咨询与建议

限定检索结果

文献类型

  • 3,428 篇 会议
  • 27 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,945 篇 工学
    • 1,270 篇 计算机科学与技术...
    • 955 篇 信息与通信工程
    • 686 篇 软件工程
    • 521 篇 电气工程
    • 190 篇 光学工程
    • 108 篇 生物工程
    • 80 篇 电子科学与技术(可...
    • 62 篇 生物医学工程(可授...
    • 61 篇 控制科学与工程
    • 60 篇 仪器科学与技术
    • 54 篇 机械工程
    • 33 篇 化学工程与技术
    • 32 篇 网络空间安全
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 13 篇 土木工程
    • 13 篇 交通运输工程
  • 959 篇 医学
    • 951 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 774 篇 理学
    • 574 篇 物理学
    • 192 篇 数学
    • 114 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 33 篇 化学
    • 29 篇 系统科学
  • 132 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 30 篇 法学
    • 28 篇 社会学
  • 11 篇 军事学
  • 9 篇 文学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 教育学

主题

  • 418 篇 image coding
  • 349 篇 visual communica...
  • 307 篇 image processing
  • 293 篇 visualization
  • 222 篇 feature extracti...
  • 177 篇 image segmentati...
  • 147 篇 image compressio...
  • 139 篇 training
  • 136 篇 video coding
  • 130 篇 image reconstruc...
  • 117 篇 image color anal...
  • 107 篇 cameras
  • 103 篇 image quality
  • 99 篇 deep learning
  • 95 篇 image enhancemen...
  • 88 篇 image edge detec...
  • 85 篇 humans
  • 83 篇 three-dimensiona...
  • 77 篇 motion estimatio...
  • 76 篇 decoding

机构

  • 36 篇 shanghai jiao to...
  • 29 篇 institute of ima...
  • 24 篇 school of electr...
  • 20 篇 university of sc...
  • 18 篇 shanghai jiao to...
  • 16 篇 shanghai jiao to...
  • 16 篇 tianjin univ sch...
  • 16 篇 beijing universi...
  • 11 篇 university of el...
  • 11 篇 cas key laborato...
  • 11 篇 tsinghua univ de...
  • 10 篇 univ sci & techn...
  • 10 篇 peking univ inst...
  • 10 篇 institute of ima...
  • 9 篇 zhejiang univers...
  • 9 篇 tsinghua univ de...
  • 9 篇 school of electr...
  • 9 篇 xidian univ sch ...
  • 9 篇 shanghai jiao to...
  • 8 篇 school of remote...

作者

  • 34 篇 zhai guangtao
  • 26 篇 sumei li
  • 25 篇 song li
  • 22 篇 li sumei
  • 21 篇 guangtao zhai
  • 18 篇 li li
  • 18 篇 li song
  • 18 篇 min xiongkuo
  • 16 篇 dong liu
  • 16 篇 yang xiaokang
  • 16 篇 shan liu
  • 15 篇 andré kaup
  • 14 篇 chen zhibo
  • 13 篇 xie rong
  • 13 篇 xiongkuo min
  • 12 篇 gao wen
  • 11 篇 heming sun
  • 11 篇 zhibo chen
  • 11 篇 zhenzhong chen
  • 11 篇 gao zhiyong

语言

  • 3,405 篇 英文
  • 49 篇 土耳其文
  • 23 篇 中文
  • 7 篇 其他
检索条件"任意字段=Conference on Visual Communications and Image Processing"
3469 条 记 录,以下是411-420 订阅
排序:
Faster and Finer Pose Estimation for Object Pool in a Single RGB image
Faster and Finer Pose Estimation for Object Pool in a Single...
收藏 引用
IEEE International conference on visual communications and image processing (VCIP) - visual communications in the Era of AI and Limited Resources
作者: Aing, Lee Lie, Wen-Nung Chiang, Jui-Chiu Natl Chung Cheng Univ CCU Dept Elect Engn Chiayi Taiwan Natl Chung Cheng Univ CCU Ctr Innovat Res Aging Soc CIRAS Chiayi Taiwan Natl Chung Cheng Univ CCU Adv Inst Mfg High Tech Innovat AIM HI Chiayi Taiwan
Predicting/estimating the 6DoF pose parameters for multi-instance objects accurately in a fast manner is an important issue in robotic and computer vision. Even though some bottom-up methods have been proposed to be a... 详细信息
来源: 评论
DENSE DEPTH ACQUISITION VIA ONE-SHOT STRIPE STRUCTURED LIGHT
DENSE DEPTH ACQUISITION VIA ONE-SHOT STRIPE STRUCTURED LIGHT
收藏 引用
IEEE International conference on visual communications and image processing (VCIP)
作者: Li, Qin Li, Fu Shi, Guangming Qi, Fei Shi, Yuexin Gao, Shan Xidian Univ Sch Elect Engn Key Lab Intelligent Percept & Image Understanding Chinese Minist Educ Xian 710071 Shaanxi Peoples R China
Depth acquisition for moving objects becomes increasingly critical for some applications such as human facial expression recognition. This paper presents a method for capturing the depth maps of moving objects that us... 详细信息
来源: 评论
Geometrical image filtering with connected operators and image inpainting
Geometrical image filtering with connected operators and ima...
收藏 引用
conference on visual communications and image processing 2007
作者: Dimiccoli, Mariella Salembier, Philippe Tech Univ Catalonia Dept Signal Theory & Commun Jordi Girona 1-3 Barcelona 08034 Spain
This paper deals with the joint use of connected operators and image inpainting for image filtering. Connected operators filter the image by merging its flat zones while preserving contour information. image inpaintin... 详细信息
来源: 评论
A fault induced attack to semi-fragile image authentication schemes
A fault induced attack to semi-fragile image authentication ...
收藏 引用
conference on visual communications and image processing 2003
作者: Wu, YD Xu, CS Inst Infocomm Res Singapore 119613 Singapore
This paper describes an attack on semi-fragile image authentication schemes proposed in papers In this attack, the adversary manipulates an authentic image and queries a verifier with the corrupted image. According to... 详细信息
来源: 评论
Lossy Medical image Compression U sing Huffman Coding and Singular Value Decomposition
Lossy Medical Image Compression U sing Huffman Coding and Si...
收藏 引用
21st Signal processing and communications Applications conference (SIU)
作者: Rufai, Awwal Mohammed Anbarjafari, Gholamreza Demirel, Hasan Uluslararasi Kibris Univ Elekt & Elekt Muhendisligi Bolumu Nicosia Cyprus Dogu Akdeniz Univ Elekt & Elekt Muhendisligi Bolumu Gazimagusa Cyprus
Medical images generate enormous amounts of data and therefore, efficient image compression techniques need to be employed in order to save on cost and time of storage and transmission respectively. In this research w... 详细信息
来源: 评论
visual Attention on Human Face
Visual Attention on Human Face
收藏 引用
IEEE visual communications and image processing (VCIP) conference
作者: Min, Xiongkuo Zhai, Guangtao Gu, Ke Shanghai Jiao Tong Univ Inst Image Commun & Network Engn Shanghai Peoples R China
Human faces are always the focus of visual attention since faces can provide plenty of information. Although some visual attention models incorporating face cues work better in scenes containing faces, no visual atten... 详细信息
来源: 评论
Hiding data in halftone image using modified data hiding error diffusion
收藏 引用
conference on visual communications and image processing
作者: Fu, MS Au, OC Hong Kong Univ Sci & Technol Dept Elect & Elect Engn Hong Kong Hong Kong Peoples R China
With the ease of distribution of digital images, there is a growing concern for copyright control and authentication. While there are many existing watermarking and data hiding methods for natural images, almost none ... 详细信息
来源: 评论
Low delay foveated visual communications over wireless channels
Low delay foveated visual communications over wireless chann...
收藏 引用
International conference on image processing (ICIP'99)
作者: Lee, Sanghoon Bovik, Alan C. Kim, Young Yong Univ of Texas at Austin Austin United States
The great potential of `foveated imaging' lies in the entropy reduction relative to the original image while minimizing the loss of visual information. Utilizing human foveation combined with video compression, as... 详细信息
来源: 评论
Data Hiding Using Randomization and Multiple Encrypted Secret images
Data Hiding Using Randomization and Multiple Encrypted Secre...
收藏 引用
2015 International conference on communications and Signal processing (ICCSP)
作者: Das, Pallavi Kushwaha, Satish Chandra Chakraborty, Madhupama Natl Inst Technol Agartala 799046 West Tripura India
This paper proposes a new image steganography method of hiding multiple secret images (2 bit binary image) in a single cover image (24 bit cover image). According to the proposed method, one of the secret images is em... 详细信息
来源: 评论
A Novel Copyright Protection Scheme Using visual Cryptography
A Novel Copyright Protection Scheme Using Visual Cryptograph...
收藏 引用
1st International conference on Advances in Computing and communications
作者: Nag, Amitava Singh, Jyoti Prakash Biswas, Sushanta Sarkar, D. Sarkar, Partha Pratim Dept. of Information Technology Academy of Technology West Bengal India Department of Engineering and Technological Studies University of Kalyani West Bengal India
visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In t... 详细信息
来源: 评论