咨询与建议

限定检索结果

文献类型

  • 1,926 篇 会议
  • 13 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,949 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,033 篇 工学
    • 909 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 297 篇 控制科学与工程
    • 122 篇 信息与通信工程
    • 116 篇 电气工程
    • 73 篇 生物工程
    • 44 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 13 篇 光学工程
    • 9 篇 动力工程及工程热...
  • 321 篇 理学
    • 211 篇 数学
    • 91 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 28 篇 物理学
    • 17 篇 化学
  • 287 篇 管理学
    • 218 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 493 篇 machine learning
  • 165 篇 data mining
  • 155 篇 computer science
  • 153 篇 machine learning...
  • 141 篇 support vector m...
  • 118 篇 cybernetics
  • 105 篇 neural networks
  • 94 篇 clustering algor...
  • 90 篇 computer network...
  • 88 篇 learning systems
  • 80 篇 educational inst...
  • 80 篇 distributed comp...
  • 66 篇 electronic mail
  • 66 篇 artificial intel...
  • 64 篇 support vector m...
  • 62 篇 algorithm design...
  • 60 篇 humans
  • 59 篇 pattern recognit...
  • 58 篇 computational mo...
  • 58 篇 testing

机构

  • 63 篇 department of co...
  • 40 篇 department of co...
  • 24 篇 school of comput...
  • 23 篇 department of co...
  • 14 篇 machine learning...
  • 14 篇 department of co...
  • 14 篇 college of mecha...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 institute of com...
  • 11 篇 hebei univ coll ...
  • 8 篇 institute of com...
  • 8 篇 school of comput...
  • 7 篇 department of in...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of au...
  • 7 篇 department of in...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...

作者

  • 26 篇 yeung daniel s.
  • 22 篇 d.s. yeung
  • 16 篇 xi-zhao wang
  • 12 篇 hui wang
  • 12 篇 ng wing w. y.
  • 12 篇 tsang eric c. c.
  • 11 篇 e.c.c. tsang
  • 11 篇 daniel s. yeung
  • 11 篇 kuan-quan wang
  • 10 篇 wang xi-zhao
  • 10 篇 yeung
  • 10 篇 tsang
  • 9 篇 jane you
  • 9 篇 you jane
  • 9 篇 zhang david
  • 8 篇 qing he
  • 8 篇 de-gang chen
  • 7 篇 qing-hua li
  • 7 篇 yu zhiwen
  • 7 篇 li le

语言

  • 1,942 篇 英文
  • 4 篇 其他
  • 3 篇 中文
检索条件"任意字段=International Conference on Machine Learning and Computing(ICMLC 2009)"
1949 条 记 录,以下是1771-1780 订阅
排序:
Adding forecast support to workflow management system by classical logic formula computing
Adding forecast support to workflow management system by cla...
收藏 引用
international conference on machine learning and Cybernetics
作者: Qiu, XP Li, HM Du, YJ Xu, Y SW Jiaotong Univ Dept Appl Math Intelligent Control Dev Ctr Chengdu 610031 Sichuan Peoples R China
Workflow technology is a new hotspot in the area of computer application after 1990s. In order to improve the performance of workflow management system (WfMS), a dynamic neural network based on classical formula compu... 详细信息
来源: 评论
Case-base maintenance using soft computing techniques
Case-base maintenance using soft computing techniques
收藏 引用
international conference on machine learning and Cybernetics
作者: Li, Y Shiu, SCK Pal, SK Liu, JNK Hong Kong Polytech Univ Dept Comp Kowloon Hong Kong Peoples R China
The present paper provides first the concept and different tasks of case-base maintenance. Then the use of some soft computing techniques, including fuzzy sets, rough sets and fuzzy integral, is described in maintaini... 详细信息
来源: 评论
A novel approach to computing rule confidence in rough sets theory
A novel approach to computing rule confidence in rough sets ...
收藏 引用
international conference on machine learning and Cybernetics
作者: Wang, JC Dai, HP Sun, YX Zhejiang Univ Inst Modern Control Engn Hangzhou 310027 Peoples R China
Rough sets theory deals with representation, learning and generalization of uncertain knowledge. It can abstract underlying rules from data. Confidence is the criterion to scaling the reliability of rules. This paper ... 详细信息
来源: 评论
A parallel scheme for IDS
A parallel scheme for IDS
收藏 引用
international conference on machine learning and Cybernetics
作者: Zhao, XL Sun, JZ Tianjin Univ Elect & Informat Engn Sch IBM Ctr Dept Comp Sci Tianjin 300072 Peoples R China
Conventional Intrusion Detection Systems (IDSs) face many challenges, such as evasion techniques, cryptography, false positives and high rate traffic. Many of them can be resolved by parallel methods. In this paper a ... 详细信息
来源: 评论
Research on key conditional attributes and information measurement in mobile decision support
Research on key conditional attributes and information measu...
收藏 引用
international conference on machine learning and Cybernetics
作者: Li, DM Sheng, ZH Zhou, K Tang, BY Nanjing Univ Grad Sch Management Sci & Engn Nanjing 210093 Peoples R China
This paper discusses the influence of conditional attributes on decision attribute, presents an order of conditional attributes and a method of searching key conditional attributes to. decision by Rough set theory. Co... 详细信息
来源: 评论
A further study on simplification of decision tables
A further study on simplification of decision tables
收藏 引用
international conference on machine learning and Cybernetics
作者: Zhang, QF Wang, XZ Wang, JH Hebei Univ Fac Math & Comp Sci Machine Learning Ctr Badoing Hebei Peoples R China
In traditional rough set theory, the simplification of a decision table was investigated and minimal algorithms were introduced to express its result. However, the optimization of minimal algorithms is still left asid... 详细信息
来源: 评论
An efficient recovery scheme for mobile computing system
An efficient recovery scheme for mobile computing system
收藏 引用
international conference on machine learning and Cybernetics
作者: Jiang, TY Li, QH Huazhong Univ Sci & Technol Coll Comp Sci & Technol Wuhan 430074 Peoples R China
It is very necessary for the mobile computing system to be equipped with the checkpointing recovery facility because of the fact that the MHs are vulnerable to the failures. Previous recovery schemes based on message ... 详细信息
来源: 评论
A neurofuzzy system based on rough set theory and genetic algorithms
A neurofuzzy system based on rough set theory and genetic al...
收藏 引用
international conference on machine learning and Cybernetics
作者: Luo, JX Shao, HH Shanghai Jiao Tong Univ Inst Automat Shanghai 200030 Peoples R China
This paper presents a hybrid soft computing modeling approach, a neurofuzzy system based on rough set theory and genetic algorithms (NFRSGA). To solve the curse of dimensionality problem of neurofuzzy system, rough se... 详细信息
来源: 评论
Seamless provisioning of service in the ubiquitous computing environment
Seamless provisioning of service in the ubiquitous computing...
收藏 引用
international conference on machine learning and Cybernetics
作者: Chen, EY Zhang, DG Shi, YC Xu, GY Tsinghua Univ Dept Comp Sci & Technol State Key Lab Intelligence Syst & Technol Beijing 100084 Peoples R China
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called Smar... 详细信息
来源: 评论
A flexible load balancing in distributed systems
A flexible load balancing in distributed systems
收藏 引用
international conference on machine learning and Cybernetics
作者: Wang, JH Zhou, XS Shi, XA Zhan, JG Northwestern Polytech Univ Dept Comp Sci Xian 710072 Peoples R China
Although CORBA, as middleware, has emerged as a promising means of solving problems of heterogeneity (e.g. heterogeneous hardware, operating systems, programming languages, etc) in distributed environments. Undoubtedl... 详细信息
来源: 评论