咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 13 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 软件工程
    • 1 篇 公安技术
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...

主题

  • 17 篇 threshold comput...
  • 4 篇 fault detection
  • 3 篇 fuzzy logic prog...
  • 2 篇 adaptive thresho...
  • 2 篇 querying
  • 2 篇 zonotopes
  • 2 篇 databases
  • 2 篇 static threshold
  • 2 篇 manets
  • 1 篇 error evaluation
  • 1 篇 linear classifie...
  • 1 篇 trust-based secu...
  • 1 篇 component
  • 1 篇 satisfiability p...
  • 1 篇 outlier removal
  • 1 篇 road network
  • 1 篇 abduction
  • 1 篇 image segmentati...
  • 1 篇 dominant feature
  • 1 篇 gaussian approxi...

机构

  • 2 篇 comsats inst inf...
  • 2 篇 harbin inst tech...
  • 2 篇 la trobe univ de...
  • 1 篇 hanoi univ techn...
  • 1 篇 univ lorraine ct...
  • 1 篇 school of astron...
  • 1 篇 princeton univ p...
  • 1 篇 shaanxi normal u...
  • 1 篇 stmicroelect inc...
  • 1 篇 institut de robò...
  • 1 篇 univ duisburg es...
  • 1 篇 univ calif san d...
  • 1 篇 univ victoria de...
  • 1 篇 purdue univ cybe...
  • 1 篇 univ lyon automa...
  • 1 篇 cnrs laas f-3107...
  • 1 篇 univ windsor sch...
  • 1 篇 univ victoria de...
  • 1 篇 coll engn guindy...
  • 1 篇 univ ulm abt the...

作者

  • 2 篇 khan muhammad sa...
  • 2 篇 shen yi
  • 2 篇 bertino elisa
  • 2 篇 midi daniele
  • 2 篇 wang zhenhua
  • 2 篇 liu fei
  • 1 篇 han yn
  • 1 篇 zhenhua wang
  • 1 篇 xinyang liu
  • 1 篇 sathish r.
  • 1 篇 theilliol didier
  • 1 篇 surendar a.
  • 1 篇 le van hung
  • 1 篇 van hung le
  • 1 篇 tang wentao
  • 1 篇 lehmann f
  • 1 篇 khan majid. i.
  • 1 篇 hemaspaandra la
  • 1 篇 shen bo
  • 1 篇 ding steven x.

语言

  • 17 篇 英文
检索条件"主题词=threshold computation"
17 条 记 录,以下是1-10 订阅
排序:
threshold computation and cryptographic security
收藏 引用
SIAM JOURNAL ON COMPUTING 1997年 第1期26卷 59-78页
作者: Han, YN Hemaspaandra, LA Thierauf, T UNIV ROCHESTER DEPT COMP SCI ROCHESTER NY 14627 USA UNIV ULM ABT THEORET INFORMAT D-89069 ULM GERMANY PRINCETON UNIV PRINCETON NJ 08544 USA
threshold machines are Turing machines whose acceptance is determined by what portion of the machine's computation paths are accepting paths. Probabilistic machines are Turing machines whose acceptance is determin... 详细信息
来源: 评论
threshold computation for fault detection in linear discrete-time Markov jump systems
收藏 引用
INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING 2014年 第11期28卷 1106-1127页
作者: Saijai, Jedsada Ding, Steven X. Abdo, Ali Shen, Bo Damlakhi, Waseem Univ Duisburg Essen Inst Automat Control & Complex Syst AKS Fac Engn D-47057 Duisburg Germany
This paper proposes a threshold computation scheme for an observer-based fault detection (FD) in linear discrete-time Markovian jump systems. An observer-based FD scheme typically consists of two stages known as resid... 详细信息
来源: 评论
Dynamic threshold computation in fault detection for discrete-time linear systems  30
Dynamic threshold computation in fault detection for discret...
收藏 引用
30th Chinese Control and Decision Conference (CCDC)
作者: Liu, Xinyang Wang, Zhenhua Wang, Ye Shen, Yi Harbin Inst Technol Sch Astronaut Harbin 150001 Peoples R China Univ Politecn Catalunya BarcelonaTech UPC Inst Robot & Informat Ind CSIC UPC C Llorens & Artigas 4-6 Barcelona 08028 Spain
This paper studies threshold computation in observer-based fault detection for discrete-time linear systems subject to unknown but bounded uncertainties. Based on two different assumptions on uncertainties, we propose... 详细信息
来源: 评论
Dynamic threshold computation in fault detection for discrete-time linear systems
Dynamic threshold computation in fault detection for discret...
收藏 引用
第30届中国控制与决策会议
作者: Xinyang Liu Zhenhua Wang Ye Wang Yi Shen School of Astronautics Harbin Institute of Technology Institut de Robòtica i Informatica Industrial CSIC-UPC Universitat Politècnica de Catalunya-BarcelonaTech (UPC)
This paper studies threshold computation in observer-based fault detection for discrete-time linear systems subject to unknown but bounded uncertainties. Based on two different assumptions on uncertainties, we propose... 详细信息
来源: 评论
Fuzzy linguistic logic programming and its applications
收藏 引用
THEORY AND PRACTICE OF LOGIC PROGRAMMING 2009年 第3期9卷 309-341页
作者: Le, Van Hung Liu, Fei Tran, Dinh Khang La Trobe Univ Dept Comp Sci & Comp Engn Bundoora Vic 3086 Australia Hanoi Univ Technol Fac Informat Technol Hanoi Vietnam
The paper introduces FUZZY linguistic logic programming, which is a combination of fuzzy logic programming, introduced by P. Vojtas, and hedge algebras in order to facilitate the representation and reasoning on human ... 详细信息
来源: 评论
Analysis of the iterative decoding of LDPC and product codes using the Gaussian approximation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2003年 第11期49卷 2993-3000页
作者: Lehmann, F Maggio, GM CNRS LAAS F-31077 Toulouse France STMicroelect Inc Adv Syst Technol San Diego CA USA Univ Calif San Diego Ctr Wireless Commun La Jolla CA 92093 USA
We propose a novel density evolution approach to analyze the iterative decoding algorithms of low-density parity-check (LDPC) codes and product codes, based on Gaussian densities. Namely, for these classes of codes we... 详细信息
来源: 评论
An efficient approach to compute the threshold for multi-dimensional linear classifiers
收藏 引用
PATTERN RECOGNITION 2004年 第4期37卷 811-826页
作者: Rueda, L Univ Windsor Sch Comp Sci Windsor ON N9B 3P4 Canada
In this paper, we theoretically analyze some properties that relate Fisher's classifier and the optimal quadratic classifier, when the latter is derived utilizing a particular covariance matrix for the classes. We... 详细信息
来源: 评论
threshold dominating sets and an improved characterization of W
收藏 引用
THEORETICAL COMPUTER SCIENCE 1998年 第1-2期209卷 123-140页
作者: Downey, RG Fellows, MR Univ Victoria Dept Math Wellington New Zealand Univ Victoria Dept Comp Sci Victoria BC V8W 3P6 Canada
The threshold DOMINATING SET problem is that of determining for a graph G = (V,E) whether there is a subset V' subset of or equal to V of size k, such that for each vertex v is an element of V there are at least r... 详细信息
来源: 评论
Tabulation proof procedures for fuzzy linguistic logic programming
收藏 引用
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING 2015年 63卷 62-88页
作者: Van Hung Le Liu, Fei Hanoi Univ Min & Geol Fac Informat Technol Hanoi Vietnam La Trobe Univ Dept Comp Sci & Comp Engn Bundoora Vic 3086 Australia
Fuzzy linguistic logic programming is a logical system for representing and reasoning with linguistically-expressed human knowledge. In fuzzy linguistic logic programming, up until now, there have been only two method... 详细信息
来源: 评论
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust threshold Strategy
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2017年 第3期22卷 493-509页
作者: Khan, Muhammad Saleem Midi, Daniele Malik, Saif-Ur-Rehman Khan, Majid I. Javaid, Nadeem Bertino, Elisa COMSATS Inst Informat Technol Dept Comp Sci Islamabad Pakistan Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Due to dynamic network topology, distributed architecture and absence of a centralized authority, Mobile Ad hoc Networks (MANETs) are vulnerable to various attacks from misbehaving nodes. To enhance the security of MA... 详细信息
来源: 评论