咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 7 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 628 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 326 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 96 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 61 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 37 篇 仪器科学与技术
    • 27 篇 光学工程
    • 27 篇 石油与天然气工程
    • 23 篇 化学工程与技术
    • 20 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 13 篇 环境科学与工程(可...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
  • 198 篇 理学
    • 104 篇 数学
    • 66 篇 生物学
    • 46 篇 化学
    • 32 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 101 篇 管理学
    • 71 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 41 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 15 篇 特种医学
  • 14 篇 法学
    • 11 篇 社会学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 经济学
  • 1 篇 艺术学

主题

  • 53 篇 pattern recognit...
  • 23 篇 computer vision
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 16 篇 layout
  • 15 篇 optical computin...
  • 15 篇 shape
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 pattern matching
  • 11 篇 concurrent compu...
  • 11 篇 machine learning
  • 10 篇 face recognition
  • 10 篇 image motion ana...
  • 10 篇 image analysis
  • 9 篇 object detection
  • 9 篇 neural networks
  • 9 篇 cameras
  • 9 篇 edge computing
  • 9 篇 cloud computing

机构

  • 32 篇 shenyang institu...
  • 27 篇 university of ch...
  • 21 篇 shenyang institu...
  • 8 篇 chitkara univers...
  • 7 篇 school of comput...
  • 6 篇 fujian key labor...
  • 6 篇 university of ch...
  • 5 篇 engineering rese...
  • 5 篇 the 54th researc...
  • 5 篇 school of engine...
  • 5 篇 school of comput...
  • 4 篇 shenyang institu...
  • 4 篇 faculty of infor...
  • 3 篇 international in...
  • 3 篇 guilin universit...
  • 3 篇 graphic era hill...
  • 3 篇 hebei key labora...
  • 3 篇 school of comput...
  • 3 篇 pattern recognit...
  • 3 篇 shenyang casnc t...

作者

  • 10 篇 hornegger joachi...
  • 6 篇 yu bihui
  • 5 篇 yihe zhang
  • 5 篇 aiming wu
  • 5 篇 zhou xiaolei
  • 5 篇 baohua qiang
  • 5 篇 tiwari raj gaura...
  • 5 篇 da-han wang
  • 5 篇 yongjie yang
  • 5 篇 agarwal ambuj ku...
  • 5 篇 shanshan tu
  • 5 篇 wang ning
  • 5 篇 xuetao bai
  • 4 篇 comaniciu dorin
  • 4 篇 maheshwari himan...
  • 4 篇 shunzhi zhu
  • 4 篇 zaharis zaharias...
  • 4 篇 wang hongliang
  • 4 篇 zhang yonghong
  • 4 篇 jain vishal

语言

  • 619 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"任意字段=Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition"
628 条 记 录,以下是371-380 订阅
排序:
Camera-Based Meal Type and Weight Estimation in Self-Service Lunch Line Restaurants
Camera-Based Meal Type and Weight Estimation in Self-Service...
收藏 引用
pattern recognition Systems (ICPRS), international conference on
作者: Teemu Sarapisto Lauri Koivunen Tuomas Mä kilä Arto Klami Pauliina Ojansivu Dept. of Computer Science University of Helsinki Helsinki Finland Dept. of Computing University of Turku Turku Finland
Individuals, restaurant owners and health organizations are all interested in accurate information about food intake, but collecting the information in sufficiently automated way remains a practical challenge. In cont... 详细信息
来源: 评论
A Model robustness optimization method based on adversarial sample detection  22
A Model robustness optimization method based on adversarial ...
收藏 引用
proceedings of the 2022 5th international conference on Artificial Intelligence and pattern recognition
作者: Jiaze Sun Siyuan Long Xianyan Ma Yanmei Tang Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts & Telecommunications China Xi'an University of Posts & Telecommunications China
Deep neural networks are extremely vulnerable due to the existence of adversarial samples. It is a challenging problem to optimize the robustness of the model to protect deep neural networks from the threat of adversa... 详细信息
来源: 评论
Robust Object Detection and Tracking Model for Visually Impaired People Using Deep Convolution Neural Network Model
Robust Object Detection and Tracking Model for Visually Impa...
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), international conference on
作者: R. Priyanka K. Vivekrabinson A. Kathijanasreen W T Chembian Atharvaa Veerasundar Srimathi S Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of CSE Kalasalingam Academy of Research and Education Krishnankoil CSE department R.M.K College of Engineering and Technology Department of CSE Vel Tech High Tech Dr. Rangarajan Dr.Sakuntala Engineering College 12th Greenwood High International High School Bengaluru Department of Bio Technology Saveetha School of Engineering SIMATS Chennai Tamilnadu India
Visual Impairment (VI) has become the most significant challenge over the past few years. Even to complete their day-to-day activities, visually impaired persons seek assistance. A currency recognition system and auto...
来源: 评论
Anomaly Handwritten Text Detection for Automatic Descriptive Answer Evaluation  22
Anomaly Handwritten Text Detection for Automatic Descriptive...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Nilanjana Chatterjee Palaiahnaakote Shivakumara Umapada Pal Tong Lu Yue Lu Computer Vision and Pattern Recognition Unit Indian Statistical Institute India Faculty of Computer Science and Information Technology University of Malaya Malaysia National Key Lab for Novel Software Technology Nanjing University China Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University China
Although there are advanced technologies for character recognition, automatic descriptive answer evaluation is an open challenge for the document image analysis community due to large diversified handwritten text and ...
来源: 评论
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios  22
Embedded Real-time System Trusted Protection Technology for ...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Jin Zhou Zhenhu Ning Qi Wang Yuchen Wang faculty of Information Technology Beijing University Of Technology China Trusted Computing Technology Co.LTD Shenzhen China
Embedded real-time operating systems are widely used in communication, industrial control and weapon intelligent control and other fields. However, due to the complex personnel and environment involved in the developm...
来源: 评论
Identity-based Linkable Blind Ring Signature Scheme on Lattice  22
Identity-based Linkable Blind Ring Signature Scheme on Latti...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Xue Liao Yihua Zhou Jiawei Xu Shuaikun Xing Wei Zou Jin Zhou Qi Wang Zhenhu Ning faculty of Information Technology Beijing University of Technology China Trusted Computing Technology Co.LTD Shenzhen China
Identity-based link-ring signature schemes are widely used in e-commerce, e-voting, blockchain security and other *** link-ability of signature scheme ensures that the same user can only sign once with the same privat... 详细信息
来源: 评论
VRGNet: A Robust Visible Region-Guided Network for Occluded Pedestrian Detection  22
VRGNet: A Robust Visible Region-Guided Network for Occluded ...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Xin Mao Chaoqi Yan Hong Zhang Jianbo Song Ding Yuan The 613th Research Institute of AVIC China Image Processing Center School of Astronautics Beihang University China
Pedestrian detection has made significant progress in both academic and industrial fields. However, there are still some challenging questions with regard to occlusion scene. In this paper, we propose a novel and robu... 详细信息
来源: 评论
Activity Attribute-Based User Behavior Model for Continuous User Authentication  22
Activity Attribute-Based User Behavior Model for Continuous ...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Luthfi Azhari Ari Moesriami Barmawi School of Computing Telkom University INA
In general, authentication using a username and password has been used to manage access to the system. this way, it can be arranged so that only authorized people can access a system. However, it does not rule out the... 详细信息
来源: 评论
Attributes and Dimensions of Trust in Secure Systems  22
Attributes and Dimensions of Trust in Secure Systems
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Matthew Bradbury Daniel Prince Victoria Marcinkiewicz Tim Watson School of Computing and Communications Lancaster University UK The Centre for Artificial Intelligence Robotics and Human-Machine Systems School of Psychology Cardiff University UK The Alan Turing Institute UK
What is it to be trusted? this is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how relate... 详细信息
来源: 评论
Exploration of Congestion Control Techniques on Dragonfly-class HPC Networks through Simulation  12
Exploration of Congestion Control Techniques on Dragonfly-cl...
收藏 引用
12th international Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems held as part of the 33rd ACM/IEEE international conference for High Performance computing, Networking, Storage and Analysis
作者: McGlohon, Neil Hemmert, K. Scott Brown, Kevin A. Levenhagen, Michael Chunduri, Sudheer Ross, Robert B. Carothers, Christopher D. Rensselaer Polytech Inst Troy NY 12180 USA Sandia Natl Labs POB 5800 Albuquerque NM 87185 USA Argonne Natl Lab Lemont IL USA
Ensuring optimal conununication latency in High Perfonnance computing (HPC) networks is of critical importance to the efficient operation of facilitated applications. Different application operations and types of task... 详细信息
来源: 评论