×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [1]
西安交通大学 [1]
北京航空航天大学 [1]
兰州大学 [1]
武汉大学 [1]
内容类型
期刊论文 [3]
会议论文 [2]
发表日期
2015 [5]
学科主题
informatio... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
限定条件
发表日期:2015
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Parallel many-objective evolutionary optimization using objectives decomposition
期刊论文
Zidonghua Xuebao/Acta Automatica Sinica, 2015, 卷号: 41, 期号: 8, 页码: 1438-1451
作者:
Gong, Dun-Wei
;
Liu, Yi-Ping
;
Sun, Xiao-Yan
;
Han, Yu-Yan
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2020/11/14
Approximation algorithms
Decomposition
Optimization
Computation complexity
Evolutionary optimization algorithm
Evolutionary optimizations
Many-objective optimizations
Nondominated solutions
Parallel
Parallel evolutionary algorithms
Pareto domination
Parameter-free View Synthesis Distortion Model with Application to Depth Video Coding
会议论文
作者:
Yang, Meng
;
Zhu, Ce
;
Lan, Xuguang
;
Zheng, Nanning
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/02
MVD-based 3D video
View synthesis
Implementation complexity
Coding computation
Depth coding
MUS: A novel deadline-constrained scheduling algorithm for Hadoop
期刊论文
International Journal of Computational Science and Engineering, 2015, 卷号: 11, 期号: 4, 页码: 360-367
作者:
Teng, Fei
;
Yang, Hao
;
Li, Tianrui
;
Magoulès, Frédéric
;
Fan, Xiaoliang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/01/16
Scheduling algorithms
Algorithms
Batch data processing
Cloud computing
Information services
Real time systems
Scheduling
Clusters of computers
Computation complexity
Constrained scheduling
Deadline constraint
Heterogeneous environments
Map-reduce
Processing capability
Time constrained scheduling
A public key cryptosystem based on data complexity under quantum environment
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2015, 卷号: 58, 期号: 11
作者:
Wu WanQing
;
Zhang HuanGuo
;
Wang HouZhen
;
Mao ShaoWu
;
Jia JianWei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
public key cryptography
information security
NP-complete problem
complexity theory
quantum computation
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:
Wang, Xiang
;
Wang, Liping
;
Bai, Yuanchen
;
He, Zhenxue
;
Wang, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
component
Elliptic Curve Crytography
computation time complexity
Power Analysis Attack
NAF encoding algorithm
Security SoC
Scalar Multiplication algorithm
©版权所有 ©2017 CSpace - Powered by
CSpace