咨询与建议

限定检索结果

文献类型

  • 1,926 篇 会议
  • 13 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,949 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,033 篇 工学
    • 909 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 297 篇 控制科学与工程
    • 122 篇 信息与通信工程
    • 116 篇 电气工程
    • 73 篇 生物工程
    • 44 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 13 篇 光学工程
    • 9 篇 动力工程及工程热...
  • 321 篇 理学
    • 211 篇 数学
    • 91 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 28 篇 物理学
    • 17 篇 化学
  • 287 篇 管理学
    • 218 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 493 篇 machine learning
  • 165 篇 data mining
  • 155 篇 computer science
  • 153 篇 machine learning...
  • 141 篇 support vector m...
  • 118 篇 cybernetics
  • 105 篇 neural networks
  • 94 篇 clustering algor...
  • 90 篇 computer network...
  • 88 篇 learning systems
  • 80 篇 educational inst...
  • 80 篇 distributed comp...
  • 66 篇 electronic mail
  • 66 篇 artificial intel...
  • 64 篇 support vector m...
  • 62 篇 algorithm design...
  • 60 篇 humans
  • 59 篇 pattern recognit...
  • 58 篇 computational mo...
  • 58 篇 testing

机构

  • 63 篇 department of co...
  • 40 篇 department of co...
  • 24 篇 school of comput...
  • 23 篇 department of co...
  • 14 篇 machine learning...
  • 14 篇 department of co...
  • 14 篇 college of mecha...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 institute of com...
  • 11 篇 hebei univ coll ...
  • 8 篇 institute of com...
  • 8 篇 school of comput...
  • 7 篇 department of in...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of au...
  • 7 篇 department of in...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...

作者

  • 26 篇 yeung daniel s.
  • 22 篇 d.s. yeung
  • 16 篇 xi-zhao wang
  • 12 篇 hui wang
  • 12 篇 ng wing w. y.
  • 12 篇 tsang eric c. c.
  • 11 篇 e.c.c. tsang
  • 11 篇 daniel s. yeung
  • 11 篇 kuan-quan wang
  • 10 篇 wang xi-zhao
  • 10 篇 yeung
  • 10 篇 tsang
  • 9 篇 jane you
  • 9 篇 you jane
  • 9 篇 zhang david
  • 8 篇 qing he
  • 8 篇 de-gang chen
  • 7 篇 qing-hua li
  • 7 篇 yu zhiwen
  • 7 篇 li le

语言

  • 1,942 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"任意字段=International Conference on Machine Learning and Computing(ICMLC 2009)"
1949 条 记 录,以下是1641-1650 订阅
排序:
LPP/QR for under-sampled image recognition
LPP/QR for under-sampled image recognition
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Si-Bao Chen Hai-Feng Zhao Bin Luo Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education Anhui University Hefei China
In this paper, we propose a dimension reduction method of locality preserving projections based on QR-decomposition of training data matrix, namely LPP/QR. It is efficient and effective in under-sampled recognition of... 详细信息
来源: 评论
Information retrieval from large number of Web sites
Information retrieval from large number of Web sites
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Jian-Shuang Deng Qi-Lun Zheng Hong Peng Department of Computing Science South China University of Technology Guangzhou China
Many Web information retrieval methods are related to special Web sites, for example, the method based on extracting rules and the one based on training page samples. These methods can do well in a Web site but fail i... 详细信息
来源: 评论
Exact optimization for a class of second order Markov random field via graph cuts
Exact optimization for a class of second order Markov random...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Zhi-Jun Liao Jie-Yu Zhao Institute of Computer Science and Technology NingBo University NingBo China Institute of Computing Technology Chinese Academy and Sciences Beijing China
Optimization for the maximum a posterior (MAP) estimation of a Markov random field often comes down to a large combinational optimization problem, and the general purpose optimization technology such as simulated anne... 详细信息
来源: 评论
Multiple sequence alignment using minimum spanning tree
Multiple sequence alignment using minimum spanning tree
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Mei-Jie Zhu Gui-Wu Hu Qi-Lun Zheng Hong Peng College of Information South China Agricultural University Guangzhou China College of Computer Science and Engineering South China University of Technology Guangzhou China Department of Mathematics Computational Science Guangdong Business College Guangzhou China
Multiple sequence alignment (MSA) is one of the most important tools in modern biology. The MSA problem is NP-hard; therefore, heuristic approaches are needed to align a large set of data within a reasonable time. In ... 详细信息
来源: 评论
Clustering analysis of electric power user based on the similarity degree of load curve
Clustering analysis of electric power user based on the simi...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Cai-qing Zhang Ting Wang Department of Economic Management North China Electric Power University Baoding China
The form of power load curve is important to demands side managing. The paper studies on the similarity of load curve, and set up the estimating concept on similarity of load curve - similar degree. And it designs clu... 详细信息
来源: 评论
Analysis of sensitivity behavior of Madalines
Analysis of sensitivity behavior of Madalines
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Ying-Feng Wang Xiao-Qin Zeng Yeung Department of Computer Science and Engineering Hohai University HHU Nanjing China Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China
This paper aims at exploring the behavior of the sensitivity to weight perturbation for an ensemble of Madalines. An analytical formula is derived first for the calculation of the Adalines' sensitivity, and then b... 详细信息
来源: 评论
Research on DOP-based Chinese parsing
Research on DOP-based Chinese parsing
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Yue-Jie Zhang Tao Zhang Jing-Bo Zhu Tian-Shun Yao Department of Computer Science and Engineering Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai China School of Information Management & Engineering Shanghai University of Finance and Economics Shanghai China School of Information Science and Engineering Northeastern University Shenyang China
This paper presents a Chinese parsing method which takes data-oriented parsing technique as the basic framework and utilizes the similarity-based probability estimate technique. Through the initial selection process, ... 详细信息
来源: 评论
CPAHR: an concurrency control protocol against hard real-time transactions
CPAHR: an concurrency control protocol against hard real-tim...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Jia-Lixia Sch. of UFSoft Jiangxi Finance & Econ. Univ. Nanchang China
When a hard real-time transaction conflicts with some un-hard real-time transactions, the traditional concurrency control protocols make the hard real-time transaction prior obtain system resources through enhancing i... 详细信息
来源: 评论
A new approach to feature selection in text classification
A new approach to feature selection in text classification
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Yi Wang Xiao-Jing Wang Chengdu Institute of Computer Application Chinese Academy and Sciences Chengdu China
Text classification is the process of automatically assigning predefined categories to free text, which is very important to information retrieval and many other applications. Of it, the first important thing is to ef... 详细信息
来源: 评论
A second-order statistical detection approach with application to Internet anomaly detection
A second-order statistical detection approach with applicati...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Shu-Yuan Jin Yeung Xi-Zhao Wang Department of Computing Hong Kong Polytechnic University Hong Kong China College of Mathematics and Computer Science Hebei University Baoding China
Detecting multiple network attacks is essential to intrusion detection, network prevention, security defense and network traffic management. But in today's distributed computer networks, the various and frequent a... 详细信息
来源: 评论