IMAGE FILTERING  26
VECTOR ADDRESSING FOR NON-SEQUENTIAL SAMPLING IN FIR IMAGE F...
收藏 引用
26th IEEE International Conference on Image Processing (ICIP)
作者: Fukushima, Norishige Tsubokawa, Teppei Maeda, Yoshihiro Nagoya Inst Technol Nagoya Aichi Japan
Image filtering is fundamental in image processing. The acceleration is essential since image resolution has highly increased. For the acceleration, image subsampling is a general approach for any filtering. However, ... 详细信息
来源: 评论
Monitoring schedules for randomly deployed sensor networks without geographic information
Monitoring schedules for randomly deployed sensor networks w...
收藏 引用
12th International Symposium on Pervasive Systems, algorithms, and Networks (I-SPAN)
作者: Calinescu, G. IIT Dept Comp Sci Chicago IL 60616 USA
Given n sensors and m targets, a monitoring schedule is a partition of the sensor set such that each part of the partition can monitor all targets. Monitoring schedules are used to maximize the time all targets are mo... 详细信息
来源: 评论
SUPPORT VECTOR MACHINE (SVM) FOR ENGLISH HANDWRITTEN CHARACTER RECOGNITION
SUPPORT VECTOR MACHINE (SVM) FOR ENGLISH HANDWRITTEN CHARACT...
收藏 引用
2nd International Conference on Computer Engineering and Applications
作者: Nasien, Dewi Haron, Habibollah Yuhaniz, Siti Sophiayati Univ Teknol Malaysia Dept Modeling & Ind Comp Johor Baharu Malaysia
This paper proposes a recognition model for English handwritten (lowercase, uppercase and letter) character recognition that uses Freeman chain code (FCC) as the representation technique of an image character. Chain c... 详细信息
来源: 评论
Fast Hamiltonicity Checking via Bases of Perfect Matchings  13
Fast Hamiltonicity Checking via Bases of Perfect Matchings
收藏 引用
45th Annual ACM Symposium on the Theory of Computing (STOC)
作者: Cygan, Marek Kratsch, Stefan Nederlof, Jesper Univ Warsaw Warsaw Poland Tech Univ Berlin Berlin Germany Univ Utrecht Utrecht Netherlands
For an even integer t >= 2, the Matching Connectivity matrix H-t is a matrix that has rows and columns both labeled by all perfect matchings of the complete graph K-t on t vertices;an entry H-t[M-1, M-2] is 1 if M-... 详细信息
来源: 评论
Constant Factor Approximations to Edit Distance on Far Input Pairs in Nearly Linear Time  2020
Constant Factor Approximations to Edit Distance on Far Input...
收藏 引用
52nd Annual ACM SIGACT Symposium on Theory of Computing (STOC)
作者: Koucky, Michal Saks, Michael Charles Univ Prague Comp Sci Inst Prague Czech Republic Rutgers State Univ Dept Math Piscataway NJ USA
For any T >= 1, there are constants R = R(T) > 1 and zeta = zeta((T) > 0 and a randomized algorithm that takes as input an integer n and two strings x, y of length at most n, and runs in time O(n(1+1/T)) and ... 详细信息
来源: 评论
Replacement Paths via Fast Matrix Multiplication
Replacement Paths via Fast Matrix Multiplication
收藏 引用
IEEE 51st Annual Symposium on Foundations of Computer Science (FOCS)
作者: Weimann, Oren Yuster, Raphael Weizmann Inst Sci Dept Comp Sci & Appl Math IL-76100 Rehovot Israel Univ Haifa Dept Math Haifa Israel
Let G be a directed edge-weighted graph and let P be a shortest path from s to t in G. The replacement paths problem asks to compute, for every edge e on P, the shortest s-to-t path that avoids e. Apart from approxima... 详细信息
来源: 评论
Regularities Considered Harmful: Forcing Randomness to Memory Accesses to Reduce Row Buffer Conflicts for Multi-Core, Multi-Bank Systems  13
Regularities Considered Harmful: Forcing Randomness to Memor...
收藏 引用
18th International Conference on Architectural Support for Programming Languages and Operating Systems
作者: Park, Heekwon Baek, Seungjae Choi, Jongmoo Lee, Donghee Noh, Sam H. Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA Dankook Univ Dept Comp Sci Seoul South Korea Univ Seoul Sch Comp Sci Seoul South Korea Hongik Univ Sch Comp & Informat Engn Seoul South Korea
We propose a novel kernel-level memory allocator, called M-3 (M-cube, Multi-core Multi-bank Memory allocator), that has the following two features. First, it introduces and makes use of a notion of a memory container,... 详细信息
来源: 评论
A modified ant algorithm for solving the quadratic assignment problem
A modified ant algorithm for solving the quadratic assignmen...
收藏 引用
International Conference on Intelligent Pervasive Computing (IPC 2007)
作者: Qi, Chengming Beijing Union Univ Coll Automat Beijing 100101 Peoples R China
The Quadratic Assignment Problem(QAP) is one of the hardest combinatorial optimization problems known. Ant algorithms have been inspired by the behavior of real ant colonies. In this paper, we introduce random algorit... 详细信息
来源: 评论
A Probabilistic Robust Control Method for a Small UAV with Bounded Uncertainty  35
A Probabilistic Robust Control Method for a Small UAV with B...
收藏 引用
第35届中国控制会议
作者: XIE Rong WANG Xinmin WANG Jian CAO Yuyan LI Ting School of Automation Northwestern Polytechnical University
This paper proposes a probabilistic robust control approach for a small unmanned aerial vehicle(UAV) in longitudinal ight. In the proposed method, the stochastic behavior of uncertainty parameters is considered in sol... 详细信息
来源: 评论
Precise interprocedural analysis using random interpretation
Precise interprocedural analysis using random interpretation
收藏 引用
32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
作者: Gulwani, S Necula, GC Univ Calif Berkeley Dept Elect Engn & Comp Sci Berkeley CA 94720 USA
We describe a unified framework for random interpretation that generalizes previous randomized intraprocedural analyses, and also extends naturally to efficient interprocedural analyses. There is no such natural exten... 详细信息
来源: 评论