咨询与建议

限定检索结果

文献类型

  • 3,133 篇 会议
  • 171 册 图书
  • 28 篇 期刊文献

馆藏范围

  • 3,331 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,241 篇 工学
    • 2,038 篇 计算机科学与技术...
    • 1,086 篇 软件工程
    • 402 篇 信息与通信工程
    • 358 篇 电气工程
    • 249 篇 生物工程
    • 169 篇 控制科学与工程
    • 157 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 73 篇 化学工程与技术
    • 68 篇 机械工程
    • 63 篇 仪器科学与技术
    • 59 篇 电子科学与技术(可...
    • 58 篇 安全科学与工程
    • 47 篇 交通运输工程
    • 38 篇 材料科学与工程(可...
    • 38 篇 动力工程及工程热...
  • 718 篇 理学
    • 378 篇 数学
    • 273 篇 生物学
    • 168 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 104 篇 系统科学
    • 70 篇 化学
  • 460 篇 管理学
    • 298 篇 图书情报与档案管...
    • 200 篇 管理科学与工程(可...
    • 96 篇 工商管理
  • 300 篇 医学
    • 273 篇 临床医学
    • 125 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 64 篇 法学
    • 57 篇 社会学
  • 32 篇 经济学
  • 31 篇 教育学
  • 28 篇 农学
  • 6 篇 艺术学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 545 篇 data mining
  • 543 篇 machine learning
  • 286 篇 pattern recognit...
  • 239 篇 deep learning
  • 188 篇 feature extracti...
  • 160 篇 support vector m...
  • 156 篇 artificial intel...
  • 120 篇 training
  • 118 篇 accuracy
  • 115 篇 machine learning...
  • 95 篇 data models
  • 91 篇 data mining and ...
  • 75 篇 classification
  • 72 篇 neural networks
  • 70 篇 convolutional ne...
  • 68 篇 predictive model...
  • 67 篇 big data
  • 64 篇 computational mo...
  • 57 篇 sentiment analys...
  • 55 篇 learning systems

机构

  • 10 篇 chinese academy ...
  • 9 篇 chitkara centre ...
  • 8 篇 zhejiang univers...
  • 7 篇 guangdong univer...
  • 7 篇 centre of resear...
  • 6 篇 central south un...
  • 6 篇 unsw sydney
  • 6 篇 college of compu...
  • 5 篇 badji mokhtar un...
  • 5 篇 xi'an university...
  • 5 篇 indian statistic...
  • 5 篇 southwest jiaoto...
  • 5 篇 kobe university ...
  • 5 篇 southern univers...
  • 4 篇 columbia univers...
  • 4 篇 chitkara univers...
  • 4 篇 shanghai jiao to...
  • 4 篇 institute of big...
  • 4 篇 centre for patte...
  • 4 篇 shandong institu...

作者

  • 12 篇 de-shuang huang
  • 12 篇 venkatesh svetha
  • 8 篇 petra perner
  • 7 篇 phung dinh
  • 7 篇 jacek m. zurada
  • 7 篇 krasotkina olga
  • 7 篇 mottl vadim
  • 6 篇 zheng-guang wu
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 hongyi li
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 lotfi a. zadeh
  • 6 篇 kang-hyun jo
  • 6 篇 leszek rutkowski
  • 6 篇 long cheng
  • 6 篇 zhongzhi shi
  • 5 篇 zhang yan
  • 5 篇 vitoantonio bevi...

语言

  • 3,198 篇 英文
  • 117 篇 其他
  • 32 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Data Mining in Pattern Recognition"
3332 条 记 录,以下是3111-3120 订阅
排序:
Detecting Distributed Denial of Service (DDoS) attacks through inductive learning
Detecting Distributed Denial of Service (DDoS) attacks throu...
收藏 引用
4th international conference on Intelligent data Engineering and Automated learning (IDEAL 2003)
作者: Noh, S Lee, C Choi, K Jung, GH Catholic Univ Korea Sch Comp Sci & Informat Engn Bucheon South Korea Ajou Univ Grad Sch Informat & Commun Suwon 441749 South Korea Ajou Univ Div Elect Engn Suwon 441749 South Korea
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. there has been a lot of related work... 详细信息
来源: 评论
Nested state-transition graph model of user behaviors
Nested state-transition graph model of user behaviors
收藏 引用
4th international conference on Intelligent data Engineering and Automated learning, IDEAL 2003
作者: Heh, Jia-Sheng Cheng, Shein-Yun Ma, Nan-Chao Department of Information and Computer Engineering Chung Yuan Christian University Chung Li Taiwan
this paper proposes a systematic data mining approach to study users’ Internet resource access actions for finding out behavior models as statetransition graphs. A series of Internet resource access actions are store... 详细信息
来源: 评论
A qualitative discriminative cohort speakers method to reduce learning data for MLP-based speaker verification systems
A qualitative discriminative cohort speakers method to reduc...
收藏 引用
4th international conference on Intelligent data Engineering and Automated learning, IDEAL 2003
作者: Lee, Tae-Seung Choi, Sung-Won Choi, Won-Hyuck Park, Hyeong-Taek Lim, Sang-Seok Hwang, Byong-Won Hankuk Aviation University School of Electronics Telecommunication and Computer Engineering Seoul Korea Republic of
Although multilayer perceptrons (MLPs) present several advantages against other pattern recognition methods, MLP-based speaker verification systems suffer from slow enrollment speed caused by many background speakers ... 详细信息
来源: 评论
An empirical comparison of in-learning and post-learning optimization schemes for tuning the support vector machines in cost-sensitive applications
An empirical comparison of in-learning and post-learning opt...
收藏 引用
international conference on Image Analysis and Processing
作者: F. Tortorella DAEIMI Università degli Studi di Cassino Italy
Support vector machines (SVM) are currently one of the classification systems most used in pattern recognition and data mining because of their accuracy and generalization capability. However, when dealing with very c... 详细信息
来源: 评论
Predicting large population data cumulative match characteristic performance from small population data
收藏 引用
4th international conference on Audio and Video-Based Biometric Person Authentication, AVBPA 2003
作者: Johnson, Amos Y. Sun, Jie Bobick, Aaron F. GVU Center/College of Computing Georgia Tech AtlantaGA30332 United States
Given a biometric feature-space, in this paper we present a method to predict cumulative match characteristic (CMC) curve performance for a large population of individuals using a significantly smaller population to m... 详细信息
来源: 评论
A real-time hand tracking and multimedia-based system for breast self-examination: the simplified 3D hand model
A real-time hand tracking and multimedia-based system for br...
收藏 引用
IEEE EMBS international conference on Information Technology Applications in Biomedicine (ITAB)
作者: Yuqin Hu R.N.G. Naguib A.G. Todman S. Amin A. Oikonomou H. Alomishy BIOCORE School of Mathematical and Information Sciences Coventry University Coventry UK Walsgrave General Hospital Coventry UK
Breast self-examination (BSE) is a non-invasive, self-administered and simple screening procedure for detecting breast cancer at an early stage. this procedure can be performed in private and at any time. A variety of... 详细信息
来源: 评论
Discriminative parameter learning of general Bayesian network classifiers
Discriminative parameter learning of general Bayesian networ...
收藏 引用
international conference on Tools for Artificial Intelligence (ICTAI)
作者: Bin Shen Xiaoyuan Su R. Greiner P. Musilek C. Cheng Computing Science University of Alberta Edmonton AB Canada Electrical & Computer Engineering University of Alberta Edmonton AB Canada
Greiner and Zhou (1988) presented ELR, a discriminative parameter-learning algorithm that maximizes conditional likelihood (CL) for a fixed Bayesian belief network (BN) structure, and demonstrated that it often produc... 详细信息
来源: 评论
Face verification competition on the XM2VTS database
收藏 引用
4th international conference on Audio and Video-Based Biometric Person Authentication, AVBPA 2003
作者: Messer, Kieron Kittler, Josef Sadeghi, Mohammad Marcel, Sebastien Marcel, Christine Bengio, Samy Cardinaux, F. Sanderson, C. Czyz, J. Vandendorpe, L. Srisuk, Sanun Petrou, Maria Kurutach, Werasak Kadyrov, Alexander Paredes, Roberto Kepenekci, B. Tek, F.B. Akar, G.B. Deravi, Farzin Mavity, Nick University of Surrey Guildford SurreyGU2 7XH United Kingdom Dalle Molle Institute for Perceptual Aritificial Intelligence CP 592 rue du Simplon 4 Martigny1920 Switzerland Universite Catholique de Louvain Batiment StevinPlace du Levant 2 Louvain-la-Neuve1348 Belgium Mahanakorn University of Technology 51 Cheum-Sampan Rd Nong Chok Bangkok10530 Thailand DSIC Universidad Politcnica de Valencia Camino de Vera s/n Valencia46022 Spain Tübitak Bilten ODTÜ Campus Ankara0653 Turkey Electronic Engineering Laboratory University of Kent CanterburyCT2 7NT United Kingdom
In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. the database used was the Xm2vts database along with... 详细信息
来源: 评论
An iterative initial-points refinement algorithm for categorical data clustering
收藏 引用
pattern recognition LETTERS 2002年 第7期23卷 875-884页
作者: Sun, Y Zhu, QM Chen, ZX Univ Nebraska Dept Comp Sci Digital Imaging & Comp Vis Lab Omaha NE 68182 USA
the original k-means clustering algorithm is designed to work primarily on numeric data sets. this prohibits the algorithm from being directly applied to categorical data clustering in many data mining applications. T... 详细信息
来源: 评论
machine learning for sequential data: A review  9th
收藏 引用
Joint IAPR 9th international Workshop on Structural and Syntactic pattern recognition, SSPR 2002 and 4th international Workshop on Statistical Techniques in pattern recognition, SPR 2002
作者: Dietterich, thomas G. Oregon State University CorvallisOR United States
Statistical learning problems in many fields involve sequential data. this paper formalizes the principal learning tasks and describes the methods that have been developed within the machine learning research communit... 详细信息
来源: 评论