咨询与建议

限定检索结果

文献类型

  • 18 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 理学
    • 12 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 地理学
    • 1 篇 海洋科学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 13 篇 工学
    • 12 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 4 篇 控制科学与工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 水利工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 18 篇 time complexity
  • 2 篇 combinatorial op...
  • 2 篇 block cipher
  • 1 篇 internet of thin...
  • 1 篇 computer science
  • 1 篇 multi-processor ...
  • 1 篇 aria
  • 1 篇 advanced encrypt...
  • 1 篇 zernike polynomi...
  • 1 篇 satisfiability p...
  • 1 篇 evolutionary alg...
  • 1 篇 undesirable cent...
  • 1 篇 related-key rect...
  • 1 篇 secure hash algo...
  • 1 篇 convex hull
  • 1 篇 concave point
  • 1 篇 complexity theor...
  • 1 篇 real-time and mi...
  • 1 篇 blockchain techn...
  • 1 篇 dna encoding

机构

  • 2 篇 department of ap...
  • 1 篇 college of intel...
  • 1 篇 schoolofcomputer...
  • 1 篇 pla strategic su...
  • 1 篇 college of compu...
  • 1 篇 state key labora...
  • 1 篇 institute of big...
  • 1 篇 school of cyber ...
  • 1 篇 school of advanc...
  • 1 篇 the institute of...
  • 1 篇 college of liber...
  • 1 篇 state key labora...
  • 1 篇 departmentofelec...
  • 1 篇 key laboratory o...
  • 1 篇 college of engin...
  • 1 篇 english departme...
  • 1 篇 dept.spatial inf...
  • 1 篇 statekeylabofsof...
  • 1 篇 department of co...
  • 1 篇 department of el...

作者

  • 2 篇 behrooz alizadeh
  • 1 篇 fahimeh baroughi
  • 1 篇 高庆狮
  • 1 篇 cheng yuhu
  • 1 篇 lingxuan wang
  • 1 篇 tian zeng
  • 1 篇 张文涛
  • 1 篇 esmaeil afrashte...
  • 1 篇 kai li
  • 1 篇 顾钧
  • 1 篇 qing dai
  • 1 篇 radhika baskar
  • 1 篇 nasrin bastani
  • 1 篇 wei yongzhuang h...
  • 1 篇 haijun geng
  • 1 篇 冯登国
  • 1 篇 lifen sui
  • 1 篇 lin tan
  • 1 篇 nwe ni khin
  • 1 篇 hongyi dai

语言

  • 17 篇 英文
  • 1 篇 中文
检索条件"主题词=time complexity"
18 条 记 录,以下是1-10 订阅
排序:
time complexity Analysis of an Evolutionary Algorithm for Finding Nearly Maximum Cardinality Matching
收藏 引用
Journal of Computer Science & Technology 2004年 第4期19卷 450-458页
作者: JunHe XinYao StateKeyLabofSoftwareEngineering WuhanUniversityWuhan430072P.R.China SchoolofComputerScience UniversityofBirminghamBirminghamB152TTEnglandU.K.
Most of works on the time complexity analysis of evolutionary algorithms havealways focused on some artificial binary problems. The time complexity of the algorithms forcombinatorial optimisation has not been well und... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 683-693页
作者: Jiamei LIU Lin TAN Hong XU PLA Strategic Support Force Information Engineering University
Deoxys-BC is the primitive tweakable block cipher of the Deoxys family of authenticated encryption schemes.Based on existing related-tweakey boomerang distinguishers,this paper improves the boomerang attacks on 11-rou... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
ON LOWER BOUNDS OF time complexity OF SOME ALGORITHMS
收藏 引用
Science China Mathematics 1979年 第8期 890-900页
作者: 洪加威 Beijing Municipal Computing Centre
In this paper, two classes of machines are defined, and the lower bounds of time complexity to compute some problems including sorting and searching on them are examined.
来源: 同方期刊数据库 同方期刊数据库 评论
A Theoretical Comparison among Recursive Algorithms for Fast Computation of Zernike Moments Using the Concept of time complexity
收藏 引用
American Journal of Computational Mathematics 2021年 第4期11卷 304-326页
作者: Nasrin Bastani Alireza Vard Mehdi Jabalameli Vahid Bastani School of Advanced Technologies in Medicine Isfahan University of Medical Sciences Isfahan Iran Medical Image and Signal Processing Research Center Isfahan University of Medical Sciences Isfahan Iran Computer Department Islamic Azad University Najafabad Branch Isfahan Iran English Department Islamic Azad University Najafabad Branch Isfahan Iran
Zernike polynomials have been used in different fields such as optics, astronomy, and digital image analysis for many years. To form these polynomials, Zernike moments are essential to be determined. One of the main i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency
收藏 引用
Computer Systems Science & Engineering 2023年 第4期45卷 641-658页
作者: G.Uganya Radhika Baskar Department of Electronics and Communication Engineering Saveetha School of EngineeringSIMATSChennaiTamil NaduIndia
Internet of Things(IoT)is an emerging technology that moves the world in the direction of smart things.But,IoT security is the complex problem due to its centralized architecture,and limited capacity.So,blockchain tec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smart Bubble Sort:A Novel and Dynamic Variant of Bubble Sort Algorithm
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4895-4913页
作者: Mohammad Khalid Imam Rahmani College of Computing and Informatics Saudi Electronic UniversityRiyadhSaudi Arabia
In the present era,a very huge volume of data is being stored in online and offline databases.Enterprise houses,research,medical as well as healthcare organizations,and academic institutions store data in databases an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Optimal Algorithms for Integer Inverse Undesirable p-Median Location Problems on Weighted Extended Star Networks
收藏 引用
Journal of the Operations Research Society of China 2021年 第1期9卷 99-117页
作者: Esmaeil Afrashteh Behrooz Alizadeh Fahimeh Baroughi Department of Applied Mathematics Faculty of Basic SciencesSahand University of TechnologyTabrizIran
This paper is concerned with the problem of modifying the edge lengths of a weighted extended star network with n vertices by integer amounts at the minimum total cost subject to be given modification bounds so that a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
收藏 引用
Journal of Computer Science & Technology 2007年 第3期22卷 449-456页
作者: 吴文玲 张文涛 冯登国 State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences
This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of ARIA and Camellia known so far.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum algorithms of state estimators in classical control systems
收藏 引用
Science China(Information Sciences) 2020年 第9期63卷 243-254页
作者: Kai LI Hongyi DAI Ming ZHANG College of Intelligence Science National University of Defense Technology College of Liberal Arts and Sciences National University of Defense Technology
In this paper, quantum algorithms are applied to the design of state estimators in classical control systems under the condition that quantum algorithms can be physically implemented. We demonstrate that the design of... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Quick Convex Hull Building Algorithm Based on Grid and Binary Tree
收藏 引用
Chinese Journal of Electronics 2015年 第2期24卷 317-320页
作者: GAO Yang CHENG Yuhu WANG Xuesong School of Information and Electrical Engineering China University of Mining and Technology
A quick convex hull building algorithm using grid and binary tree is proposed for the minimum convex buidling of planar point set. Grids are used to assess and eliminate those interior points wihtout any contribution ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论