全文获取类型
收费全文 | 70篇 |
免费 | 3篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
综合类 | 1篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 3篇 |
矿业工程 | 1篇 |
无线电 | 16篇 |
一般工业技术 | 3篇 |
原子能技术 | 2篇 |
自动化技术 | 46篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 6篇 |
2020年 | 2篇 |
2018年 | 1篇 |
2017年 | 1篇 |
2016年 | 2篇 |
2015年 | 5篇 |
2014年 | 2篇 |
2013年 | 7篇 |
2012年 | 4篇 |
2011年 | 3篇 |
2010年 | 2篇 |
2009年 | 10篇 |
2008年 | 5篇 |
2007年 | 3篇 |
2006年 | 1篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 6篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1998年 | 1篇 |
排序方式: 共有75条查询结果,搜索用时 15 毫秒
21.
改进的Michael Merrit投票协议 总被引:1,自引:0,他引:1
互联网的快速发展使得网上投票成为可能。Michael Merrit协议是一种无须中央制表机构的投票系统,它有两个缺陷:选票能被复制,某个人将比其他人更早得知选票结果。该文提出了对MichaelMerrit协议的改进,克服了这两个缺陷。改进后的协议将适用于小型的无须中央制表机构的投票系统。 相似文献
22.
当前社会由于各种原因.致使脑部疾病高发.而精确勾画脑部各区域轮廓是手术和治疗成功的重要前提。提出一种基于张量投票的脑区域边界提取算法,利用医学图像中元素的邻近性、连续性等特点,对临床MR(核磁共振)图像进行处理,实现符合人类感知的边界轮廓勾画。实验表明。该算法具有良好的实际效果。 相似文献
23.
Julio K. Rosenblatt 《人工智能实验与理论杂志》2013,25(2-3):339-360
An architecture is presented in which distributed task-achieving modules, or behaviours, cooperatively determine a mobile robot's path by voting for each of various possible actions. An arbiter then performs command fusion and selects that action which best satisfies the prioritized goals of the system, as expressed by these votes, without the need to average commands. Command fusion allows multiple goals and constraints to be considered simultaneously. Examples of implemented systems are given, and future research directions in command fusion are discussed. 相似文献
24.
In recent years, wide attention has been drawn to the problem of containing worm propagation in smartphones. Unlike existing containment models for worm propagation, we study how to prevent worm propagation through the immunization of key nodes (e.g., the top k influential nodes). Thus, we propose a novel containment model based on an influence maximization algorithm. In this model, we introduce a social relation graph to evaluate the influence of nodes and an election mechanism to find the most influential nodes. Finally, this model provides a targeted immunization strategy to disable worm propagation by immunizing the top k influential nodes. The experimental results show that the model not only finds the most influential top k nodes quickly, but also effectively restrains and controls worm propagation. 相似文献
25.
26.
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote cannot be traced back from the result to a voter, while on the other hand, verifiability states that a voter can trace the effect of her vote on the result. This can be addressed using various privacy-enabling cryptographic primitives which also offer verifiability.As more and more refined voting systems were proposed, understanding of first privacy and later verifiability in voting increased, and notions of privacy as well as notions of verifiability in voting became increasingly more refined. This has culminated in a variety of verifiable systems that use cryptographic primitives to ensure specific kinds of privacy. However, the corresponding privacy and verifiability claims are not often verified independently. When they are investigated, claims have been invalidated sufficiently often to warrant a cautious approach to them.The multitude of notions, primitives and proposed solutions that claim to achieve both privacy and verifiability form an interesting but complex landscape. The purpose of this paper is to survey this landscape by providing an overview of the methods, developments and current trends regarding privacy and verifiability in voting systems. 相似文献
27.
Analysis of a Plurality Voting-based Combination of Classifiers 总被引:1,自引:0,他引:1
In various studies, it has been demonstrated that combining the decisions of multiple classifiers can lead to better recognition
result. Plurality voting is one of the most widely used combination strategies. In this paper, we both theoretically and experimentally
analyze the performance of a plurality voting based ensemble classifier. Theoretical expressions for system performance are
derived as a function of the model parameters: N (number of classifiers), m (number of classes), and p (probability that a single classifier is correct). Experimental results on the human face recognition problem show that the
voting strategy can successfully achieve high detection and identification rates, and, simultaneously, low false acceptance
rates. 相似文献
28.
随着智能时代的到来,集体决策的方式也在发生着改变,人们不再满足于单一的决策结果,需要多个赢家共同组成的委员会成为获胜集合,并将此集合应用于推荐系统、搜索引擎、政策表决以及企业决策等领域.多赢家投票理论最大的优点是决策成本低并且决策效率高,是非常优秀的集体决策方法.多赢家投票理论的研究核心在于找到适合不同应用场景的多赢家... 相似文献
29.
30.
We discuss approaches to incrementally construct an ensemble. The first constructs an ensemble of classifiers choosing a subset from a larger set, and the second constructs an ensemble of discriminants, where a classifier is used for some classes only. We investigate criteria including accuracy, significant improvement, diversity, correlation, and the role of search direction. For discriminant ensembles, we test subset selection and trees. Fusion is by voting or by a linear model. Using 14 classifiers on 38 data sets, incremental search finds small, accurate ensembles in polynomial time. The discriminant ensemble uses a subset of discriminants and is simpler, interpretable, and accurate. We see that an incremental ensemble has higher accuracy than bagging and random subspace method; and it has a comparable accuracy to AdaBoost, but fewer classifiers. 相似文献