Mobile
Log In Sign Up
Home > chinese-english > "theory of computing" in English

English translation for "theory of computing"

计算理论期刊

Related Translations:
remote computing:  远程计算远程数据处理
supervisor compute:  计算器监督者监督器
cloud computing:  网云运算云端运算云计算
computing laboratory:  计算实验室
computed azimuth:  计算方位
computing reviews:  计算评论
computed velocity:  计算速度
computed result:  计算结果
computing milieu:  计算机环境
extensible computing:  可扩展计算
Example Sentences:
1.In proc . the 32nd acm symposium on theory of computing , portland , oregon , 2000 , pp . 163 - 170
该算法有效地利用了新增加的两条边来提高可用的local路由信息。
2.Reinforced concrete masonry shear wall structure is a new type of structure , the theory of computing and analysis for it is juvenility
配筋砌块砌体剪力墙结构是一种新型的建筑结构体系,其内力分析和计算理论还较不成熟。
3.Theory of computing , hersonissos , greece , 2001 , pp . 163 - 172 . 18 homan c m , istrate g . small worlds , locality , and flooding on landscapes
由于各连接边是根据随机分布生成,整个网络不易受攻击,因而具有良好的fault tolerance 。
4.32nd acm symp . theory of computing , portland , usa , may 2000 , pp . 163 - 170 . 22 berry m , drmac z , jessup e . matrices , vector spaces , and information retrieval
本文阐述了面向服务的语义重叠网络的设计原理创建与维护,并通过模拟和对比论证了语义重叠网络如何有效地推动服务资源的发现。
5.The 36th annual acm symposium on theory of computing , chicago , il , usa , 2004 , pp . 54 - 63 . 7 zhang h , goel a , govindan r . using the small - world model to improve freenet performance
本文称新增的这两条边为augmented local links ,而称被augmented local links所连接的节点为前节点的augmented local neighbors 。
6.Kalai , gil . " a subexponential randomized simplex algorithm ( extended abstract ) . " in proceedings of the 24th annual association for computing machinery symposium on theory of computing . new york , ny : acm press , 1992
一种亚指数随机化的简单型法(扩展摘要) , 《第24届计算理论的机器计算年会公报》 ,纽约, ny : acm出版, 1992 。
7.1 luby m , rackoff c . how to construct pseudorandom permutations from pseudorandom functions . siam journal on computing , 1988 , 17 : 373 - 386 . a preliminary version including other results appeared in proceedings of the 18th acm symposium on theory of computing , 1986 , pp . 356 - 363
可证明安全理论在分组密码中的研究始于luby和rackoff对des的工作,他们形式化地描述了分组密码的密码特性,依据不同的攻击,定义了伪随机置换和超伪随机置换的概念。
Similar Words:
"theory of complementary needs" English translation, "theory of complex multiplication" English translation, "theory of complexity of computations" English translation, "theory of composition" English translation, "theory of computation" English translation, "theory of computing (journal)" English translation, "theory of computing systems" English translation, "theory of concentration of capital" English translation, "theory of conditioning" English translation, "theory of conjugate" English translation