咨询与建议

限定检索结果

文献类型

  • 1,578 篇 会议
  • 83 册 图书
  • 16 篇 期刊文献

馆藏范围

  • 1,677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,039 篇 工学
    • 870 篇 计算机科学与技术...
    • 465 篇 软件工程
    • 224 篇 信息与通信工程
    • 184 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 84 篇 控制科学与工程
    • 62 篇 光学工程
    • 35 篇 机械工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 仪器科学与技术
    • 23 篇 化学工程与技术
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 20 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
  • 350 篇 理学
    • 173 篇 数学
    • 114 篇 生物学
    • 88 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 21 篇 化学
  • 174 篇 管理学
    • 91 篇 图书情报与档案管...
    • 88 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 113 篇 医学
    • 91 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 33 篇 法学
    • 26 篇 社会学
  • 17 篇 教育学
  • 12 篇 经济学
  • 8 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 237 篇 pattern recognit...
  • 79 篇 cloud computing
  • 74 篇 artificial intel...
  • 71 篇 training
  • 57 篇 feature extracti...
  • 55 篇 neural networks
  • 52 篇 machine learning
  • 49 篇 deep learning
  • 40 篇 computer archite...
  • 36 篇 data mining
  • 34 篇 computer imaging...
  • 33 篇 pattern matching
  • 33 篇 computer vision
  • 32 篇 semantics
  • 29 篇 image segmentati...
  • 28 篇 computational mo...
  • 28 篇 image recognitio...
  • 28 篇 image processing...
  • 27 篇 information syst...
  • 26 篇 edge computing

机构

  • 15 篇 school of comput...
  • 12 篇 university of ch...
  • 9 篇 school of comput...
  • 8 篇 inria nancy gran...
  • 8 篇 national center ...
  • 8 篇 icube université...
  • 8 篇 fujian key labor...
  • 8 篇 erasmus mc - uni...
  • 8 篇 tencent jarvis l...
  • 8 篇 university of ba...
  • 7 篇 college of intel...
  • 6 篇 univ chinese aca...
  • 6 篇 institute of ima...
  • 6 篇 department of co...
  • 6 篇 the 54th researc...
  • 6 篇 school of artifi...
  • 6 篇 dipartimento di ...
  • 6 篇 dipartimento di ...
  • 6 篇 computational sc...
  • 6 篇 institute of com...

作者

  • 13 篇 tan chew lim
  • 12 篇 wang da-han
  • 11 篇 yang jie
  • 8 篇 stéphane cotin
  • 8 篇 yefeng zheng
  • 8 篇 chew lim tan
  • 8 篇 philippe c. catt...
  • 8 篇 marleen de bruij...
  • 8 篇 stefanie speidel
  • 8 篇 caroline essert
  • 8 篇 nicolas padoy
  • 7 篇 maier andreas
  • 7 篇 yang yang
  • 7 篇 hancock edwin r.
  • 7 篇 rita cucchiara
  • 7 篇 alberto del bimb...
  • 6 篇 hugo jair escala...
  • 6 篇 tao mei
  • 6 篇 lu shijian
  • 6 篇 marco bertini

语言

  • 1,669 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"任意字段=2021 10th International Conference on Computing and Pattern Recognition"
1677 条 记 录,以下是331-340 订阅
排序:
Comparing Evolutionary Optimization Algorithms for the Fog Service Placement Problem  16
Comparing Evolutionary Optimization Algorithms for the Fog S...
收藏 引用
16th IEEE/ACM international conference on Utility and Cloud computing (UCC) / 10th IEEE/ACM international conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Vivo, Sergi Lera, Isaac Guerrero, Carlos Univ Balearic Isl Palma De Mallorca Mallorca Spain
In this work, we compare the performance of six popular evolutionary algorithms to address the problem of allocating applications to devices in a fog infrastructure. the optimization of application placement is carrie... 详细信息
来源: 评论
A Proposed model for field workers Injuries' prevention based on machine learning  10
A Proposed model for field workers Injuries' prevention base...
收藏 引用
10th IEEE international conference on Intelligent computing and Information Systems, ICICIS 2021
作者: Abbas Sabet, Mohamed Farouk Dahroug, Ahmed Hegazy, Abdel Fattah Technology and Maritime Transport College of Computing and Information Technology Arab Academy for Science Cairo Egypt
the prosperity of the construction industry in Egypt at the expense of occupational safety and health of the worker there are several factors [1]. for the occurrence of these accidents, such as. Construction projects ... 详细信息
来源: 评论
10th international conference on theory and Practice of Natural computing, TPNC 2021
10th International Conference on Theory and Practice of Natu...
收藏 引用
10th international conference on theory and Practice of Natural computing, TPNC 2021
the proceedings contain 9 papers. the special focus in this conference is on theory and Practice of Natural computing. the topics include: Dynamic Heuristic Set Selection for Cross-Domain Selection Hyper-heuristics;on...
来源: 评论
Two-Dimensional ISAR Imaging with pattern-Coupled Sparse Structure Based on 2D-RFISTA  10
Two-Dimensional ISAR Imaging with Pattern-Coupled Sparse Str...
收藏 引用
10th international conference on Control, Automation and Information Sciences, ICCAIS 2021
作者: Wei, Xu Yang, Jun Lv, Mingjiu Chen, Wenfeng Ma, Xiaoyan Xia, Saiqiang Early Warning Academy No. One Department Wuhan China Radar Nco School Early Warning Academy Wuhan China
In order to improve the imaging quality of two-dimensional inverse synthetic aperture radar (ISAR) under the conditions of low signal-to-noise ratio (SNR) and sparsity rate (SR), in view of pattern-coupled sparse stru... 详细信息
来源: 评论
Research on modeling for the pattern library of interconnect parasitic capacitances in VLSI
Research on modeling for the pattern library of interconnect...
收藏 引用
2010 10th IEEE international conference on Solid-State and Integrated Circuit Technology
作者: Qu, Hui Xu, Xiaoyu Ren, Zhuoxiang Institute of Electrical Engineering Chinese Academy of Sciences Beijing 100190 China L2E UPMC University of Paris 6 4 place Jussieu F-75252 Paris France
At the present IC technologies, the accurately extraction of the interconnects parasitic parameters become more important. But for the time consuming, that computing the parameters of interconnects with field solver d... 详细信息
来源: 评论
DRFM Jamming Mode Identification Leveraging Deep Neural Networks  10
DRFM Jamming Mode Identification Leveraging Deep Neural Netw...
收藏 引用
10th international conference on Control, Automation and Information Sciences, ICCAIS 2021
作者: Gao, Jiannan Wang, Min Chen, Longbiao Hui, Bingwei Wang, Cheng Fan, Hongqi Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen China National University of Defense Technology National Key Laboratory of Science and Technology on Automatic Target Recognition Changsha China
In modern information warfare, radar must apply some anti-jamming technologies. Digital radio frequency memory (DRFM) and its technology can adapt to the complex threat signal environment and have an excellent jamming... 详细信息
来源: 评论
Conceptual framework supporting pattern design selection for scientificworkflow applications in cloud computing  10
Conceptual framework supporting pattern design selection for...
收藏 引用
10th international conference on Cloud computing and Services Science, CLOSER 2020
作者: Alkhanak, Ehab Nabiel Khan, Saif Ur Rehman Verbraeck, Alexander Van Lint, Hans Delft Netherlands Islamabad Pakistan Delft Netherlands
Scientific Workflow Applications (SWFA) play a vital role for both service consumers and service providers in designing and implementing large and complex scientific processes. Previously, researchers used parallel an... 详细信息
来源: 评论
10th international conference on Innovations in Bio-Inspired computing and Applications, IBICA 2019 and 9th World Congress on Information and Communication Technologies, WICT 2019
10th International Conference on Innovations in Bio-Inspired...
收藏 引用
10th international conference on Innovations in Bio-Inspired computing and Applications, IBICA 2019 and 9th World Congress on Information and Communication Technologies, WICT 2019
the proceedings contain 38 papers. the special focus in this conference is on Innovations in Bio-Inspired computing and Applications. the topics include: Soft computing approach on minimisation of indirect losses in p...
来源: 评论
Monitoring Insiders Activities in Cloud computing Using Rule Based Learning
Monitoring Insiders Activities in Cloud Computing Using Rule...
收藏 引用
Int Joint conference of 10th IEEE Int Conf on Trust, Security and Privacy in computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Khorshed, Md Tanzim Ali, A. B. M. Shawkat Wasimi, Saleh A. CQUniv Sch Informat & Commun Technol Rockhampton Qld 4702 Australia
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may m... 详细信息
来源: 评论
Benchmarking Annotation Procedures for Multi-channel Time Series HAR Dataset
Benchmarking Annotation Procedures for Multi-channel Time Se...
收藏 引用
19th IEEE international conference on Pervasive computing and Communications (IEEE PerCom)
作者: Avsar, Hulya Altermann, Erik Reining, Christopher Rueda, Fernando Moya Fink, Gernot A. ten Hompel, Michael TU Dortmund Univ Chair Mat Handling & Warehousing Joseph von Fraunhofer Str 2-4 D-44227 Dortmund Germany TU Dortmund Univ Pattern Recognit Embedded Syst Grp Joseph von Fraunhofer Str 2-4 D-44227 Dortmund Germany
this contribution evaluates semi-automated annotation for generating high-quality data for multi-channel time series Human Activity recognition. For this purpose, time series data that consists of Optical Motion Captu... 详细信息
来源: 评论