咨询与建议

限定检索结果

文献类型

  • 1,734 篇 会议
  • 45 册 图书
  • 12 篇 期刊文献

馆藏范围

  • 1,790 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,229 篇 工学
    • 1,097 篇 计算机科学与技术...
    • 629 篇 软件工程
    • 257 篇 信息与通信工程
    • 201 篇 电气工程
    • 177 篇 生物工程
    • 102 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 46 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 42 篇 机械工程
    • 41 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 29 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
  • 457 篇 理学
    • 200 篇 数学
    • 197 篇 生物学
    • 144 篇 物理学
    • 84 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 46 篇 化学
  • 237 篇 管理学
    • 171 篇 图书情报与档案管...
    • 89 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 182 篇 医学
    • 160 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
    • 32 篇 公共卫生与预防医...
  • 34 篇 法学
    • 30 篇 社会学
  • 17 篇 经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 240 篇 machine learning
  • 185 篇 deep learning
  • 140 篇 pattern recognit...
  • 110 篇 feature extracti...
  • 91 篇 support vector m...
  • 88 篇 data mining
  • 79 篇 accuracy
  • 75 篇 training
  • 59 篇 convolutional ne...
  • 51 篇 machine learning...
  • 48 篇 data models
  • 46 篇 artificial intel...
  • 41 篇 computational mo...
  • 40 篇 neural networks
  • 39 篇 face recognition
  • 36 篇 learning systems
  • 36 篇 adversarial mach...
  • 33 篇 predictive model...
  • 32 篇 classification
  • 32 篇 image recognitio...

机构

  • 6 篇 college of compu...
  • 5 篇 xi'an university...
  • 5 篇 shanghai jiao to...
  • 4 篇 badji mokhtar un...
  • 4 篇 institute of big...
  • 4 篇 chitkara centre ...
  • 4 篇 chitkara univers...
  • 4 篇 library shanghai...
  • 3 篇 university of mi...
  • 3 篇 school of comput...
  • 3 篇 univ chittagong ...
  • 3 篇 chongqing univer...
  • 3 篇 centre of resear...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of design...
  • 3 篇 korea univ dept ...
  • 3 篇 school of automa...
  • 3 篇 university of mi...
  • 3 篇 shenyang jianzhu...

作者

  • 5 篇 venkatesh svetha
  • 4 篇 ashwini kodipall...
  • 4 篇 zhang yan
  • 4 篇 srinivasa gowri
  • 4 篇 kamel mohamed s.
  • 4 篇 lall brejesh
  • 4 篇 trupthi rao
  • 3 篇 andersson karl
  • 3 篇 peng yang
  • 3 篇 malerba donato
  • 3 篇 karl andersson
  • 3 篇 chaudhury santan...
  • 3 篇 de-shuang huang
  • 3 篇 sekhar c. chandr...
  • 3 篇 wang shuo
  • 3 篇 kamata sei-ichir...
  • 3 篇 mohammad shahada...
  • 3 篇 azizi nabiha
  • 3 篇 phung dinh
  • 3 篇 krasotkina olga

语言

  • 1,515 篇 英文
  • 267 篇 其他
  • 26 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Data Minining in Pattern Recognition"
1791 条 记 录,以下是1601-1610 订阅
learning graph matching
Learning graph matching
收藏 引用
11th IEEE international conference on Computer Vision
作者: Caetano, Tiberio S. Cheng, Li Le, Quoc V. Smola, Alex J. NICTA Stat Machine Learning Program Canberra ACT 0200 Australia
As a fundamental problem in pattern recognition, graph matching has found a variety of applications in the field of computer vision. In graph matching, patterns are modeled as graphs and pattern recognition amounts to... 详细信息
来源: 评论
Blog mining for the fortune 500  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Geller, James Parikh, Sapankumar Krishnan, Sriram New Jersey Inst Technol Dept Comp Sci Coll Comp Sci Newark NJ 07102 USA
In recent years there has been a tremendous increase in the number of users maintaining online blogs on the Internet. Companies, in particular, have become aware of this medium of communication and have taken a keen i... 详细信息
来源: 评论
Approximate inferring of goal-oriented Credal network
Approximate inferring of goal-oriented Credal network
收藏 引用
5th international conference on Wavelet Analysis and pattern recognition
作者: Li, Yu-Ling Wu, Qi-Zong Henan Univ Inst Data & Knowledge Engn Kaifeng 475001 Henan Peoples R China Beijing Inst Technol Sch Management & Econom Beijing 100081 Peoples R China
Approximate inferring approach of Credal network based on Ant Colony Algorithms is put forward Considering g network inferring of goal-oriented in Bayesian network for the variable decision-maker is interested in live... 详细信息
来源: 评论
Sub-pattern non-negative matrix factorization based on random subspace for face recognition
Sub-pattern non-negative matrix factorization based on rando...
收藏 引用
5th international conference on Wavelet Analysis and pattern recognition
作者: Zhu, Yu-Lian Nanjing Univ Aeronaut & Astronaut Dept Comp Sci & Engn Nanjing 210016 Peoples R China
Non-negative matrix factorization (NMF) as a part-based representation method allows only additive combinations of non-negative basis components to represent the original data, so it provides a realistic approximation... 详细信息
来源: 评论
Outlier detection with kernel density functions  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Latecki, Longin Jan Lazarevic, Aleksandar Pokrajac, Dragojub Temple Univ CIS Dept Philadelphia PA 19122 USA United Technol Res Ctr E Hartford CT 06108 USA Delware State Univ CIS Dept CREOSA AMRC Dover DE 19901 USA
Outlier detection has recently become an important problem in many industrial and financial applications. In this paper, a novel unsupervised algorithm for outlier detection with a solid statistical foundation is prop... 详细信息
来源: 评论
A new incremental optimal feature extraction method for on-line applications  1
收藏 引用
4th international conference on Image Analysis and recognition
作者: Ghassabeh, Youness Aliyari Moghaddam, Hamid Abrishami KN Toosi Univ Technol Dept Elect Engn Tehran Iran
In this paper, we introduced new adaptive learning algorithms to extract linear discriminant analysis (LDA) features from multidimensional data in order to reduce the data dimension space. For this purpose, new adapti... 详细信息
来源: 评论
True 2-D all phase filter bank and its application for image compression
True 2-D all phase filter bank and its application for image...
收藏 引用
5th international conference on Wavelet Analysis and pattern recognition
作者: Xu, Ni-Ni Wang, Li-Ning Xiao, Zhi-Tao Tianjin Polytech Univ Sch Commun & Elect Informat Engn Tianjin 300160 Peoples R China
Based on all phase theory this paper designed three kinds of true 2-D all phase filter bank (true 2-D APFB), which can be used to decompose and recompose image data in true 2-D directly. If quantification error of fil... 详细信息
来源: 评论
Categorizing evolved CoreWar warriors using EM and attribute evaluation  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Pracner, Doni Tomesev, Nenad Radovanovic, Milos Ivanovic, Mirjana Univ Novi Sad Fac Sci Dept Math & Informat Trg D Obradov 4 Novi Sad 21000 Serbia
CoreWar is a computer simulation where two programs written in an assembly language called redcode compete in a virtual memory array. these programs are referred to as warriors. Over more than twenty years of developm... 详细信息
来源: 评论
Mining frequent trajectories of moving objects for location prediction  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Morzy, Mikolaj Poznan Univ Tech Inst Comp Sci PL-60965 Poznan Poland
Advances in wireless and mobile technology flood us with amounts of moving object data that preclude all means of manual data processing. the volume of data gathered from position sensors of mobile phones, PDAs, or ve... 详细信息
来源: 评论
Generic probability density function reconstruction for randomization in privacy-preserving data mining  1
收藏 引用
5th international conference on machine learning and data Mining in pattern recognition
作者: Tan, Vincent Yan Fu Ng, See-Kiong MIT 77 Massachusetts Ave Cambridge MA 02139 USA Inst Infocomm Res I2R Singapore 119613 Singapore
data perturbation with random noise signals has been shown to be useful for data hiding in privacy-preserving data mining. Perturbation methods based on additive randomization allows accurate estimation of the Probabi... 详细信息
来源: 评论