咨询与建议

限定检索结果

文献类型

  • 518 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 816 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 424 篇 工学
    • 319 篇 计算机科学与技术...
    • 248 篇 软件工程
    • 77 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 30 篇 生物工程
    • 27 篇 电气工程
    • 26 篇 化学工程与技术
    • 24 篇 机械工程
    • 19 篇 动力工程及工程热...
    • 19 篇 电子科学与技术(可...
    • 17 篇 生物医学工程(可授...
    • 15 篇 力学(可授工学、理...
    • 15 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
  • 370 篇 理学
    • 302 篇 数学
    • 92 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 39 篇 生物学
    • 28 篇 系统科学
    • 27 篇 化学
  • 80 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 13 篇 教育学
    • 13 篇 教育学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 7 篇 法学
    • 6 篇 社会学
  • 5 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 118 篇 computer science
  • 40 篇 mathematics
  • 19 篇 algorithm design...
  • 19 篇 polynomials
  • 16 篇 educational inst...
  • 16 篇 computational mo...
  • 14 篇 humans
  • 14 篇 shape
  • 13 篇 data mining
  • 13 篇 equations
  • 12 篇 application soft...
  • 12 篇 artificial intel...
  • 11 篇 routing
  • 11 篇 mathematical mod...
  • 11 篇 layout
  • 10 篇 concurrent compu...
  • 10 篇 control systems
  • 10 篇 topology
  • 10 篇 robustness
  • 9 篇 cameras

机构

  • 21 篇 department of co...
  • 11 篇 math. division n...
  • 11 篇 department of ma...
  • 9 篇 college of mathe...
  • 8 篇 courant inst. of...
  • 7 篇 department of ap...
  • 7 篇 inst. math. stoc...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 machine learning...
  • 6 篇 department of ap...
  • 5 篇 department of ap...
  • 5 篇 school of comput...
  • 5 篇 research centre ...
  • 5 篇 department of ap...
  • 5 篇 dept. of math. a...
  • 4 篇 department of ma...
  • 4 篇 math. research i...
  • 4 篇 department of co...
  • 4 篇 department of ma...

作者

  • 11 篇 naor moni
  • 11 篇 ban jung-chao
  • 9 篇 hu wen-guei
  • 9 篇 sharir micha
  • 8 篇 alsmeyer gerold
  • 8 篇 m. irani
  • 8 篇 lai guan-yu
  • 7 篇 r. basri
  • 6 篇 hemaspaandra edi...
  • 6 篇 krishnaswamy smi...
  • 6 篇 srivastava gauta...
  • 6 篇 fitzsimmons zack
  • 6 篇 wu yu-liang
  • 5 篇 chang chih-hung
  • 5 篇 maldonado josé c...
  • 5 篇 macdonell stephe...
  • 5 篇 mendes emília
  • 5 篇 pinchasi rom
  • 5 篇 evangelos a. the...
  • 5 篇 lin jerry chun-w...

语言

  • 797 篇 英文
  • 17 篇 其他
  • 2 篇 中文
检索条件"机构=Department of Applied Math. and Computer Science"
816 条 记 录,以下是381-390 订阅
排序:
Probabilistic Strategies for Pursuit in Cluttered Environments with Multiple Robots
Probabilistic Strategies for Pursuit in Cluttered Environmen...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Geoffrey Hollinger Athanasios Kehagias Sanjiv Singh The Robotics Institute School of Computer Science Carnegie Mellon University Pittsburgh PA USA Division of Mathematics Department of Math. Phys. and Computer Science s Faculty of Engineering Aristotle University of Thessaloniki Thessaloniki Greece
In this paper, we describe a method for coordinating multiple robots in a pursuit-evasion domain. We examine the problem of multiple robotic pursuers attempting to locate a non-adversarial mobile evader in an indoor e... 详细信息
来源: 评论
On MIDO Space-Time Block Codes
On MIDO Space-Time Block Codes
收藏 引用
IEEE International Symposium on Information Theory
作者: Camilla Hollanti Kalle Ranto Lab of Discrete Math. for Inf. Tech. Turku Centre for Computer Science Turku Finland Laboratory of Discrete Mathematics for Information Technology Turku Center for Computer Science Turku Finland Department of Mathematics University of Turku Finland
In this paper, the need for the construction of multiple input-double output (MIDO) space-time block codes (STBCs) is discussed, concentrating on the case of four transmitters for simplicity. Above the trivial method,... 详细信息
来源: 评论
Convergence properties of preconditioned hermitian and skew-hermitian splitting methods for non-hermitian positive semidefinite matrices
收藏 引用
math.matics of Computation 2007年 第257期76卷 287-298页
作者: Bai, Zhong-Zhi Golub, Gene H. Li, Chi-Kwong Department of Mathematics Fudan University Shanghai 200433 China State Key Laboratory of Scientific Acad. of Math. and Syst. Sci. Chinese Acad. of Sci. Beijing 100080 P.O. BOX 2719 China Scientific Computing and Computational Mathematics Program Department of Computer Science Stanford University Stanford CA 94305-9025 United States Department of Mathematics College of William and Mary Williamsburg VA 23187-8795 P.O. Box 8795 United States
For the non-Hermitian and positive semidefinite systems of linear equations, we derive necessary and sufficient conditiorrs for guaranteeing the unconditional convergence of the preconditioned Hermitian and skew-Hermi... 详细信息
来源: 评论
Service Matching in Online Community for Mutual Assisted Living
Service Matching in Online Community for Mutual Assisted Liv...
收藏 引用
International IEEE Conference on Signal-Image Technologies and Internet-Based System
作者: Hong Sun Vincenzo De Florio Ning Gui Chris Blondia Interdisciplinary institute for BroadBand Technology Ghent-Ledeberg Belgium Department of Mathematics and Computer Science Performance Analysis of Telecommunication Systems group Antwerp Belgium Dept. of Math. & Comput. Sci. Performance Anal. of Telecommun. Syst. Group Antwerp
Elder people are becoming a predominant aspect of our societies. As such, solutions both efficacious and cost-effective need to be sought. Our previous study suggests that mutual assisted living community, where dwell... 详细信息
来源: 评论
On embedding triconnected cubic graphs on point sets
收藏 引用
Electronic Notes in Discrete math.matics 2007年 第SPEC. ISS.期29卷 531-538页
作者: García, Alfredo Hurtado, Ferran Huemer, Clemens Tejel, Javier Valtr, Pavel Departamento de Métodos Estadísticos Facultad de Ciencias Universidad de Zaragoza 50009-Zaragoza Pedro Cerbuna 12 Spain Dept. Matematica Aplicada II. Universitat Politecnica de Catalunya. Jordi Girona 1-3. 08034 Barcelon Spain Dept. Matematica Aplicada II. Universitat Politecnica de Catalunya. Jordi Girona 1-3. 08034 Barcelon Spain Departamento de Métodos Estadísticos Facultad de Ciencias Universidad de Zaragoza 50009-Zaragoza Pedro Cerbuna 12 Spain Dept. of Applied Math. Institute for Theoretical Computer Science (ITI) Charles University 118 00 Praha 1 Malostranské nám. 25 Czech Republic
We show that for a given set S of 2n points in general position in the plane, there is a cubic 3-connected crossing-free geometric graph on the vertex set S if and only if the interior of the convex hull of S contains... 详细信息
来源: 评论
Web Services Interfaces and Open Standards Integration into the European UNICORE 6 Grid Middleware
Web Services Interfaces and Open Standards Integration into ...
收藏 引用
International Workshop on Enterprise Distributed Object Computing, EDOCW
作者: M. Riedel B. Schuller D. Mallmann R. Menday A. Streit B. Tweddell M. Shahbaz Memon A. Shiraz Memon B. Demuth T. Lippert D. Snelling S. van den Berghe V. Li M. Drescher A. Geiger G. Ohme A. Vanni C. Cacciari S. Lanzarini P. Malfetti K. Benedyczak P. Bala R. Ratering A. Lukichev Central Institute for Applied Mathematics John von Neumann Institute of Computing Forschungszentrum Julich Julich Germany John von Neumann Inst. for Comput. Forschungszentrum Julich Central Inst. for Appl. Math. Julich Fujitsu Laboratories Limited Hayes UK Solutions for Research T-Systems Corporation Wessling Germany High Performance Computing Department CINECA Bologna Italy Faculty of Mathematics and Computer Science Torun Nicolaus Copernicus University Torun Poland Software and Solutions Group Intel Corporation Bruhl Germany
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Gri... 详细信息
来源: 评论
Metacomputing revisited: Alternative paradigms for distributed resource sharing
收藏 引用
ICCS 2006: 6th International Conference on Computational science
作者: Sunderam, Vaidy Department of Math. and Computer Science Emory University Atlanta GA 30322 United States
Conventional distributed computing paradigms such as PVM and MPI(CH) have had mixed success when translated to computing environments that span multiple administrative and ownership domains. We analyze fundamental iss... 详细信息
来源: 评论
Computation of the normal forms for general M-DOF systems using multiple time scales. Part II: Non-autonomous systems
收藏 引用
Communications in Nonlinear science and Numerical Simulation 2006年 第1期11卷 45-81页
作者: Zhu, Songhui Yu, Pei Department of Applied Mathematics Faculty of Sciences The University of Western Ontario London Ont. N6A 5B7 Canada Department of Math./Computer Science Benedict College Columbia SC 29204 United States
A perturbation technique has been developed in Part I to consider the computation of the normal forms for general multiple-degree-of-freedom autonomous systems. In this paper, the perturbation approach is extended to ... 详细信息
来源: 评论
The effectiveness of Lloyd-type methods for the k-means problem
The effectiveness of Lloyd-type methods for the k-means prob...
收藏 引用
47th Annual IEEE Symposium on Foundations of computer science, FOCS 2006
作者: Ostrovsky, Rafail Rabani, Yuval Schulman, Leonard J. Swamy, Chaitanya Computer Science Department UCLA Computer Science Department Technion - Israel Institute of Technology Haifa 32000 Israel Caltech Pasadena CA 91125 Center for the Math. of Information Caltech Pasadena CA 91125
We investigate variants of Lloyd's heuristic for clustering high dimensional data in an attempt to explain its popularity (a half century after its introduction) among practitioners, and in order to suggest improv... 详细信息
来源: 评论
Learning to impersonate  06
Learning to impersonate
收藏 引用
ICML 2006: 23rd International Conference on Machine Learning
作者: Naor, Moni Rothblum, Guy N. Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot 76100 Israel Computer Science and Artificial Intelligence Laboratory MIT Cambridge MA 02139 United States
Consider Alice and Bob, who have some shared secret which helps Alice to identify Bob-impersonators, and Eve, who does not know their secret. Eve wants to impersonate Bob and "fool" Alice. If Eve is computat... 详细信息
来源: 评论