咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 9 篇 threshold algori...
  • 2 篇 simulated anneal...
  • 1 篇 outlier detectio...
  • 1 篇 secret sharing
  • 1 篇 traveling salesm...
  • 1 篇 narrative descri...
  • 1 篇 constraint logic...
  • 1 篇 social applicati...
  • 1 篇 social search
  • 1 篇 humphrey field a...
  • 1 篇 data security
  • 1 篇 global indices
  • 1 篇 metaheuristics
  • 1 篇 linguistic techn...
  • 1 篇 automated perime...
  • 1 篇 relaxation
  • 1 篇 anomaly detectio...
  • 1 篇 optimal matching
  • 1 篇 discrete optimiz...
  • 1 篇 non-monotonic se...

机构

  • 1 篇 univ calif berke...
  • 1 篇 ind univ ho chi ...
  • 1 篇 ute hcmc fac ele...
  • 1 篇 dostoevsky omsk ...
  • 1 篇 univ hong kong d...
  • 1 篇 int univ vnu hcm...
  • 1 篇 univ penn wharto...
  • 1 篇 department of op...
  • 1 篇 agh univ sci & t...
  • 1 篇 rv coll engn dep...
  • 1 篇 univ kent inst m...
  • 1 篇 univ montreal ct...
  • 1 篇 univ paris sud f...
  • 1 篇 msrit dept comp ...
  • 1 篇 inria saclay f-9...
  • 1 篇 pesit dept ise b...
  • 1 篇 univ tsukuba gra...
  • 1 篇 sobolev inst mat...
  • 1 篇 hosei univ dept ...

作者

  • 1 篇 maniu silviu
  • 1 篇 laporte g
  • 1 篇 rosenbaum paul r...
  • 1 篇 nordmann j.p.
  • 1 篇 ngo thuyen v.
  • 1 篇 ogiela urszula
  • 1 篇 tran hue t.
  • 1 篇 osman ih
  • 1 篇 cautis bogdan
  • 1 篇 denis p.
  • 1 篇 natarajan s.
  • 1 篇 aveldanes jose
  • 1 篇 harding david
  • 1 篇 naveen n. c.
  • 1 篇 takizawa makoto
  • 1 篇 yu ruoqi
  • 1 篇 hasegawa m.
  • 1 篇 mouton-chopin d.
  • 1 篇 small dylan s.
  • 1 篇 nguer y.

语言

  • 9 篇 英文
检索条件"主题词=threshold algorithms"
9 条 记 录,以下是1-10 订阅
排序:
Positive role of glassy dynamics in finite-time optimization by threshold algorithms
收藏 引用
COMPUTER PHYSICS COMMUNICATIONS 2011年 第1期182卷 229-231页
作者: Hasegawa, M. Univ Tsukuba Grad Sch Syst & Informat Engn Tsukuba Ibaraki 3058573 Japan
The optimization mechanism of threshold algorithms is investigated in the solving process of a random Euclidean traveling salesman problem A series of computer experiments previously designed for simulated annealing i... 详细信息
来源: 评论
Development of threshold algorithms for a Location Problem with Elastic Demand  11th
Development of Threshold Algorithms for a Location Problem w...
收藏 引用
11th International Conference on Large-Scale Scientific Computations (LSSC)
作者: Levanova, Tatyana Gnusarev, Alexander Sobolev Inst Math Omsk Branch Pevtsova Str 13 Omsk 644043 Russia Dostoevsky Omsk State Univ Prospekt Mira 55A Omsk 644077 Russia
This work is devoted to development of threshold algorithms for one static probabilistic competitive facility location and design problem in the following formulation. New Company plans to enter the market and to loca... 详细信息
来源: 评论
Static threshold visual field in glaucoma with the Fastpac(TM) algorithm of the Humphrey Field Analyser. Is the gain in examination time offset by any loss of information?
收藏 引用
European Journal of Ophthalmology 1994年 第2期4卷 105-110页
作者: Nordmann, J.P. Denis, P. Nguer, Y. Mouton-Chopin, D. Saraux, H. Department of Ophthalmology Hopital Tenon F-75020 Paris 4 rue de la Chine France
A new algorithm (Fastpac(TM)) has been designed to speed up full threshold tests with the Humphrey Field Analyser. We studied the utility of this algorithm by comparing central 24-2 threshold programs obtained with st... 详细信息
来源: 评论
Metaheuristics: A bibliography
收藏 引用
ANNALS OF OPERATIONS RESEARCH 1996年 第5期63卷 513-623页
作者: Osman, IH Laporte, G UNIV KENT INST MATH & STATCANTERBURY CT2 7NFKENTENGLAND UNIV MONTREAL CTR RECH TRANSPORTSMONTREALPQ H3C 3J7CANADA
Metaheuristics are the most exciting development in approximate optimization techniques of the last two decades. They have had widespread successes in attacking a variety of difficult combinatorial optimization proble... 详细信息
来源: 评论
Optimal Matching for Observational Studies That Integrate Quantitative and Qualitative Research
收藏 引用
STATISTICS AND PUBLIC POLICY 2021年 第1期8卷 42-52页
作者: Yu, Ruoqi Small, Dylan S. Harding, David Aveldanes, Jose Rosenbaum, Paul R. Univ Penn Wharton Sch Philadelphia PA 19104 USA Univ Calif Berkeley Dept Sociol Berkeley CA 94720 USA
A quantitative study of treatment effects may form many matched pairs of a treated subject and an untreated control who look similar in terms of covariates measured prior to treatment. When treatments are not randomly... 详细信息
来源: 评论
Network-aware Search in Social Tagging Applications: Instance Optimality versus Efficiency  13
Network-aware Search in Social Tagging Applications: Instanc...
收藏 引用
22nd ACM International Conference on Information and Knowledge Management (CIKM)
作者: Maniu, Silviu Cautis, Bogdan Univ Hong Kong Dept Comp Sci Pokfulam Rd Hong Kong Peoples R China Univ Paris Sud F-91405 Orsay France INRIA Saclay F-91405 Orsay France
We consider in this paper top-k query answering in social applications, with a focus on social tagging. This problem requires a significant departure from socially agnostic techniques. In a network-aware context, one ... 详细信息
来源: 评论
An EEG-Controlled Wheelchair Using Eye Movements  5
An EEG-Controlled Wheelchair Using Eye Movements
收藏 引用
5th International Conference on the Development of Biomedical Engineering in Vietnam
作者: Tran, Hue T. Nguyen, Hai T. Phan, Hieu V. Toi, V. Van Ngo, Thuyen V. Cao Bui-Thu Int Univ VNU HCMC Dept Biomed Engn Seoul South Korea UTE HCMC Fac Elect Elect Engn Hanoi Vietnam Ind Univ Ho Chi Minh City Dept Elect Technol Ho Chi Minh City Vietnam
This paper proposes a threshold algorithm to extract features and then create standard thresholds of EEG online signals using eye movements. Based on the standard thresholds, an electrical wheelchair can be controlled... 详细信息
来源: 评论
Application of Change Point Outlier Detection Methods in Real Time Intrusion Detection
Application of Change Point Outlier Detection Methods in Rea...
收藏 引用
International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
作者: Naveen, N. C. Natarajan, S. Srinivasan, R. RV Coll Engn Dept ISE Bangalore Karnataka India PESIT Dept ISE Bangalore Karnataka India MSRIT Dept Comp Sci & Engn Bangalore Karnataka India
Recent years has shown a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. Current research shows that change detection methods can be used for a wide range of... 详细信息
来源: 评论
Security of Selected Secret Sharing Schemes  11th
Security of Selected Secret Sharing Schemes
收藏 引用
11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Ogiela, Urszula Takizawa, Makoto Ogiela, Lidia AGH Univ Sci & Technol Cryptog & Cognit Informat Res Grp 30 Mickiewicza Ave PL-30059 Krakow Poland Hosei Univ Dept Adv Sci 3-7-2 Kajino Cho Koganei Tokyo 1848584 Japan
In the paper will be described a few most important aspects connected with innovative secret sharing procedures, and also an idea of linguistic cryptography in processes of data encryption. The most important aspects ... 详细信息
来源: 评论