咨询与建议

限定检索结果

文献类型

  • 1,578 篇 会议
  • 83 册 图书
  • 16 篇 期刊文献

馆藏范围

  • 1,677 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,039 篇 工学
    • 870 篇 计算机科学与技术...
    • 465 篇 软件工程
    • 224 篇 信息与通信工程
    • 184 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 84 篇 控制科学与工程
    • 62 篇 光学工程
    • 35 篇 机械工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 仪器科学与技术
    • 23 篇 化学工程与技术
    • 21 篇 建筑学
    • 21 篇 土木工程
    • 20 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
  • 350 篇 理学
    • 173 篇 数学
    • 114 篇 生物学
    • 88 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 21 篇 化学
  • 174 篇 管理学
    • 91 篇 图书情报与档案管...
    • 88 篇 管理科学与工程(可...
    • 44 篇 工商管理
  • 113 篇 医学
    • 91 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 33 篇 法学
    • 26 篇 社会学
  • 17 篇 教育学
  • 12 篇 经济学
  • 8 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 237 篇 pattern recognit...
  • 79 篇 cloud computing
  • 74 篇 artificial intel...
  • 71 篇 training
  • 57 篇 feature extracti...
  • 55 篇 neural networks
  • 52 篇 machine learning
  • 49 篇 deep learning
  • 40 篇 computer archite...
  • 36 篇 data mining
  • 34 篇 computer imaging...
  • 33 篇 pattern matching
  • 33 篇 computer vision
  • 32 篇 semantics
  • 29 篇 image segmentati...
  • 28 篇 computational mo...
  • 28 篇 image recognitio...
  • 28 篇 image processing...
  • 27 篇 information syst...
  • 26 篇 edge computing

机构

  • 15 篇 school of comput...
  • 12 篇 university of ch...
  • 9 篇 school of comput...
  • 8 篇 inria nancy gran...
  • 8 篇 national center ...
  • 8 篇 icube université...
  • 8 篇 fujian key labor...
  • 8 篇 erasmus mc - uni...
  • 8 篇 tencent jarvis l...
  • 8 篇 university of ba...
  • 7 篇 college of intel...
  • 6 篇 univ chinese aca...
  • 6 篇 institute of ima...
  • 6 篇 department of co...
  • 6 篇 the 54th researc...
  • 6 篇 school of artifi...
  • 6 篇 dipartimento di ...
  • 6 篇 dipartimento di ...
  • 6 篇 computational sc...
  • 6 篇 institute of com...

作者

  • 13 篇 tan chew lim
  • 12 篇 wang da-han
  • 11 篇 yang jie
  • 8 篇 stéphane cotin
  • 8 篇 yefeng zheng
  • 8 篇 chew lim tan
  • 8 篇 philippe c. catt...
  • 8 篇 marleen de bruij...
  • 8 篇 stefanie speidel
  • 8 篇 caroline essert
  • 8 篇 nicolas padoy
  • 7 篇 maier andreas
  • 7 篇 yang yang
  • 7 篇 hancock edwin r.
  • 7 篇 rita cucchiara
  • 7 篇 alberto del bimb...
  • 6 篇 hugo jair escala...
  • 6 篇 tao mei
  • 6 篇 lu shijian
  • 6 篇 marco bertini

语言

  • 1,669 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"任意字段=2021 10th International Conference on Computing and Pattern Recognition"
1677 条 记 录,以下是351-360 订阅
排序:
2021 10th IFIP international conference on Performance Evaluation and Modeling in Wireless and Wired Networks, PEMWN 2021
2021 10th IFIP International Conference on Performance Evalu...
收藏 引用
10th IFIP international conference on Performance Evaluation and Modeling in Wireless and Wired Networks, PEMWN 2021
the proceedings contain 11 papers. the topics discussed include: a new taxonomy of physical-layer network coding techniques in two way relay channel model with single antenna;an efficient convolution method to compute...
来源: 评论
PPS: A Packets pattern-based Video Identification in Encrypted Network Traffic  16
PPS: A Packets Pattern-based Video Identification in Encrypt...
收藏 引用
16th IEEE/ACM international conference on Utility and Cloud computing (UCC) / 10th IEEE/ACM international conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Bukhari, Syed M. A. H. Afaq, Muhammad Song, Wang-Cheol Jeju Natl Univ Dept Comp Engn Jeju City South Korea
Video identification in encrypted network traffic has become a trending field in the research area for user behavior and Quality of Experience (QoE) analysis. However, the traditional methods of video identification h... 详细信息
来源: 评论
Ontology of XSS Vulnerabilities and its Detection using XENOTIX Framework  10
Ontology of XSS Vulnerabilities and its Detection using XENO...
收藏 引用
10th international conference on System Modeling and Advancement in Research Trends, SMART 2021
作者: Manhas, Saloni University Institute of Computing Chandigarh University Mohali India
Web technologies are framed for the purpose of catering the need of ubiquitousness. there is no doubt that web applications are providing number of advantages to the masses, but everything comes with certain vulnerabi... 详细信息
来源: 评论
Discovering Optimal patterns for Forensic pattern Warehouse  10th
Discovering Optimal Patterns for Forensic Pattern Warehouse
收藏 引用
10th international conference on Advanced computing and Communication Technologies (ICACCT)
作者: Agarwal, Vishakha Tiwari, Akhilesh Gupta, R. K. Singh, Uday Pratap Madhav Inst Sci & Technol Dept CSE & IT Gwalior India Madhav Inst Sci & Technol Dept Appl Math Gwalior India
As the need of investigative information is increasing at an exponential rate, extraction of relevant patterns out of huge amount of forensic data becomes more complex. Forensic pattern mining is a technique that deal... 详细信息
来源: 评论
Performance Comparison Between Support Vector Regression and Long Short - Term Memory for Prediction of Stock Market  10
Performance Comparison Between Support Vector Regression and...
收藏 引用
10th international conference on Information and Communication Technology, ICoICT 2022
作者: Sarumpaet, Nova Monica Indwiarti Rohmawati, Aniq Atiqi School of Computing Telkom University Bandung Indonesia
Stock prediction is one of the exciting solutions in the world of computing. A stock prediction has a vital role in determining the pattern of stock movements over time. A successful price prediction model is profitab... 详细信息
来源: 评论
Efficient Mining of Regional Semantic patterns from Semantic Trajectories on Cloud computing  9
Efficient Mining of Regional Semantic Patterns from Semantic...
收藏 引用
9th international conference on Advanced Cloud and Big Data, CBD 2021
作者: Liu, Yushi Han, Jingjing Zhao, Bin Nanjing Normal University School of Computer and Electronic Information School of Artificial Intelligence Nanjing China Jiangsu Open University Quality Assurance Office Nanjing China
Semantic trajectory pattern mining is becoming more and more important with the efficient semantic enrichment process methods, which is the process of semantic annotation for spatiotemporal trajectories. Existing work... 详细信息
来源: 评论
Using neural and distance-based machine learning techniques in order to identify genuine and acted emotions from facial expressions  11
Using neural and distance-based machine learning techniques ...
收藏 引用
11th international conference of pattern recognition Systems, ICPRS 2021
作者: Budke, Jaine Rannow da Costa-Abreu, Márjory Federal University of Rio Grande do Norte Natal Brazil Department of Computing Sheffield Hallam University Sheffield United Kingdom
Facial expressions are part of human non-verbal communication. Automatically discriminating between genuine and acted emotion can help psychologists, judges, human-machine interface, and so on. the problems for resear... 详细信息
来源: 评论
Learning Readers' News Preferences with Support Vector Machines
Learning Readers' News Preferences with Support Vector Machi...
收藏 引用
10th international conference on Artificial Neural Networks and Genetic Algorithms
作者: Hensinger, Elena Flaounas, Ilias Cristianini, Nello Univ Bristol Intelligent Syst Lab Bristol BS8 1TH Avon England
We explore the problem of learning and predicting popularity of articles from online news media. the only available information we exploit is the textual content of the articles and the information whether they became... 详细信息
来源: 评论
Fault propagation pattern based DFA on Feistel ciphers, with application to Camellia
Fault propagation pattern based DFA on Feistel ciphers, with...
收藏 引用
10th IEEE international conference on Computer and Information Technology, CIT-2010, 7th IEEE international conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable computing and Communications, ScalCom-2010
作者: Chen, Haining Zhou, Yongbin Wu, Wenling Wang, Na State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences P. O. Box 8718 Beijing China
this paper presents a systematic Differential Fault Analysis (DFA) method on Feistel ciphers, the outcome of which closely links to that of the theoretical cryptanalysis with provable security. For this purpose, we in... 详细信息
来源: 评论
Proceedings of PDSW 2015: 10th Parallel Data Storage Workshop - Held in conjunction with SC 2015: the international conference for High Performance computing, Networking, Storage and Analysis
Proceedings of PDSW 2015: 10th Parallel Data Storage Worksho...
收藏 引用
10th Parallel Data Storage Workshop, PDSW 2015
the proceedings contain 9 papers. the topics discussed include: DeltaFS: exascale file systems scale better without dedicated servers;taming the cloud object storage with MOS;experiences in using OS-level virtualizati...
来源: 评论