咨询与建议

限定检索结果

文献类型

  • 261 篇 会议
  • 30 册 图书
  • 3 篇 期刊文献

馆藏范围

  • 294 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 125 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 27 篇 信息与通信工程
    • 20 篇 电气工程
    • 20 篇 控制科学与工程
    • 14 篇 光学工程
    • 13 篇 生物工程
    • 7 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 3 篇 力学(可授工学、理...
  • 58 篇 理学
    • 36 篇 数学
    • 21 篇 物理学
    • 14 篇 生物学
    • 12 篇 统计学(可授理学、...
    • 5 篇 化学
    • 5 篇 系统科学
  • 34 篇 医学
    • 30 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 特种医学
  • 26 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 法学
    • 5 篇 社会学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 51 篇 pattern recognit...
  • 20 篇 image analysis
  • 17 篇 computer science
  • 17 篇 artificial intel...
  • 16 篇 pattern analysis
  • 14 篇 computer vision
  • 14 篇 computer imaging...
  • 13 篇 humans
  • 12 篇 neural networks
  • 11 篇 image processing...
  • 10 篇 data mining
  • 10 篇 user interfaces ...
  • 9 篇 image segmentati...
  • 9 篇 feature extracti...
  • 9 篇 image recognitio...
  • 8 篇 simulation and m...
  • 8 篇 intelligent netw...
  • 8 篇 performance anal...
  • 8 篇 control system s...
  • 7 篇 cameras

机构

  • 3 篇 computer and inf...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 lviv polytech na...
  • 3 篇 center for visua...
  • 2 篇 všb-tu ostrava 1...
  • 2 篇 wroclaw universi...
  • 2 篇 computer science...
  • 2 篇 shandong coinnov...
  • 2 篇 department of el...
  • 2 篇 carleton univ sc...
  • 2 篇 università polit...
  • 2 篇 universidad de s...
  • 2 篇 department of el...
  • 2 篇 bitrum research ...
  • 2 篇 hiroshima city u...
  • 2 篇 university of mi...
  • 2 篇 department of co...
  • 2 篇 national researc...
  • 2 篇 college of busin...

作者

  • 3 篇 shiguang shan
  • 3 篇 bao-liang lu
  • 3 篇 kamel mohamed s.
  • 3 篇 patrick s.p.wang
  • 3 篇 james kwok
  • 3 篇 yonemoto satoshi
  • 3 篇 taniguchi rin-ic...
  • 3 篇 liqing zhang
  • 2 篇 emanuele fronton...
  • 2 篇 asada n
  • 2 篇 manuel graña
  • 2 篇 filipe portela
  • 2 篇 amano a
  • 2 篇 c.v. jawahar
  • 2 篇 wang patrick
  • 2 篇 ajith abraham
  • 2 篇 junmo kim
  • 2 篇 sung-bae cho
  • 2 篇 pier luigi mazze...
  • 2 篇 hara takeshi

语言

  • 284 篇 英文
  • 7 篇 其他
  • 4 篇 中文
检索条件"任意字段=International Workshop on Intelligent Computer in Pattern Analysis/Synthesis"
294 条 记 录,以下是111-120 订阅
排序:
VISAPP 2009 - Proceedings of the 4th international Conference on computer Vision Theory and Applications
VISAPP 2009 - Proceedings of the 4th International Conferenc...
收藏 引用
4th international Conference on computer Vision Theory and Applications, VISAPP 2009
The proceedings contain 190 papers. The topics discussed include: intelligent pattern recognition and applications to biometrics in an interactive environment;digital photography for computer graphics and its applicat...
来源: 评论
VISAPP 2009 - Proceedings of the 4th international Conference on computer Vision Theory and Applications
VISAPP 2009 - Proceedings of the 4th International Conferenc...
收藏 引用
4th international Conference on computer Vision Theory and Applications, VISAPP 2009
The proceedings contain 190 papers. The topics discussed include: intelligent pattern recognition and applications to biometrics in an interactive environment;digital photography for computer graphics and its applicat...
来源: 评论
synthesis of complex images on the basis of theory of crystallographic groups
Synthesis of complex images on the basis of theory of crysta...
收藏 引用
IEEE international workshop on intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
作者: O. Berezsky G. Melnyk Yu. Batko Yu. Kurylyak Ternopil National Economic University Ternopil Ukraine
The article deals with a group-theoretical approach, which is proposed to the synthesis of symmetric and asymmetric images. It also describes algorithms of image synthesis. Integrated environment of programming Visual... 详细信息
来源: 评论
A BBN-Based Approach for Fault Localization
A BBN-Based Approach for Fault Localization
收藏 引用
international workshop on intelligent Systems and Applications, ISA
作者: Xuemei Liu Guochang Gu Yongpo Liu Ji Wu Xiaoxia Jia College of Computer Science and Technology Beijing City University Beijing Heilongjiang China School of Computer Science and Technology Beijing Aeronautics and Astronautics University Beijing China
Fault localization techniques help programmers find out the locations and the causes of the faults and accelerate the debugging process. The relation between the fault and the failure is usually complicated, making it... 详细信息
来源: 评论
Study on Mathematical morphology based vehicle license plate location
Study on Mathematical morphology based vehicle license plate...
收藏 引用
workshop on Power Electronics and intelligent Transportation System, PEITS
作者: Hui Li Pan Gao Dongxiu Wang Wangming Chen Department of Computer Engineering Guangxi University of Technology Liuzhou China Department of Computer Science and Technology East China Jiao Tong University Shanghai China
This paper presents an effective license plate location algorithm, which employs Mathematical morphology to extract the number plate from the complicated-background image. Mathematical morphology is a new method which... 详细信息
来源: 评论
Real-Time Freeway Traffic State Estimation Based on Cluster analysis and Multiclass Support Vector Machine
Real-Time Freeway Traffic State Estimation Based on Cluster ...
收藏 引用
international workshop on intelligent Systems and Applications, ISA
作者: Chao Deng Fan Wang Huimin Shi Guozhen Tan Department of Computer Dalian University of Technology Dalian China
Urban traffic state analysis plays an important role in the solution of traffic congestion problem. To estimate traffic state effectively is a foundational work for improving traffic condition and preventing traffic c... 详细信息
来源: 评论
The Writer Identification Algorithm Based on Subspace
The Writer Identification Algorithm Based on Subspace
收藏 引用
international workshop on intelligent Networks and intelligent Systems (ICINIS)
作者: Mandun Zhang Na Lu Ming Yu Xuefeng Zhou School of Computer Science and Engineering Hebei University of Technology Tianjin China CNOOC Energy Technology and Services Limited Tianjin China
A new method using feature subspace for writer identification is proposed in this paper. The current writer identification algorithms are always that the more the extraction features the better the classifier result. ... 详细信息
来源: 评论
The key points analysis about countryside information services under the Background of “Spreading computers to the Countries”
The key points analysis about countryside information servic...
收藏 引用
workshop on Power Electronics and intelligent Transportation System, PEITS
作者: Yiming Xiang Bo Jiang Yun Ling College of Computer Science & Information Engineering Zhejiang Gongshang University China
The main purpose of the promulgating the policy of "Spreading computers to the Countries" is to promote information to the countries and let farmers accept all kinds of information services. However, because... 详细信息
来源: 评论
Research of NIDS in IPV6 Based on Protocol analysis and pattern matching
Research of NIDS in IPV6 Based on Protocol analysis and Patt...
收藏 引用
2009 Second international workshop on Knowledge Discovery and Data Mining
作者: Shu-qiang Huang Network and Educational Technology Center of Jinan University School of computer Science & Engineering,South China University of Technology, Guangzhou,China Huan-ming Zhang Network and Educational Technology Center of Jinan University Guangzhou,China Guo-xiang Yao Information Science and Technology school of Jinan University Guangzhou,China
Some network intrusion security problems of IPv6 are researched and summarized In this *** this paper introduces the model of general IDS and the framework of NIDS of *** at the structure characters of IPv6 protocols,... 详细信息
来源: 评论
P2P Traffic Identification Based on the Signatures of Key Packets
P2P Traffic Identification Based on the Signatures of Key Pa...
收藏 引用
IEEE international workshop on computer-Aided Modeling, analysis, and Design of Communication Links and Networks, CAMAD
作者: Pinghui Wang Xiaohong Guan Tao Qin MOE Key Lab for Intelligent Networks and Network Security State Key Lab for Manufacturing Systems Xi''an Jiaotong University China Department of Automation Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing China
Peer-to-Peer (P2P) protocol is widely used in many network applications and P2P traffic is becoming dominating in the current Internet and may cause serious congestion. Recently, P2P applications tend to intentionally... 详细信息
来源: 评论