咨询与建议

限定检索结果

文献类型

  • 179 篇 会议
  • 142 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 327 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 理学
    • 132 篇 数学
    • 69 篇 物理学
    • 30 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 11 篇 化学
    • 8 篇 系统科学
    • 6 篇 地球物理学
  • 176 篇 工学
    • 119 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 30 篇 信息与通信工程
    • 28 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 15 篇 电气工程
    • 14 篇 生物医学工程(可授...
    • 14 篇 生物工程
    • 13 篇 光学工程
    • 11 篇 仪器科学与技术
    • 9 篇 化学工程与技术
    • 8 篇 力学(可授工学、理...
    • 7 篇 机械工程
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 核科学与技术
  • 37 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
  • 2 篇 教育学
  • 2 篇 农学

主题

  • 20 篇 computer science
  • 16 篇 proton-proton in...
  • 11 篇 large hadron col...
  • 9 篇 mathematics
  • 8 篇 cross sections (...
  • 6 篇 mobile communica...
  • 5 篇 collisions (nucl...
  • 5 篇 visualization
  • 5 篇 graph theory
  • 5 篇 standard model (...
  • 5 篇 nuclear counters
  • 5 篇 artificial intel...
  • 5 篇 computer network...
  • 5 篇 momentum (mechan...
  • 4 篇 conferences
  • 4 篇 radioactive deca...
  • 4 篇 muons
  • 4 篇 data mining
  • 4 篇 wireless sensor ...
  • 4 篇 databases

机构

  • 27 篇 faculté des scie...
  • 27 篇 department of ph...
  • 27 篇 graduate school ...
  • 27 篇 department of ph...
  • 27 篇 faculty of scien...
  • 27 篇 division of phys...
  • 27 篇 departamento de ...
  • 27 篇 department of ph...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 yerevan physics ...
  • 27 篇 infn sezione di ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 fakultät für phy...
  • 27 篇 department of ph...
  • 27 篇 institute of phy...
  • 27 篇 institute of phy...
  • 27 篇 dsm/irfu cea sac...
  • 27 篇 physikalisches i...
  • 27 篇 instituto de fís...

作者

  • 32 篇 f. pastore
  • 31 篇 c. alexa
  • 31 篇 j. m. izen
  • 31 篇 a. harvey
  • 31 篇 c. hensel
  • 31 篇 s. michal
  • 31 篇 t. poghosyan
  • 31 篇 k. bos
  • 31 篇 g. bella
  • 31 篇 j. strandberg
  • 31 篇 d. calvet
  • 31 篇 c. amelung
  • 31 篇 b. toggerson
  • 31 篇 g. m. kolachev
  • 31 篇 c. geweniger
  • 31 篇 h. a. gordon
  • 31 篇 s. montesano
  • 31 篇 g. spigo
  • 31 篇 f. siegert
  • 31 篇 a. ishikawa

语言

  • 322 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Inst. of Applied Mathematics and Computer Science"
327 条 记 录,以下是41-50 订阅
排序:
B-CONVERGENCE OF THE IMPLICIT MIDPOINT RULE AND THE TRAPEZOIDAL RULE.
BIT (Copenhagen)
收藏 引用
BIT (Copenhagen) 1985年 第4期25卷 652-666页
作者: Kraaijevanger, J.F.B.M. Univ of Leiden Inst of Applied Mathematics & Computer Science Leiden Neth Univ of Leiden Inst of Applied Mathematics & Computer Science Leiden Neth
We present upper bounds for the global discretization error of the implicit midpoint rule and the trapezoidal rule for the case of arbitrary variable stepsizes. Specializing our results for the case of constant stepsi... 详细信息
来源: 评论
Cross-lingual question answering by answer translation
Cross-lingual question answering by answer translation
收藏 引用
2006 Cross Language Evaluation Forum Workshop, CLEF 2006, co-located with the 10th European Conference on Digital Libraries, ECDL 2006
作者: Bos, Johan Nissim, Malvina Linguistic Computing Laboratory Department of Computer Science University of Rome la Sapienza Italy Laboratory for Applied Ontology Inst. for Cognitive Science and Technology National Research Council Rome Italy
We approach cross-lingual question answering by using a mono-lingual QA system for the source language and by translating resulting answers into the target language. As far as we are aware, this is the first cross-lin... 详细信息
来源: 评论
Towards weak bisimulation for coalgebras
Towards weak bisimulation for coalgebras
收藏 引用
Categorical Methods for Concurrency, Interaction, and Mobility (CONCUR 2002 Satellite Workshop)
作者: Rothe, Jan Mašulović, Dragan Inst. for Theor. Computer Science Dresden University of Technology D-01062 Dresden Germany Inst. of Mathematics and Informatics University of Novi Sad Trg D. Obradovića 4 21000 Novi Sad Yugoslavia
This paper contains a novel approach to observational equivalence for coalgebras. We describe how to define weak homomorphisms, weak bisimulation, and investigate the connection between them as well as the relation to... 详细信息
来源: 评论
A master theorem for discrete divide and conquer recurrences
A master theorem for discrete divide and conquer recurrences
收藏 引用
作者: Drmota, Michael Szpankowski, Wojciech Inst. Discrete Mathematics and Geometry TU Wien A-1040 Wien Austria Department of Computer Science Purdue University West Lafayette IN 47907-2066 United States
Divide-and-conquer recurrences are one of the most studied equations in computer science. Yet, discrete versions of these recurrences, namely m T(n) = an + ∑j=1m bjT([pjn + δj]) for some known sequence an and given ... 详细信息
来源: 评论
Modal logics for observation equivalences
Modal logics for observation equivalences
收藏 引用
CMCS'03, Coalgebraic Methods in computer science Satellite Event for ETAPS 2003)
作者: Rothe, Jan Mašulović, Dragan Inst. for Theor. Computer Science Dresden University of Technology D-01062 Dresden Germany Inst. of Mathematics and Informatics University of Novi Sad Trg D. Obradovića 4 21000 Novi Sad Yugoslavia
In our paper [RM02a] we describe an approach to weak bisimulation for coalgebras and show that parts of the theory of universal coalgebra (with strong bisimulation) can be obtained when considering coalgebras with wea... 详细信息
来源: 评论
On locally delaunay geometric graphs
On locally delaunay geometric graphs
收藏 引用
Proceedings of the Twentieth Annual Symposium on Computational Geometry (SCG'04)
作者: Pinchasi, Rom Smorodinsky, Shakhar Department of Mathematics Massachusetts Inst. of Technology Cambridge MA 02139 United States Math. Sciences Research Institute Berkeley CA 94720 United States Inst. for Theor. Computer Science ETH Zurich Switzerland
A geometric graph is a simple graph G = (V, E) with an embedding of the set V in the plane such that the points that represent V are in general position. A geometric graph is said to be k-locally Delaunay (or a D k-gr... 详细信息
来源: 评论
TransSQL: A translation and validation-based solution for SQL-injection attacks
TransSQL: A translation and validation-based solution for SQ...
收藏 引用
1st International Conference on Robot, Vision and Signal Processing, RVSP 2011
作者: Zhang, Kai-Xiang Lin, Chia-Jun Chen, Shih-Jen Hwang, Yanling Huang, Hao-Lun Hsu, Fu-Hau Computer Science and Info. Engineering National Central University Chungli Taoyuan Taiwan Network and Multimedia Inst. Inst. for Info. Industry Taipei Taiwan School of Applied Foreign Languages Chung Shan Medical University Taichung Taiwan Computer Science and Info. Engineering National Central University Taiwan
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and ... 详细信息
来源: 评论
Complexity and approximability of double digest
收藏 引用
Journal of Bioinformatics and Computational Biology 2005年 第2期3卷 207-223页
作者: Cieliebak, Mark Eidenbenz, Stephan Woeginger, Gerhard J. Inst. of Theoretical Computer Sci. ETH Zurich 8092 Zurich Switzerland Basic and Applied Simulation Science Los Alamos National Laboratory Los Alamos NM 87545 P.O. Box 1663 United States Faculty of Electrical Engineering Mathematics/Computer Science University of Twente 7500 AE Enschede P.O. Box 217 Netherlands
We revisit the DOUBLE DIGEST problem, which occurs in sequencing of large DNA strings and consists of reconstructing the relative positions of cut sites from two different enzymes. We first show that DOUBLE DIGEST is ... 详细信息
来源: 评论
Tracking the best disjunction
Tracking the best disjunction
收藏 引用
作者: Auer, Peter Warmuth, Manfred K. Inst. for Theor. Computer Science University of Technology Graz Klosterwiesgasse 32/2 A-8010 Graz Austria Department of Computer Science Univ. of California at Santa Cruz Applied Sciences Building Santa Cruz CA 95064
Littlestone developed a simple deterministic on-line learning algorithm for learning k-literal disjunctions. This algorithm (called WINNOW) keeps one weight for each of the n variables and does multiplicative updates ... 详细信息
来源: 评论
Secure session key distribution scheme for group communications
收藏 引用
Journal of Shanghai Jiaotong University (science) 2006年 第2期11 E卷 192-196页
作者: Lin, Ren-Hung Jan, Jinn-Ke Inst. of Applied Mathematics National Chung Hsing Univ. Taichung 402 Taiwan Inst. of Computer Science National Chung Hsing Univ. Taichung 402 Taiwan
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join... 详细信息
来源: 评论