搜索结果: 1-13 共查到“计算机科学技术基础学科 structure”相关记录13条 . 查询时间(0.125 秒)
中国科学技术大学数据结构及应用算法课件 2Examples of Data Structure
中国科学技术大学 数据结构 应用算法 课件 Examples of Data Structure
2019/4/3
中国科学技术大学数据结构及应用算法课件 2Examples of Data Structure。
Data Structure Fusion
Data Structure
2016/5/24
We consider the problem of specifying data structures with complex sharing in a manner that is both declarative and results in provably correct code. In our approach, abstract data types are speci-fie...
Constructing Structure Ensembles of Intrinsically Disordered Proteins from Chemical Shift Data
Constructing Structure Ensembles Intrinsically Disordered Proteins Chemical Shift Data
2016/1/22
Modeling the structural ensemble of intrinsically disordered proteins (IDPs),which lack fixed structures, is essential in understanding their cellular functions and re-vealingtheirregulationmechanisms...
A Study and Experiment on Spatial Statistical CharacterIStic to Discover River Structure knowledge
Spatial Statistics Data Mining River Structure Classification
2015/12/2
River structure is a direct concept for the distribution of rivers in nature. In spatial database, river structure is a type of spatial relations composed by river features. This paper proposes the ch...
Structure and Dynamics in Implementation of Computations
structure dynamics implementation computation independence inheritance transference counterfactual structured states neural replacement partial brain
2015/6/10
Without a proper restriction on mappings, virtually any system could be seen as implementing any computation. That would not allow characterization of systems in terms of implemented computations and ...
Learning the Structure of Bayesian Networks with Constraint Satisfaction
Bayesian networks Constraint satisfaction Constraint-based Structure learning
2014/12/18
A Bayesian network is graphical representation of the probabilistic relationships among set of variables and can be used to encode expert knowledge about uncertain domains. The structure of this model...
Exploiting Structure in Coordinating Multiple Decision Makers
coordination decision processes decision theory game-theory multi-agent systems
2014/12/18
This thesis is concerned with sequential decision making by multiple agents, whether they are acting cooperatively to maximize team reward or selfishly trying to maximize their individual rewards. The...
Exploiting Domain Structure in Multiagent Decision-Theoretic Planning and Reasoning
Artificial Intelligence Machine Learning Multiagent Systems
2014/12/18
This thesis focuses on decision-theoretic reasoning and planning problems that arise when a group of collaborative agents are tasked to achieve a goal that requires collective effort. The main contrib...
A Non-Linear Eigensolver-Based Alternative to Traditional Self-Consistent Electronic Structure Calculation Methods
density functional theory electronic structure eigenvalue self consistent field FEAST
2014/12/8
This thesis presents a means of enhancing the iterative calculation techniques used in electronic structure calculations, particularly Kohn-Sham DFT. Based on the subspace iteration method of the FEAS...
A GLOBAL “NATURAL” GRID MODELING METHOD BASED ON TERRAIN TOPOLOGICAL STRUCTURE
Natural GNG Topological Structure Morse Theory Representation
2014/4/21
In this paper, a Global “Natural” Grid (GNG) modeling method based on the terrain topological structure is proposed. GNG
partitions the earth surface into “natural” cells by using the natural terrain...
Information and Average Information Rates of a Graphical Access Structure on Six Vertices
Average Information Rates Graphical Access Structure Six Vertices
2009/7/27
In this paper we study the optimal information and average information rates of secret sharing schemes which are all connected graphs on six vertices. There are 102 connected graphs on six vertices th...
LEARNING THE STRUCTURE OF BAYESIAN NETWORK FROM SMALL AMOUNT OF DATA
Bayesian network machine learning algorithm structure learning
2010/1/11
Many areas of artificial intelligence must handling with imperfection of
information. One of the ways to do this is using representation and reasoning with
Bayesian networks. Creation of a Bayesian ...
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves
Cryptography Elliptic Curves Isogeny Volcanoes
2014/3/11
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible whe...