咨询与建议

限定检索结果

文献类型

  • 2,639 篇 会议
  • 181 册 图书
  • 31 篇 期刊文献

馆藏范围

  • 2,850 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,894 篇 工学
    • 1,711 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 329 篇 信息与通信工程
    • 275 篇 电气工程
    • 191 篇 生物工程
    • 176 篇 控制科学与工程
    • 154 篇 生物医学工程(可授...
    • 68 篇 安全科学与工程
    • 65 篇 光学工程
    • 64 篇 化学工程与技术
    • 61 篇 机械工程
    • 50 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 38 篇 电子科学与技术(可...
    • 37 篇 网络空间安全
  • 560 篇 理学
    • 295 篇 数学
    • 223 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 108 篇 物理学
    • 80 篇 系统科学
    • 57 篇 化学
  • 408 篇 管理学
    • 273 篇 图书情报与档案管...
    • 190 篇 管理科学与工程(可...
    • 68 篇 工商管理
  • 265 篇 医学
    • 206 篇 临床医学
    • 123 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 48 篇 法学
    • 43 篇 社会学
  • 41 篇 教育学
    • 37 篇 教育学
  • 30 篇 经济学
  • 27 篇 农学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 487 篇 machine learning
  • 485 篇 data mining
  • 276 篇 pattern recognit...
  • 162 篇 feature extracti...
  • 156 篇 deep learning
  • 149 篇 artificial intel...
  • 113 篇 support vector m...
  • 107 篇 machine learning...
  • 95 篇 data mining and ...
  • 86 篇 training
  • 79 篇 data models
  • 77 篇 accuracy
  • 60 篇 computer imaging...
  • 56 篇 learning systems
  • 56 篇 neural networks
  • 48 篇 convolutional ne...
  • 47 篇 information syst...
  • 47 篇 computer applica...
  • 47 篇 predictive model...
  • 44 篇 big data

机构

  • 15 篇 national univers...
  • 15 篇 the islamic univ...
  • 15 篇 fujian provincia...
  • 13 篇 medical technica...
  • 13 篇 school of inform...
  • 13 篇 altoosi universi...
  • 11 篇 guangdong univer...
  • 10 篇 indian statistic...
  • 10 篇 school of manage...
  • 10 篇 department of bu...
  • 9 篇 institute of env...
  • 9 篇 department of to...
  • 8 篇 xi'an university...
  • 8 篇 al-zahraa univer...
  • 8 篇 college of mecha...
  • 8 篇 chinese academy ...
  • 7 篇 school of inform...
  • 7 篇 zhejiang univers...
  • 7 篇 institute of aut...
  • 7 篇 unsw sydney

作者

  • 17 篇 chang kuo-chi
  • 12 篇 de-shuang huang
  • 10 篇 chu kai-chun
  • 10 篇 mottl vadim
  • 9 篇 chang fu-hsiang
  • 9 篇 wang hsiao-chuan
  • 8 篇 zheng-guang wu
  • 8 篇 hongyi li
  • 8 篇 chaojie li
  • 8 篇 biao luo
  • 8 篇 petra perner
  • 8 篇 long cheng
  • 7 篇 yuhui shi
  • 7 篇 krasotkina olga
  • 7 篇 alexander gelbuk...
  • 7 篇 sung tien-wen
  • 7 篇 ying tan
  • 7 篇 lin yuh-chung
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...

语言

  • 2,457 篇 英文
  • 379 篇 其他
  • 64 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=6th International Conference on Machine Learning and Data Mining in Pattern Recognition"
2851 条 记 录,以下是2191-2200 订阅
排序:
A Novel Linear Cellular Automata-Based data Clustering Algorithm
收藏 引用
4th international Work-conference on the Interplay Between Natural and Artificial Computation (IWINAC)
作者: de Lope, Javier Maravall, Dario Univ Politecn Madrid Cognit Robot Grp Dept Artificial Intelligence E-28040 Madrid Spain Univ Politecn Madrid Dept Appl Intelligent Syst E-28040 Madrid Spain
In this paper we propose a novel data clustering algorithm based on the idea of considering the individual data items as cells belonging to an uni-dimensional cellular automaton. Our proposed algorithm combines insigh... 详细信息
来源: 评论
Multi-relational pattern mining Based-on Combination of Properties with Preserving their Structure in Examples
收藏 引用
20th international conference on Inductive Logic Programming (ILP)
作者: Nakano, Yusuke Inuzuka, Nobuhiro Nagoya Inst Technol Showa Ku Nagoya Aichi 4668555 Japan
We propose an algorithm for multi-relational pattern mining through the problem established in WARMR. In order to overcome the combinatorial problem of large pattern space, another algorithm MAPIX restricts patterns i... 详细信息
来源: 评论
Proc. of the Int. Workshop on Soft Computing Applications and Knowledge Discovery 2011, SCAKD 2011 - In Conjunction with the 4th Int. Conf. on pattern recognition and machine Intell., PReMI 2011
Proc. of the Int. Workshop on Soft Computing Applications an...
收藏 引用
international Workshop on Soft Computing Applications and Knowledge Discovery 2011, SCAKD 2011 - In Conjunction with the 4th international conference on pattern recognition and machine Intelligence, PReMI 2011
the proceedings contain 15 papers. the topics discussed include: estimating probability of failure of a complex system based on partial information about subsystems and components, with potential applications to aircr...
来源: 评论
Classification methods using Winners-Take-All neural networks
Classification methods using Winners-Take-All neural network...
收藏 引用
作者: Brenych, Yana Informational Technologies Department Volyn State University Named after Lesia Ukrainka Volia av. 13 Lutsk Ukraine
Winner-Take-All (WTA) and its extended version K-Winner-Take-All (KWTA) networks have been frequently used as the classifiers in neural networks. they are very important tools in data mining, machine learning and Patt... 详细信息
来源: 评论
What's your current stress level? Detection of stress patterns from GSR sensor data
What's your current stress level? Detection of stress patter...
收藏 引用
11th IEEE international conference on data mining Workshops, ICDMW 2011
作者: Bakker, Jorn Pechenizkiy, Mykola Sidorova, Natalia Department of Computer Science Eindhoven University of Technology P.O. Box 513 Eindhoven 5600MB Netherlands
the problem of job stress is generally recognized as one of the major factors leading to a spectrum of health problems. People with certain professions, like intensive care specialists or call-center operators, and pe... 详细信息
来源: 评论
pattern recognition and classification for multivariate time series
Pattern recognition and classification for multivariate time...
收藏 引用
5th international Workshop on Knowledge Discovery from Sensor data, SensorKDD'11 - Held in Conjunction with the 17th ACM SIGKDD conference on Knowledge Discovery and data mining, KDD-2011
作者: Spiegel, Stephan Gaebler, Julia Lommatzsch, Andreas De Luca, Ernesto Albayrak, Sahin DAI-Labor Technische Universitaet Berlin Ernst-Reuter-Platz 7 10587 Berlin Germany
Nowadays we are faced with fast growing and permanently evolving data, including social networks and sensor data recorded from smart phones or vehicles. Temporally evolving data brings a lot of new challenges to the d... 详细信息
来源: 评论
Monitoring Insiders Activities in Cloud Computing Using Rule Based learning
Monitoring Insiders Activities in Cloud Computing Using Rule...
收藏 引用
Int Joint conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Khorshed, Md Tanzim Ali, A. B. M. Shawkat Wasimi, Saleh A. CQUniv Sch Informat & Commun Technol Rockhampton Qld 4702 Australia
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may m... 详细信息
来源: 评论
Evaluation of a Resource Allocating Network with Long Term Memory Using GPU
Evaluation of a Resource Allocating Network with Long Term M...
收藏 引用
10th international conference on Artificial Neural Networks and Genetic Algorithms
作者: Ribeiro, Bernardete Quintas, Ricardo Lopes, Noel Univ Coimbra Dept Informat Engn P-3000 Coimbra Portugal CISUC P-3000 Coimbra Portugal
Incremental learning has recently received broad attention in many applications of pattern recognition and data mining. With many typical incremental learning situations in the real world where a fast response to chan... 详细信息
来源: 评论
Interpreting 3D Faces for Augmented Human-Computer Interaction  1
收藏 引用
6th international conference on Universal Access in Human-Computer Interaction (UAHCI)/14th international conference on Human-Computer Interaction (HCI)
作者: Cadoni, Marinella Grosso, Enrico Lagorio, Andrea Tistarelli, Massimo Univ Sassari Comp Vis Lab Tramariglio Alghero Italy
Human-machine interaction requires the ability to analyze and discern human faces. Due to the nature of the 3D to 2D projection, the recognition of human faces from 2D images, in presence of pose and illumination vari... 详细信息
来源: 评论
A quantitative approach to Triaging in Mobile Forensics
A quantitative approach to Triaging in Mobile Forensics
收藏 引用
Int Joint conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Marturana, Fabio Me, Gianluigi Berte, Rosamaria Tacconi, Simone Univ Roma Tor Vergata Dept Comp Sci Syst & Prod Rome Italy Polizia Stato & Comunicaz Rome Italy
Forensic study of mobile devices is a relatively new field, dating from the early 2000s. the proliferation of phones (particularly smartphones) on the consumer market has caused a growing demand for forensic examinati... 详细信息
来源: 评论