咨询与建议

限定检索结果

文献类型

  • 1,926 篇 会议
  • 12 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,948 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,032 篇 工学
    • 909 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 297 篇 控制科学与工程
    • 122 篇 信息与通信工程
    • 115 篇 电气工程
    • 73 篇 生物工程
    • 44 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 13 篇 光学工程
    • 9 篇 动力工程及工程热...
  • 321 篇 理学
    • 211 篇 数学
    • 91 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 28 篇 物理学
    • 17 篇 化学
  • 287 篇 管理学
    • 218 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 493 篇 machine learning
  • 165 篇 data mining
  • 155 篇 computer science
  • 152 篇 machine learning...
  • 141 篇 support vector m...
  • 118 篇 cybernetics
  • 105 篇 neural networks
  • 94 篇 clustering algor...
  • 90 篇 computer network...
  • 88 篇 learning systems
  • 80 篇 educational inst...
  • 80 篇 distributed comp...
  • 66 篇 electronic mail
  • 66 篇 artificial intel...
  • 64 篇 support vector m...
  • 62 篇 algorithm design...
  • 60 篇 humans
  • 59 篇 pattern recognit...
  • 58 篇 testing
  • 57 篇 application soft...

机构

  • 63 篇 department of co...
  • 40 篇 department of co...
  • 24 篇 school of comput...
  • 23 篇 department of co...
  • 14 篇 machine learning...
  • 14 篇 department of co...
  • 14 篇 college of mecha...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 institute of com...
  • 11 篇 hebei univ coll ...
  • 8 篇 institute of com...
  • 8 篇 school of comput...
  • 7 篇 department of in...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of au...
  • 7 篇 department of in...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...

作者

  • 26 篇 yeung daniel s.
  • 22 篇 d.s. yeung
  • 16 篇 xi-zhao wang
  • 12 篇 hui wang
  • 12 篇 ng wing w. y.
  • 12 篇 tsang eric c. c.
  • 11 篇 e.c.c. tsang
  • 11 篇 daniel s. yeung
  • 11 篇 kuan-quan wang
  • 10 篇 wang xi-zhao
  • 10 篇 yeung
  • 10 篇 tsang
  • 9 篇 jane you
  • 9 篇 you jane
  • 9 篇 zhang david
  • 8 篇 qing he
  • 8 篇 de-gang chen
  • 7 篇 qing-hua li
  • 7 篇 yu zhiwen
  • 7 篇 li le

语言

  • 1,905 篇 英文
  • 40 篇 其他
  • 3 篇 中文
检索条件"任意字段=International Conference on Machine Learning and Computing(ICMLC 2009)"
1948 条 记 录,以下是1551-1560 订阅
排序:
Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN
Comparison of different fusion approaches for network intrus...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Chan, Aki P. F. Ng, W.W.Y. Yeung, Daniel S. Tsang, Eric C. C. Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
The information technology has been adopted to solve problems in network Intrusion Detection System (IDS) and many approaches have been proposed to tackle the information security problems of computer networks, especi... 详细信息
来源: 评论
A novel model based on negotiation axiom system of capability
A novel model based on negotiation axiom system of capabilit...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Jung, Wei-Jin Xu, Yu-Hui Xu, Yu-Sheng Department of Computer Zhuzhou Institute of Technology Zhuzhou 412008 China Department of Information and Computing Science Zhuzhou Institute of Technology Zhuzhou 412008 China College of Mechanical Engineering and Applied Electronics Beijing University of Technology Beijing 100022 China
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. Ho... 详细信息
来源: 评论
Exact optimization for a class of second order Markov Random Field via graph cuts
Exact optimization for a class of second order Markov Random...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Liao, Zhi-Jun Zhao, Jie-Yu Institute of Computing Technology Chinese Academy of Sciences Beijing China Inistitue of Computer Science and Technology NingBo University NingBo 315211 China
Optimization for the maximum a posterior (MAP) estimation of a Markov Random Field often comes down to a large combinational optimization problem, and the general purpose optimization technology such as simulated anne... 详细信息
来源: 评论
A second-order statistical detection approach with application to internet anomaly detection
A second-order statistical detection approach with applicati...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Jin, Shu-Yuan Yeung, Daniel S. Wang, X.I.-Zhao Department of Computing HongKong Polytechnic University HongKong Hong Kong College of Mathematics and Computer Science Hebei University Baoding China
Detecting multiple network attacks is essential to intrusion detection, network prevention, security defense and network traffic management. But in today's distributed computer networks, the various and frequent a... 详细信息
来源: 评论
Assembled matrix distance metric for 2DPCA-based face and palmprint recognition
Assembled matrix distance metric for 2DPCA-based face and pa...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Zuo, Wang-Meng Wang, Kuan-Quan Zhang, David School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 Heilongjiang China Biometrics Research Centre Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong
Two-dimensional Principal component analysis (2DPCA) is a novel image representation approach recently developed for image recognition. One advantage of 2DPCA is that it can extract feature matrix using a straightforw... 详细信息
来源: 评论
Analysis of sensitivity behavior of madalines
Analysis of sensitivity behavior of madalines
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Wang, Ying-Feng Zeng, Xiao-Qin Yeung, Daniel S. Department of Computer Science and Engineering Hohai University Nanjing 210098 China Department of Computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong
This paper aims at exploring the behavior of the sensitivity to weight perturbation for an ensemble of Madalines. An analytical formula is derived first for the calculation of the Adalines' sensitivity, and then b... 详细信息
来源: 评论
A new theory which is based on web service's mobile agent
A new theory which is based on web service's mobile agent
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Jiang, Wei-Jin Xu, Yu-Hui Tang, Wen-Ping Department of Computer Zhuzhou Institute of Technology Zhuzhou 412008 China Department of Information and Computing Science Zhuzhou Institute of Technology Zhuzhou 412008 China College of Mechanical Engineering and Applied Electronics Beijing University of Technology Beijing 100022 China
Mobile agent and web service are promising new technologies with bright future, and have wide application in aspect of scientific study as well as in engineering industry. Meanwhile they both have deficiencies. The pa... 详细信息
来源: 评论
Distributed service performance management based on linear regression and genetic programming
Distributed service performance management based on linear r...
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Chen, Jing Li, Zeng-Zhi Liao, Zhi-Gang Wang, Yun-Lan Telecommunication Engineering Institute Air Force Engineering University Xi'an 710077 China Institute of Computer System Architecture and Network Xi'an Jiaotong University Xi'an 710049 China Center for High Performance Computing Northwestern Polytechnical University Xi'an 710072 China
An architecture for online discovery quantitative models system of service performance management was proposed. The system was capable of constructing the quantitative models without prior knowledge of the managed ele... 详细信息
来源: 评论
SVR based color calibration for tongue image
SVR based color calibration for tongue image
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Zhang, Hong-Zhi Wang, Kuan-Quan Jin, Xue-Song Zhang, David School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 Heilongjiang China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong
Tongue color is one of the most important pathological features for Computer Aided Tongue Diagnosis System (CATDS). Color distortion of tongue image, which is often caused by the inconstancy of lighting conditions, ca... 详细信息
来源: 评论
Information retrieval from large number of web sites
Information retrieval from large number of web sites
收藏 引用
international conference on machine learning and Cybernetics, icmlc 2005
作者: Deng, Jian-Shuang Zheng, Qi.-Lun Peng, Hong Department of Computing Science South China University of Technology Guangzhou 510641 China
Many web information retrieval methods are related to special web sites, for example, the method based on extracting rules and the one based on training page samples. These methods can do well in a web site but fail i... 详细信息
来源: 评论