咨询与建议

限定检索结果

文献类型

  • 180 篇 会议
  • 73 册 图书

馆藏范围

  • 250 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 理学
    • 117 篇 数学
    • 19 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 112 篇 医学
    • 85 篇 特种医学
    • 54 篇 临床医学
    • 44 篇 医学技术(可授医学...
  • 58 篇 工学
    • 52 篇 计算机科学与技术...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 建筑学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...

主题

  • 35 篇 visualization
  • 22 篇 diffusion mri
  • 15 篇 image processing...
  • 14 篇 computer graphic...
  • 12 篇 magnetic resonan...
  • 11 篇 topology
  • 10 篇 tractography
  • 10 篇 diffusion
  • 9 篇 geometry
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 6 篇 computational ma...
  • 6 篇 computational sc...
  • 6 篇 computer imaging...
  • 5 篇 mathematical and...
  • 5 篇 eye tracking
  • 5 篇 tensors
  • 5 篇 eye movements
  • 4 篇 simulation and m...
  • 4 篇 pattern recognit...

机构

  • 5 篇 university of ka...
  • 4 篇 univ pavia dept ...
  • 4 篇 univ cote dazur ...
  • 4 篇 northwestern pol...
  • 4 篇 univ n carolina ...
  • 4 篇 university colle...
  • 4 篇 univ n carolina ...
  • 3 篇 ucl ctr med imag...
  • 3 篇 linköping univer...
  • 3 篇 lawrence livermo...
  • 3 篇 zuse institute b...
  • 3 篇 university of ca...
  • 3 篇 univ verona comp...
  • 3 篇 inria sophia ant...
  • 3 篇 univ n carolina ...
  • 3 篇 wright state uni...
  • 3 篇 the university o...
  • 3 篇 univ n carolina ...
  • 3 篇 ecole polytech f...
  • 3 篇 therapanacea

作者

  • 10 篇 deriche rachid
  • 8 篇 yap pew-thian
  • 8 篇 hans hagen
  • 7 篇 hans-christian h...
  • 7 篇 shen dinggang
  • 6 篇 wassermann demia...
  • 6 篇 enrico kaden
  • 6 篇 chen geng
  • 6 篇 bernd hamann
  • 5 篇 jones derek k.
  • 5 篇 hamish carr
  • 5 篇 thompson paul m.
  • 5 篇 fick rutger
  • 5 篇 marco reisert
  • 5 篇 pizzolato marco
  • 5 篇 pascucci valerio
  • 5 篇 yogesh rathi
  • 4 篇 julien tierny
  • 4 篇 thiran jean-phil...
  • 4 篇 nir talia m.

语言

  • 244 篇 英文
  • 9 篇 中文
检索条件"丛书名=Mathematics and Visualization"
253 条 记 录,以下是171-180 订阅
排序:
Computing Center-Lines: An Application of Vector Field Topology  2nd
Computing Center-Lines: An Application of Vector Field Topol...
收藏 引用
2nd Workshop on Topology-Based Methods in visualization
作者: Wischgoll, Thomas Wright State Univ Dayton OH 45435 USA
Curve-skeletons of 3-D objects are medial axes shrunk to a single line. There are several applications for curve-skeletons. For example, animation of 3-D objects, such as an animal or a human, as well as planning of f... 详细信息
来源: 评论
Flow Structure based 3D Streamline Placement  2nd
Flow Structure based 3D Streamline Placement
收藏 引用
2nd Workshop on Topology-Based Methods in visualization
作者: Salzbrunn, Tobias Scheuermann, Gerik Univ Leipzig Leipzig Germany
Visualizing vector fields using streamlines or some derived applications is still one of the most popular flow visualization methods in use today. Besides the known trade-off between sufficient coverage in the field a... 详细信息
来源: 评论
Visualizing global manifolds during the transition to chaos in the Lorenz system  2nd
Visualizing global manifolds during the transition to chaos ...
收藏 引用
2nd Workshop on Topology-Based Methods in visualization
作者: Krauskopf, Bernd Osinga, Hinke M. Doedel, Eusebius J. Univ Bristol Dept Engn Math Bristol Ctr Appl Nonlinear Math Bristol BS8 1TR Avon England Concordia Univ Dept Comp Sci Montreal PQ H3G 1M8 Canada
If one wants to study the global dynamics of a, given system, key components are the stable or unstable manifolds of invariant sets, such as equilibria and periodic orbits. Even in the simplest examples, these global ... 详细信息
来源: 评论
visualization and Processing of Tensor Fields (mathematics and visualization)  1
收藏 引用
丛书名: mathematics and visualization
2005年
作者: Joachim Weickert Hans Hagen
来源: 评论
VizSEC 2007  2008
收藏 引用
丛书名: mathematics and visualization
2008年
作者: John R. Goodall Gregory Conti Kwan-Liu Ma
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies,...
来源: 评论
Scientific visualization: The Visual Extraction of Knowledge from Data (mathematics and visualization)  1
收藏 引用
丛书名: mathematics and visualization
2005年
作者: Georges-Pierre Bonneau Thomas Ertl Gregory M. Nielson
来源: 评论
High level internet scale traffic visualization using Hilbert curve mapping  1
收藏 引用
4th International Workshop on Computer Security
作者: Irwin, B. Pilkington, N. Rhodes Univ Dept Comp Sci ZA-6140 Grahamstown South Africa
A high level analysis too] was developed for aiding in the analysis of large volumes of network telescope traffic, and in particular the comparisons of data collected from multiple telescope sources. Providing a visua... 详细信息
来源: 评论
Adapting personas for use in security visualization design  1
收藏 引用
4th International Workshop on Computer Security
作者: Stoll, J. McColgin, D. Gregory, M. Crow, V. Edwards, W. K. Georgia Inst Technol Sch Interact Comp Atlanta GA 30332 USA Pacific Northwest Natl Lab Richland WA USA
The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and develop... 详细信息
来源: 评论
visualization of host behavior for network security  1
收藏 引用
4th International Workshop on Computer Security
作者: Mansman, F. Meier, L. Keim, D. A. Univ Konstanz D-7750 Constance Germany
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet constantly threatens the network infras... 详细信息
来源: 评论
Introduction to visualization for computer security  1
收藏 引用
4th International Workshop on Computer Security
作者: Goodall, J. R. Secure Decis Div Appl Vis Inc Northport NY 11768 USA
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This a... 详细信息
来源: 评论