咨询与建议

限定检索结果

文献类型

  • 521 篇 会议
  • 298 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 424 篇 工学
    • 321 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 77 篇 信息与通信工程
    • 59 篇 控制科学与工程
    • 30 篇 生物工程
    • 26 篇 电气工程
    • 26 篇 化学工程与技术
    • 23 篇 机械工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 动力工程及工程热...
    • 17 篇 生物医学工程(可授...
    • 15 篇 力学(可授工学、理...
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 14 篇 仪器科学与技术
    • 6 篇 航空宇航科学与技...
  • 370 篇 理学
    • 302 篇 数学
    • 93 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 39 篇 生物学
    • 28 篇 化学
    • 28 篇 系统科学
  • 80 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 13 篇 医学
    • 11 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 教育学
    • 12 篇 教育学
  • 7 篇 法学
    • 6 篇 社会学
  • 5 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 118 篇 computer science
  • 40 篇 mathematics
  • 19 篇 algorithm design...
  • 19 篇 polynomials
  • 17 篇 artificial intel...
  • 16 篇 educational inst...
  • 16 篇 computational mo...
  • 14 篇 humans
  • 14 篇 shape
  • 13 篇 data mining
  • 13 篇 equations
  • 12 篇 application soft...
  • 11 篇 routing
  • 11 篇 mathematical mod...
  • 11 篇 layout
  • 10 篇 concurrent compu...
  • 10 篇 control systems
  • 10 篇 topology
  • 10 篇 robustness
  • 9 篇 cameras

机构

  • 21 篇 department of co...
  • 11 篇 math. division n...
  • 11 篇 department of ma...
  • 9 篇 college of mathe...
  • 8 篇 courant inst. of...
  • 7 篇 department of ap...
  • 7 篇 inst. math. stoc...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 machine learning...
  • 6 篇 department of ap...
  • 5 篇 department of ap...
  • 5 篇 school of comput...
  • 5 篇 research centre ...
  • 5 篇 department of ap...
  • 5 篇 dept. of math. a...
  • 4 篇 department of ma...
  • 4 篇 math. research i...
  • 4 篇 department of co...
  • 4 篇 department of ma...

作者

  • 11 篇 naor moni
  • 11 篇 ban jung-chao
  • 9 篇 hu wen-guei
  • 9 篇 sharir micha
  • 8 篇 alsmeyer gerold
  • 8 篇 m. irani
  • 8 篇 lai guan-yu
  • 7 篇 r. basri
  • 6 篇 hemaspaandra edi...
  • 6 篇 krishnaswamy smi...
  • 6 篇 srivastava gauta...
  • 6 篇 fitzsimmons zack
  • 6 篇 wu yu-liang
  • 5 篇 chang chih-hung
  • 5 篇 maldonado josé c...
  • 5 篇 irit dinur
  • 5 篇 macdonell stephe...
  • 5 篇 mendes emília
  • 5 篇 pinchasi rom
  • 5 篇 evangelos a. the...

语言

  • 805 篇 英文
  • 20 篇 其他
  • 3 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Computer Science and Applied Math. Department"
828 条 记 录,以下是391-400 订阅
排序:
Computation of the normal forms for general M-DOF systems using multiple time scales. Part II: Non-autonomous systems
收藏 引用
Communications in Nonlinear science and Numerical Simulation 2006年 第1期11卷 45-81页
作者: Zhu, Songhui Yu, Pei Department of Applied Mathematics Faculty of Sciences The University of Western Ontario London Ont. N6A 5B7 Canada Department of Math./Computer Science Benedict College Columbia SC 29204 United States
A perturbation technique has been developed in Part I to consider the computation of the normal forms for general multiple-degree-of-freedom autonomous systems. In this paper, the perturbation approach is extended to ... 详细信息
来源: 评论
The effectiveness of Lloyd-type methods for the k-means problem
The effectiveness of Lloyd-type methods for the k-means prob...
收藏 引用
47th Annual IEEE Symposium on Foundations of computer science, FOCS 2006
作者: Ostrovsky, Rafail Rabani, Yuval Schulman, Leonard J. Swamy, Chaitanya Computer Science Department UCLA Computer Science Department Technion - Israel Institute of Technology Haifa 32000 Israel Caltech Pasadena CA 91125 Center for the Math. of Information Caltech Pasadena CA 91125
We investigate variants of Lloyd's heuristic for clustering high dimensional data in an attempt to explain its popularity (a half century after its introduction) among practitioners, and in order to suggest improv... 详细信息
来源: 评论
Learning to impersonate  06
Learning to impersonate
收藏 引用
ICML 2006: 23rd International Conference on Machine Learning
作者: Naor, Moni Rothblum, Guy N. Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot 76100 Israel Computer Science and Artificial Intelligence Laboratory MIT Cambridge MA 02139 United States
Consider Alice and Bob, who have some shared secret which helps Alice to identify Bob-impersonators, and Eve, who does not know their secret. Eve wants to impersonate Bob and "fool" Alice. If Eve is computat... 详细信息
来源: 评论
Boundary recognition in sensor networks by topological methods
Boundary recognition in sensor networks by topological metho...
收藏 引用
12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006
作者: Wang, Yue Gao, Jie Mitchell, Joseph S. B. Dept. of Computer Science Stony Brook University Stony Brook NY United States Dept. of Applied Math. and Statistics Stony Brook University Stony Brook NY United States
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to both sensor network applications and the ... 详细信息
来源: 评论
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
收藏 引用
Journal of China University of Mining and Technology 2006年 第4期16卷 470-474页
作者: XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen The Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian University Xi' an Shanxi 710071 China Department of lnformation and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Department of Math. & Physics Zhumadian Institute of Education Zhumadian Henan 463000 China
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... 详细信息
来源: 评论
On the reliability of wireless sensor networks
On the reliability of wireless sensor networks
收藏 引用
2006 IEEE International Conference on Communications, ICC 2006
作者: AboElFotoh, Hosam M. F. ElMallah, Ehab S. Hassanein, Hossam S. Dept. of Math. and Computer Science Kuwait University P.O.Box 5969 Safat 13060 Kuwait Department of Computing Science University of Alberta Edmonton AB Canada School of Computing Queen's University Kingston ON Canada
In wireless sensor networks (WSN), reliable monitoring of a phenomenon (or event detection) depends on the collective data provided by the target cluster of sensors and not on any individual node. In this paper we def... 详细信息
来源: 评论
A practical performance comparison of parallel sorting algorithms on homogeneous network of workstations
收藏 引用
WSEAS Transactions on computers 2006年 第7期5卷 1606-1610页
作者: Rashid, Haroon Qureshi, Kalim COMSATS Institute of Information Technology Abbottabad Pakistan Math. and Computer Science Department Kuwait University Kuwait City Kuwait
Three parallel sorting algorithms have been implemented and compared in terms of their overall execution time. The algorithms implemented are the odd-even transposition sort, parallel merge sort and parallel rank sort... 详细信息
来源: 评论
Discrete Tikhonov regularization algorithm based on matrix SVD
收藏 引用
Journal of Information and Computational science 2006年 第3期3卷 463-469页
作者: Li, Gongsheng Fan, Xiaoping Institute of Applied Mathematics School of Math. and Info. Science Shandong University of Technology Zibo 255049 China School of Computer Science and Technology Shandong University of Technology Zibo 255049 China
This paper deals with a discretization approach to solve ill-posed operator equations based on Tikhonov regularization strategy. By ordinary numerical integration method, the operator equation can be discretized to a ... 详细信息
来源: 评论
Some succinctness properties of Ω-DTAFA
收藏 引用
WSEAS Transactions on computers 2006年 第3期5卷 500-506页
作者: Fellah, A. Noureddine, S. University of Sharjah Department of Computer Sciences Sharjah United Arab Emirates University of Lethbridge Dept. of Math. and Computer Science Lethbridge Alta. T1K 3M4 Canada
A new type of timed alternating finite automata (TAFA) called omega deterministic timed alternating finite automata (Ω-DTAFA) is described. DTAFA and Ω-DTAFA are synchronous and parallel computational models used fo... 详细信息
来源: 评论
WSN04-1: Deployment for Information Oriented Sensing Coverage in Wireless Sensor Networks
WSN04-1: Deployment for Information Oriented Sensing Coverag...
收藏 引用
IEEE Globecom 2006
作者: Quanhong Wang Kenan Xu Glen Takahara Hossam Hassanein Department of Electrical Engineering and Computer Science Queen's University Kingston ON Canada Department of Math. & Stat. Queen's University Kingston ON Canada School of Computing Queen's University Kingston ONT Canada
Due to cost constraints and limited sensing capability of sensor nodes, it may be impossible or unrealistic for a wireless sensor network to provide full area coverage in some circumstances. In this paper, we introduc... 详细信息
来源: 评论