咨询与建议

限定检索结果

文献类型

  • 1,578 篇 会议
  • 83 册 图书
  • 16 篇 期刊文献

馆藏范围

  • 1,677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,039 篇 工学
    • 870 篇 计算机科学与技术...
    • 465 篇 软件工程
    • 224 篇 信息与通信工程
    • 184 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 84 篇 控制科学与工程
    • 62 篇 光学工程
    • 35 篇 机械工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 仪器科学与技术
    • 23 篇 化学工程与技术
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 20 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
  • 350 篇 理学
    • 173 篇 数学
    • 114 篇 生物学
    • 88 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 21 篇 化学
  • 174 篇 管理学
    • 91 篇 图书情报与档案管...
    • 88 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 113 篇 医学
    • 91 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 33 篇 法学
    • 26 篇 社会学
  • 17 篇 教育学
  • 12 篇 经济学
  • 8 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 237 篇 pattern recognit...
  • 79 篇 cloud computing
  • 74 篇 artificial intel...
  • 71 篇 training
  • 57 篇 feature extracti...
  • 55 篇 neural networks
  • 52 篇 machine learning
  • 49 篇 deep learning
  • 40 篇 computer archite...
  • 36 篇 data mining
  • 34 篇 computer imaging...
  • 33 篇 pattern matching
  • 33 篇 computer vision
  • 32 篇 semantics
  • 29 篇 image segmentati...
  • 28 篇 computational mo...
  • 28 篇 image recognitio...
  • 28 篇 image processing...
  • 27 篇 information syst...
  • 26 篇 edge computing

机构

  • 15 篇 school of comput...
  • 12 篇 university of ch...
  • 9 篇 school of comput...
  • 8 篇 inria nancy gran...
  • 8 篇 national center ...
  • 8 篇 icube université...
  • 8 篇 fujian key labor...
  • 8 篇 erasmus mc - uni...
  • 8 篇 tencent jarvis l...
  • 8 篇 university of ba...
  • 7 篇 college of intel...
  • 6 篇 univ chinese aca...
  • 6 篇 institute of ima...
  • 6 篇 department of co...
  • 6 篇 the 54th researc...
  • 6 篇 school of artifi...
  • 6 篇 dipartimento di ...
  • 6 篇 dipartimento di ...
  • 6 篇 computational sc...
  • 6 篇 institute of com...

作者

  • 13 篇 tan chew lim
  • 12 篇 wang da-han
  • 11 篇 yang jie
  • 8 篇 stéphane cotin
  • 8 篇 yefeng zheng
  • 8 篇 chew lim tan
  • 8 篇 philippe c. catt...
  • 8 篇 marleen de bruij...
  • 8 篇 stefanie speidel
  • 8 篇 caroline essert
  • 8 篇 nicolas padoy
  • 7 篇 maier andreas
  • 7 篇 yang yang
  • 7 篇 hancock edwin r.
  • 7 篇 rita cucchiara
  • 7 篇 alberto del bimb...
  • 6 篇 hugo jair escala...
  • 6 篇 tao mei
  • 6 篇 lu shijian
  • 6 篇 marco bertini

语言

  • 1,669 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"任意字段=2021 10th International Conference on Computing and Pattern Recognition"
1677 条 记 录,以下是1341-1350 订阅
排序:
Design pattern for Self-Organization Multi-agent Systems Based on Policy
Design Pattern for Self-Organization Multi-agent Systems Bas...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yi Guo Xinjun Mao Cuiyun Hu School of Computer National University of Defense Technology Changsha Hunan China
Self-organization is an important characteristic for multi-agent systems. However developing self-organization multi-agent systems in a repeated and effective way is still a great challenge. It is well known that desi... 详细信息
来源: 评论
Automatically answering repeated questions based on semantic question patterns
Automatically answering repeated questions based on semantic...
收藏 引用
IEEE international conference on Cognitive Informatics
作者: Tianyong Hao Liu Wenyin Department of Chinese Translation and Linguistics City University of Hong Kong Hong Kong China Department of Computer Science City University of Hong Kong Hong Kong China
An automatic method for answering repeated questions based on semantic question patterns is proposed in this paper. the semantic question pattern used is a generalized representation of a group of questions with both ... 详细信息
来源: 评论
Monitoring Insiders Activities in Cloud computing Using Rule Based Learning
Monitoring Insiders Activities in Cloud Computing Using Rule...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Md Tanzim Khorshed A. B. M. Shawkat Ali Saleh A. Wasimi School of Information and Communication Technology CQ University QLD Australia
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may m... 详细信息
来源: 评论
Decreasing SoC Test Power Dissipation and Test Data Volume Based on pattern Recombination
Decreasing SoC Test Power Dissipation and Test Data Volume B...
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chunlei Mei Maoxiang Yi Zhifei Shen School of Electronic Science & Applied Physics Hefei University of Technology Hefei China
Ever-growing test data volume and test power dissipation poses significant cost and security challenges in testing core-based system-on-chip (SoC). In this paper, a test pattern recombination technique is proposed to ... 详细信息
来源: 评论
Estimating probability of failure of a complex system based on partial information about subsystems and components, with potential applications to aircraft maintenance
Estimating probability of failure of a complex system based ...
收藏 引用
international Workshop on Soft computing Applications and Knowledge Discovery 2011, SCAKD 2011 - In Conjunction with the 4th international conference on pattern recognition and Machine Intelligence, PReMI 2011
作者: Jacob, Christelle Dubois, Didier Cardoso, Janette Ceberio, Martine Kreinovich, Vladik DMIA Department Campus Supaéro 10 avenue Édouard Belin Toulouse France ADRIA Department 118 Route de Narbonne 31062 Toulouse Cedex 9 France University of Texas at El Paso Computer Science Dept. El Paso TX 79968 United States
In many real-life applications (e.g., in aircraft maintenance), we need to estimate the probability of failure of a complex system (such as an aircraft as a whole or one of its subsystems). Complex systems are usually... 详细信息
来源: 评论
Clustering Structured Data with the SPARE Library
Clustering Structured Data with the SPARE Library
收藏 引用
2011 4th IEEE international conference on Computer Science and Information Technology(ICCSIT 2011)
作者: Guido Del Vescovo Lorenzo Livi Antonello Rizzi Fabio Massimo Frattale Mascioli Department of Information Engineering Electronics and Telecommunications SAPIENZA University of Rome Via Eudossiana 1800184 RomeItaly
In this paper we propose the SPARE C++ Library as a flexible tool for solving data driven modelling problems,where the domain space is not necessary constrained to be the set of real valued *** possibility to face Pat... 详细信息
来源: 评论
Geomagnetic precursor Z component diurnal variation phase anomaly recognition based on the pattern distance
Geomagnetic precursor Z component diurnal variation phase an...
收藏 引用
10th IEEE international conference on Computer and Information Technology, CIT-2010, 7th IEEE international conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Wu, Shaochun Yuan, Tongyu Tang, Yan Zhang, Bofeng Wei, Daming School of Computer Engineering and Science Shanghai University Shanghai China
Geomagnetic precursor is one of many earthquake precursors, which have better effects on earthquake prediction, while the diurnal variation anomaly of geomagnetic precursor Z component is an important one in short-imp... 详细信息
来源: 评论
Clustering of Data and Nearest Neighbors Search for pattern recognition with Dimensionality Reduction Using Random Projections
收藏 引用
10th international conference on Artificial Intelligence and Soft computing (ICAISC 2010)
作者: Skubalska-Rafajlowicz, Ewa Wroclaw Univ Technol Inst Comp Engn Control & Robot PL-50370 Wroclaw Poland
the dimensionality and the amount of data that need to be processed when intensive data streams are classified may occur prohibitively large. the aim of this paper is to analyze Johnson-Linden-strauss type random proj... 详细信息
来源: 评论
pattern recognition comparative analysis applied to fingerprint indoor mobile sensors localization
Pattern recognition comparative analysis applied to fingerpr...
收藏 引用
10th IEEE international conference on Computer and Information Technology, CIT-2010, 7th IEEE international conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Aviles, Jose Vicente Marti Prades, Raul Marin Dpto Ingenieria y Ciencia de los Computadores Universitat Jaume I Castellon Spain Intelligent Robotics Laboratory Universitat Jaume I Castellon Spain
Location Fingerprinting methods are an alternative to accurate localization of mobile sensors and actuators in indoor environments, which learn a radio map for a given scenario and use this information for recognizing... 详细信息
来源: 评论
pattern recognition with Linearly Structured Labels Using Recursive Kernel Estimator
收藏 引用
10th international conference on Artificial Intelligence and Soft computing (ICAISC 2010)
作者: Krzyzak, Adam Rafajlowicz, Ewaryst Concordia Univ Dept Comp Sci & Software Engn Montreal PQ Canada Wroclaw Univ Technol Inst Comp Engn Control Robotics Wroclaw Poland
We consider pattern recognition problem when classes and their labels are linearly structured (or ordered). We propose the loss function based on the squared differences between the true and the predicted class labels... 详细信息
来源: 评论