咨询与建议

限定检索结果

文献类型

  • 1,578 篇 会议
  • 83 册 图书
  • 16 篇 期刊文献

馆藏范围

  • 1,677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,039 篇 工学
    • 870 篇 计算机科学与技术...
    • 465 篇 软件工程
    • 224 篇 信息与通信工程
    • 184 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 84 篇 控制科学与工程
    • 62 篇 光学工程
    • 35 篇 机械工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 仪器科学与技术
    • 23 篇 化学工程与技术
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 20 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
  • 350 篇 理学
    • 173 篇 数学
    • 114 篇 生物学
    • 88 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 21 篇 化学
  • 174 篇 管理学
    • 91 篇 图书情报与档案管...
    • 88 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 113 篇 医学
    • 91 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 33 篇 法学
    • 26 篇 社会学
  • 17 篇 教育学
  • 12 篇 经济学
  • 8 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 237 篇 pattern recognit...
  • 79 篇 cloud computing
  • 74 篇 artificial intel...
  • 71 篇 training
  • 57 篇 feature extracti...
  • 55 篇 neural networks
  • 52 篇 machine learning
  • 49 篇 deep learning
  • 40 篇 computer archite...
  • 36 篇 data mining
  • 34 篇 computer imaging...
  • 33 篇 pattern matching
  • 33 篇 computer vision
  • 32 篇 semantics
  • 29 篇 image segmentati...
  • 28 篇 computational mo...
  • 28 篇 image recognitio...
  • 28 篇 image processing...
  • 27 篇 information syst...
  • 26 篇 edge computing

机构

  • 15 篇 school of comput...
  • 12 篇 university of ch...
  • 9 篇 school of comput...
  • 8 篇 inria nancy gran...
  • 8 篇 national center ...
  • 8 篇 icube université...
  • 8 篇 fujian key labor...
  • 8 篇 erasmus mc - uni...
  • 8 篇 tencent jarvis l...
  • 8 篇 university of ba...
  • 7 篇 college of intel...
  • 6 篇 univ chinese aca...
  • 6 篇 institute of ima...
  • 6 篇 department of co...
  • 6 篇 the 54th researc...
  • 6 篇 school of artifi...
  • 6 篇 dipartimento di ...
  • 6 篇 dipartimento di ...
  • 6 篇 computational sc...
  • 6 篇 institute of com...

作者

  • 13 篇 tan chew lim
  • 12 篇 wang da-han
  • 11 篇 yang jie
  • 8 篇 stéphane cotin
  • 8 篇 yefeng zheng
  • 8 篇 chew lim tan
  • 8 篇 philippe c. catt...
  • 8 篇 marleen de bruij...
  • 8 篇 stefanie speidel
  • 8 篇 caroline essert
  • 8 篇 nicolas padoy
  • 7 篇 maier andreas
  • 7 篇 yang yang
  • 7 篇 hancock edwin r.
  • 7 篇 rita cucchiara
  • 7 篇 alberto del bimb...
  • 6 篇 hugo jair escala...
  • 6 篇 tao mei
  • 6 篇 lu shijian
  • 6 篇 marco bertini

语言

  • 1,669 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"任意字段=2021 10th International Conference on Computing and Pattern Recognition"
1677 条 记 录,以下是1281-1290 订阅
排序:
Highly sparse reductions to kernel spectral clustering
Highly sparse reductions to kernel spectral clustering
收藏 引用
5th international conference on pattern recognition and Machine Intelligence, PReMI 2013
作者: Mall, Raghvendra Langone, Rocco Suykens, Johan A. K. Department of Electrical Engineering ESAT-SCD Katholieke Universiteit Leuven Kasteelpark Arenberg 10 B-3001 Leuven Belgium
Kernel spectral clustering is a model-based spectral clustering method formulated in a primal-dual framework. It has a powerful out-of-sample extension property and a model selection procedure based on the balanced li... 详细信息
来源: 评论
Human Activity recognition Based On Silhouette Analysis Using Local Binary patterns
Human Activity Recognition Based On Silhouette Analysis Usin...
收藏 引用
international conference on Fuzzy Systems and Knowledge Discovery
作者: Han Su Jiayun Zou Wenjie Wang Key Lab of Virtual Reality and Visual Computing of Sichuan Sichuan Normal University Chengdu China 610066|c|
In this paper, we present a novel method for activity analysis in outdoor environment. Difficulties, such as low resolution, shadows, long distances, and segmentation problems, usually exist in outdoor environment. To... 详细信息
来源: 评论
User Travelling pattern Prediction via Indistinct Cellular Data Mining
User Travelling Pattern Prediction via Indistinct Cellular D...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Jingwei Wang Neil Y. Yen Bin Guo Runhe Huang Jianhua Ma Tao Ban Hong Zhao Graduate School of Computer and Information Sciences Hosei University Japan School of Computer Science and Engineering The University of Aizu Japan School of Computer Science Northwestern Polytechnical University China Faculty of Computer & Information Sciences Hosei University Japan Network Security Research Institute NICT Japan School of Software Engineering Beijing Jiaotong University China
Smart devices, i.e., smartphone, have come into our daily lives, which become obviously inseparable. Although a variety of functions (e.g., gaming, networking, etc.) are provided, making calls remain the major task. T... 详细信息
来源: 评论
A unimodal fusion framework utilizing multiple enrolment images
A unimodal fusion framework utilizing multiple enrolment ima...
收藏 引用
international Bhurban conference on Applied Sciences & Technology, IBCAST
作者: Asim Baig Fatih Kurugollu Ahmed Bouridane Institute of Electronics Communications and Information Technology (ECIT) Queen's University of Belfast UK School of Computing Engineering and Information Sciences Northumbria University Newcastle Upon Tyne UK
One of the main purposes of using multiple enrolment images in a biometric recognition system is that if the input image is noisy and/or distorted in some way or is deformed during capturing stage, the recognition sys... 详细信息
来源: 评论
Understand Group Travel Behaviors in an Urban Area Using Mobility pattern Mining
Understand Group Travel Behaviors in an Urban Area Using Mob...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Bowen Du Yang Yang Weifeng Lv State Key Laboratory of Software Development Environment Beihang University Beijing China
With the development of cities, especially in developing countries, public transport is a major choice for millions city dwellers, which can ease the traffic pressure, such as crowdedness. However, for cities, in part... 详细信息
来源: 评论
Detecting Flood Attacks through New Density-pattern Based Approach
Detecting Flood Attacks through New Density-Pattern Based Ap...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Jinson Zhang Mao Lin Huang Faculty of Engineering & IT University of Technology Sydney Sydney Australia Faculty of Engineering & IT University of Technology Sydney Sydney Australia
Flood attacks are common threats to Internet, which has necessitated the need for visual analysis within an intrusion detection system to identify these attacks patterns. the challenges are how to increase the accurac... 详细信息
来源: 评论
An ontology design pattern for cartographic map scaling
An ontology design pattern for cartographic map scaling
收藏 引用
10th international conference on the Semantic Web: Semantics and Big Data, ESWC 2013
作者: Carral, David Scheider, Simon Janowicz, Krzysztof Vardeman, Charles Krisnadhi, Adila A. Hitzler, Pascal Kno.e.sis Center Wright State University United States Institute for Geoinformatics University of Münster Münster Germany Department of Geography University of California Santa Barbara CA United States Center for Research Computing University of Notre Dame Notre Dame IN United States
the concepts of scale is at the core of cartographic abstraction and mapping. It defines which geographic phenomena should be displayed, which type of geometry and map symbol to use, which measures can be taken, as we... 详细信息
来源: 评论
pattern Regulator for Wireless Body Sensor Networks
Pattern Regulator for Wireless Body Sensor Networks
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Lan Yao Fuxiang Gao Ge Yu Northeastern University Shenyang China
In a wireless body area sensor network (WBAN), biosensors are implanted or worn on an individual to acquire medical data for a clinical diagnosis or physical monitoring. Traditionally, authentication and cryptography ... 详细信息
来源: 评论
Swarm Communication - A Messaging pattern Proposal for Dynamic Scalability in Cloud
Swarm Communication - A Messaging Pattern Proposal for Dynam...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Lenuta Alboaie Sinica Alboaie Andrei Panu Faculty of Computer Science Alexandru Ioan Cuza University Iasi Romania S.C. Axiologic SaaS S.R.L. Iasi Romania
Programming for cloud systems looks deceptively similar with programming web and enterprise applications except that it is harder. the challenges that a few years ago were reserved only for distributed systems special... 详细信息
来源: 评论
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection
Design of Cloud-Based Parallel Exclusive Signature Matching ...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Yuxin Meng Wenjuan Li Lam-For Kwok Department of Computer Science City University of Hong Kong Hong Kong SAR China
Signature-based intrusion detection systems have been widely deployed in current network environments to defend against various attacks, but the expensive process of signature matching is a major suffering problem for... 详细信息
来源: 评论