咨询与建议

限定检索结果

文献类型

  • 1,721 篇 会议
  • 45 册 图书
  • 12 篇 期刊文献

馆藏范围

  • 1,777 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,224 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 629 篇 软件工程
    • 253 篇 信息与通信工程
    • 200 篇 电气工程
    • 177 篇 生物工程
    • 99 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 41 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 30 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 27 篇 材料科学与工程(可...
  • 456 篇 理学
    • 199 篇 数学
    • 197 篇 生物学
    • 144 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 46 篇 化学
  • 233 篇 管理学
    • 167 篇 图书情报与档案管...
    • 86 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 182 篇 医学
    • 160 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
    • 32 篇 公共卫生与预防医...
  • 34 篇 法学
    • 30 篇 社会学
  • 17 篇 经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 237 篇 machine learning
  • 182 篇 deep learning
  • 137 篇 pattern recognit...
  • 107 篇 feature extracti...
  • 89 篇 support vector m...
  • 88 篇 data mining
  • 74 篇 accuracy
  • 72 篇 training
  • 57 篇 convolutional ne...
  • 50 篇 machine learning...
  • 46 篇 artificial intel...
  • 45 篇 data models
  • 40 篇 neural networks
  • 39 篇 face recognition
  • 38 篇 computational mo...
  • 36 篇 learning systems
  • 36 篇 adversarial mach...
  • 33 篇 predictive model...
  • 32 篇 classification
  • 32 篇 image recognitio...

机构

  • 6 篇 college of compu...
  • 5 篇 xi'an university...
  • 4 篇 badji mokhtar un...
  • 4 篇 shanghai jiao to...
  • 4 篇 institute of big...
  • 4 篇 chitkara centre ...
  • 4 篇 chitkara univers...
  • 4 篇 library shanghai...
  • 3 篇 school of comput...
  • 3 篇 univ chittagong ...
  • 3 篇 chongqing univer...
  • 3 篇 centre of resear...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of design...
  • 3 篇 korea univ dept ...
  • 3 篇 school of automa...
  • 3 篇 university of mi...
  • 3 篇 shenyang jianzhu...
  • 3 篇 xi'an university...

作者

  • 5 篇 venkatesh svetha
  • 4 篇 ashwini kodipall...
  • 4 篇 zhang yan
  • 4 篇 srinivasa gowri
  • 4 篇 kamel mohamed s.
  • 4 篇 lall brejesh
  • 4 篇 trupthi rao
  • 3 篇 andersson karl
  • 3 篇 peng yang
  • 3 篇 malerba donato
  • 3 篇 karl andersson
  • 3 篇 chaudhury santan...
  • 3 篇 de-shuang huang
  • 3 篇 sekhar c. chandr...
  • 3 篇 wang shuo
  • 3 篇 kamata sei-ichir...
  • 3 篇 mohammad shahada...
  • 3 篇 azizi nabiha
  • 3 篇 phung dinh
  • 3 篇 krasotkina olga

语言

  • 1,695 篇 英文
  • 74 篇 其他
  • 22 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Data Minining in Pattern Recognition"
1778 条 记 录,以下是1591-1600 订阅
排序:
Sub-pattern non-negative matrix factorization based on random subspace for face recognition
Sub-pattern non-negative matrix factorization based on rando...
收藏 引用
5th international conference on Wavelet Analysis and pattern recognition
作者: Zhu, Yu-Lian Nanjing Univ Aeronaut & Astronaut Dept Comp Sci & Engn Nanjing 210016 Peoples R China
Non-negative matrix factorization (NMF) as a part-based representation method allows only additive combinations of non-negative basis components to represent the original data, so it provides a realistic approximation... 详细信息
来源: 评论
Outlier detection with kernel density functions  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Latecki, Longin Jan Lazarevic, Aleksandar Pokrajac, Dragojub Temple Univ CIS Dept Philadelphia PA 19122 USA United Technol Res Ctr E Hartford CT 06108 USA Delware State Univ CIS Dept CREOSA AMRC Dover DE 19901 USA
Outlier detection has recently become an important problem in many industrial and financial applications. In this paper, a novel unsupervised algorithm for outlier detection with a solid statistical foundation is prop... 详细信息
来源: 评论
A new incremental optimal feature extraction method for on-line applications
收藏 引用
4th international conference on Image Analysis and recognition
作者: Ghassabeh, Youness Aliyari Moghaddam, Hamid Abrishami KN Toosi Univ Technol Dept Elect Engn Tehran Iran
In this paper, we introduced new adaptive learning algorithms to extract linear discriminant analysis (LDA) features from multidimensional data in order to reduce the data dimension space. For this purpose, new adapti... 详细信息
来源: 评论
True 2-D all phase filter bank and its application for image compression
True 2-D all phase filter bank and its application for image...
收藏 引用
5th international conference on Wavelet Analysis and pattern recognition
作者: Xu, Ni-Ni Wang, Li-Ning Xiao, Zhi-Tao Tianjin Polytech Univ Sch Commun & Elect Informat Engn Tianjin 300160 Peoples R China
Based on all phase theory this paper designed three kinds of true 2-D all phase filter bank (true 2-D APFB), which can be used to decompose and recompose image data in true 2-D directly. If quantification error of fil... 详细信息
来源: 评论
Categorizing evolved CoreWar warriors using EM and attribute evaluation  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Pracner, Doni Tomesev, Nenad Radovanovic, Milos Ivanovic, Mirjana Univ Novi Sad Fac Sci Dept Math & Informat Trg D Obradov 4 Novi Sad 21000 Serbia
CoreWar is a computer simulation where two programs written in an assembly language called redcode compete in a virtual memory array. these programs are referred to as warriors. Over more than twenty years of developm... 详细信息
来源: 评论
Mining frequent trajectories of moving objects for location prediction  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Morzy, Mikolaj Poznan Univ Tech Inst Comp Sci PL-60965 Poznan Poland
Advances in wireless and mobile technology flood us with amounts of moving object data that preclude all means of manual data processing. the volume of data gathered from position sensors of mobile phones, PDAs, or ve... 详细信息
来源: 评论
Generic probability density function reconstruction for randomization in privacy-preserving data mining  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Tan, Vincent Yan Fu Ng, See-Kiong MIT 77 Massachusetts Ave Cambridge MA 02139 USA Inst Infocomm Res I2R Singapore 119613 Singapore
data perturbation with random noise signals has been shown to be useful for data hiding in privacy-preserving data mining. Perturbation methods based on additive randomization allows accurate estimation of the Probabi... 详细信息
来源: 评论
Transductive learning from relational data  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Ceci, Michelangelo Appice, Annalisa Barile, Nicola Malerba, Donato Univ Bari Dipartimento Informat Via Orabona 4 I-70126 Bari Italy
Transduction is an inference mechanism "from particular to particular". Its application to classification tasks implies the use of both labeled (training) data and unlabeled (working) data to build a classif... 详细信息
来源: 评论
Tracking of multiple targets using on-line learning for appearance model adaptation
收藏 引用
4th international conference on Image Analysis and recognition
作者: Pernkopf, Franz Graz Univ Technol A-8010 Graz Austria
We propose visual tracking of multiple objects (faces of people) in a meeting scenario based on low-level features such as skin-color, target motion, and target size. Based on these features automatic initialization a... 详细信息
来源: 评论
Research on video segmentation via active learning
Research on video segmentation via active learning
收藏 引用
4th international conference on Image and Graphics
作者: Tan, Wenwei Teng, Shaohua Zhang, Wei Guangdong Univ Technol Guangzhou Peoples R China
We propose a method to video segmentation via active learning. Shot segmentation is an essential first step to video segmentation.. the color histogram-based shot boundary detection algorithm is one of the most reliab... 详细信息
来源: 评论