首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70篇
  免费   6篇
  国内免费   3篇
化学   6篇
力学   20篇
综合类   3篇
数学   22篇
物理学   28篇
  2023年   1篇
  2022年   2篇
  2021年   7篇
  2019年   1篇
  2018年   1篇
  2016年   2篇
  2015年   3篇
  2014年   3篇
  2013年   2篇
  2012年   1篇
  2011年   3篇
  2010年   2篇
  2009年   5篇
  2008年   3篇
  2007年   3篇
  2006年   6篇
  2005年   4篇
  2004年   2篇
  2003年   5篇
  2002年   6篇
  2001年   1篇
  1998年   4篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   2篇
  1989年   1篇
  1986年   1篇
排序方式: 共有79条查询结果,搜索用时 281 毫秒
1.
基于SUN5500小型计算机并行开发环境,给出了消息传递模型和蕴式行模型的实现方法,通过实例分析了SUNMPI实际编程,并对选取不同模型有不同参数的运算时间进行了比较,结果表明,在SUN5500计算机上MPI模型和蕴式并行模型均能较大地提高运算速度,而且MPI在灵活性和并行程度方面更优。  相似文献   
2.
A new parallel storm surge model, the Parallel Environmental Model (PEM), is developed and tested by comparisons with analytic solutions. The PEM is a 2‐D vertically averaged, wetting and drying numerical model and can be operated in explicit, semi‐implicit and fully implicit modes. In the implicit mode, the propagation, Coriolis and bottom friction terms can all be treated implicitly. The advection and diffusion terms are solved with a parallel Eulerian–Lagrangian scheme developed for this study. The model is developed specifically for use on parallel computer systems and will function accordingly in either explicit of implicit modes. Storm boundary conditions are based on a simple exponential decay of pressure from the centre of a storm. The simulated flooding caused by a major Category 5 hurricane making landfall in the Indian River Lagoon, Florida is then presented as an example application of the PEM. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
3.
This paper is about algorithms that schedule tasks to be performed in a distributed failure‐prone environment, when processors communicate by message‐passing, and when tasks are independent and of unit length. The processors work under synchrony and may fail by crashing. Failure patterns are imposed by adversaries. Linearly‐bounded adversaries may fail up to a constant fraction of the processors. Weakly‐adaptive adversaries have to select, prior to the start of an execution, a subset of processors to be failure‐prone, and then may fail only the selected processors, at arbitrary steps, in the course of the execution. Strongly adaptive adversaries have a total number of failures as the only restriction on failure patterns. The measures of complexity are work, measured as the available processor steps, and communication, measured as the number of point‐to‐point messages. A randomized algorithm is developed, that attains both ??(n log*n) expected work and ??(n log*n) expected communication, against weakly‐adaptive linearly‐bounded adversaries, in the case when the numbers of tasks and processors are both equal to n. This is in contrast with performance of algorithms against strongly‐adaptive linearly‐bounded adversaries, which has to be Ω(n log n/log log n) in terms of work. © 2003 Wiley Periodicals, Inc. Random Struct. Alg., 2004  相似文献   
4.
线性方程组通解并行数值方法   总被引:4,自引:0,他引:4  
1预备知识 线性方程组消息传递MIMD算法是20世纪90年代至今的活跃课题,但尚无此问题 的通用有效算法发表.用!.}.}表示矩阵列分块划分,记AX=b为[AI司.定理1、2是文 {l]、[s]成果综述和推广. 定理i[‘]设有线性方程组!e}己l,e〔尺”“m,d〔R”“‘,rank(e)=r.当且仅当rank(!  相似文献   
5.
孙翠丽  魏东波  杨民 《光学技术》2007,33(3):345-347,351
分析了三维ICT近似重建FDK快速算法以及算法串行执行与并行执行的复杂度,利用MPI并行编程环境,对原有ICT重建流程进行并行化,在PC集群上实现了并行ICT重建,进行了系统集成。给出了系统应用实现的解决方案与软件集成流程图。实验结果证明串行重建和并行重建结果是一致的,并行重建可以得到比较理想地重建时间结果和比较理想的加速比与效率。  相似文献   
6.
We consider the problem of canonical labeling in anonymous directed split-stars. This paper proposes a distributed algorithm for finding the vertex sets with specified leading symbols in directed split-stars and which has a linear message and constant time complexity. The algorithm runs on an asynchronous timing model without shared memory. In addition, our algorithm generalizes the previous distributed algorithms on directed split-stars that we know.  相似文献   
7.
We study the message queueing delays in a node of a communication system, where a message consists of a block of consecutive packets. The message delay is defined as the time elapsing between the arrival epoch of the first packet of the message to the system until after the transmission of the last packet of that message is completed. We distinguish between two types of message generation processes. The message can be generated as abatch or it can bedispersed over time. In this paper we focus on the dispersed generation model. The main difficulty in the analysis is due to the correlation between the system states observed by different packets of the same message. This paper introduces a new technique to analyze the message delay in such systems for different arrival models and different number of sessions. For anM/M/1 system with variable size messages and for the bursty traffic model, we obtain an explicit expression for the Laplace-Stieltjes transform (LST) of the message delay. Derivations are also provided for anM/G/1 system, for multiple session systems and for fixed message sizes. We show that the correlation has a strong effect on the performance of the system, and that the commonly usedindependence assumption, i.e., the assumption that the delays of packets are independent from packet to packet, can lead to wrong conclusions.  相似文献   
8.
The family of expectation--maximization (EM) algorithms provides a general approach to fitting flexible models for large and complex data. The expectation (E) step of EM-type algorithms is time-consuming in massive data applications because it requires multiple passes through the full data. We address this problem by proposing an asynchronous and distributed generalization of the EM called the distributed EM (DEM). Using DEM, existing EM-type algorithms are easily extended to massive data settings by exploiting the divide-and-conquer technique and widely available computing power, such as grid computing. The DEM algorithm reserves two groups of computing processes called workers and managers for performing the E step and the maximization step (M step), respectively. The samples are randomly partitioned into a large number of disjoint subsets and are stored on the worker processes. The E step of DEM algorithm is performed in parallel on all the workers, and every worker communicates its results to the managers at the end of local E step. The managers perform the M step after they have received results from a γ-fraction of the workers, where γ is a fixed constant in (0, 1]. The sequence of parameter estimates generated by the DEM algorithm retains the attractive properties of EM: convergence of the sequence of parameter estimates to a local mode and linear global rate of convergence. Across diverse simulations focused on linear mixed-effects models, the DEM algorithm is significantly faster than competing EM-type algorithms while having a similar accuracy. The DEM algorithm maintains its superior empirical performance on a movie ratings database consisting of 10 million ratings. Supplementary material for this article is available online.  相似文献   
9.
Loopy belief propagation (LBP) algorithm over pairwise-connected Markov random fields (MRFs) has become widely used for low-level vision problems. However, Pairwise MRF is often insufficient to capture the statistics of natural images well, and LBP is still extremely slow for application on an MRF with large discrete label space. To solve these problems, the present study proposes a new segmentation algorithm based on adaptive LBP. The proposed algorithm utilizes local region information to construct a local region model, as well as a local interaction region MRF model for image segmentation. The adaptive LBP algorithm maximizes the global probability of the proposed MRF model, which employs two very important strategies, namely, “message self-convergence” and “adaptive label pruning”. Message self-convergence can improve the reliability of a pixel in choosing a label in local region, and label pruning can dismiss impossible labels for every pixel. Thus, the most reliable information messages transfer through the LBP algorithm. The experimental results show that the proposed algorithm not only obtains more accurate segmentation results but also greater speed.  相似文献   
10.
Re-innervation of sensory and motor neurons on a defined area of the body wall was studied in two species of leeches, Whitmania pigra and Hirudo medicinalis, as a model of segmental animals. Following isolation and rotation of a tube of body wall, the mechanical sensory and annular erection (AE) motor neurons re-innervated the body wall, at a rate of approximately 3. 8 -8. 4 μm/h. The patterns of re-innerva-tion by pairs of neurons on each side of a ganglion were bilaterally symmetric. The repairs are synchronous for the sensory and motor neurons which are of different functions but in a same ganglion. The gap junctions are widely spread in leech between neurons and glia cells, as well as among the neurons and glia cells themselves. Therefore, it is proposed that the nervous system repair is regulated by a low-resistance pathway. In the xenotransplantation experiments, neurons recognized target tissues before the immuno-recognition and rejection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号