咨询与建议

限定检索结果

文献类型

  • 612 篇 会议
  • 74 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 326 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 96 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 61 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 37 篇 仪器科学与技术
    • 27 篇 光学工程
    • 27 篇 石油与天然气工程
    • 23 篇 化学工程与技术
    • 20 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 13 篇 环境科学与工程(可...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
  • 198 篇 理学
    • 104 篇 数学
    • 66 篇 生物学
    • 46 篇 化学
    • 32 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 101 篇 管理学
    • 71 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 41 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 15 篇 特种医学
  • 14 篇 法学
    • 11 篇 社会学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 经济学
  • 1 篇 艺术学

主题

  • 79 篇 pattern recognit...
  • 48 篇 artificial intel...
  • 32 篇 computer imaging...
  • 26 篇 computer applica...
  • 25 篇 machine learning
  • 23 篇 computer vision
  • 18 篇 data mining and ...
  • 18 篇 image processing...
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 16 篇 computer systems...
  • 16 篇 layout
  • 15 篇 optical computin...
  • 15 篇 shape
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 pattern matching
  • 12 篇 computer communi...
  • 11 篇 concurrent compu...
  • 11 篇 information stor...

机构

  • 32 篇 shenyang institu...
  • 27 篇 university of ch...
  • 21 篇 shenyang institu...
  • 8 篇 chitkara univers...
  • 7 篇 school of comput...
  • 7 篇 chinese academy ...
  • 6 篇 fujian key labor...
  • 6 篇 guangdong univer...
  • 6 篇 tsinghua univers...
  • 6 篇 zhejiang univers...
  • 6 篇 central south un...
  • 6 篇 unsw sydney
  • 6 篇 university of ch...
  • 5 篇 engineering rese...
  • 5 篇 university of te...
  • 5 篇 dalian universit...
  • 5 篇 university of sy...
  • 5 篇 the 54th researc...
  • 5 篇 institute of aut...
  • 5 篇 school of engine...

作者

  • 10 篇 hornegger joachi...
  • 6 篇 zheng-guang wu
  • 6 篇 hongyi li
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 yu bihui
  • 6 篇 long cheng
  • 5 篇 yihe zhang
  • 5 篇 aiming wu
  • 5 篇 zhou xiaolei
  • 5 篇 baohua qiang
  • 5 篇 hui huang
  • 5 篇 tiwari raj gaura...
  • 5 篇 da-han wang
  • 5 篇 jing dong
  • 5 篇 ajith abraham
  • 5 篇 jiwen lu
  • 5 篇 yongjie yang
  • 5 篇 agarwal ambuj ku...
  • 5 篇 risheng liu

语言

  • 686 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"任意字段=Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition"
691 条 记 录,以下是651-660 订阅
排序:
Task Offloading Strategy in Satellite Edge computing Based on Matching Game  23
Task Offloading Strategy in Satellite Edge Computing Based o...
收藏 引用
proceedings of the 2023 12th international conference on Networks, Communication and computing
作者: Hufan Cao Houpeng Wang Tao Wu Zhonglin Guo Suzhi Cao China University of Chinese Academy of Sciences China Beijing Institute of Control and Electronic Technology China Technology and Engineering Center for Space Utilization Chinese Academy of Sciences China
the Low Earth Orbit (LEO) satellite network, serving as a vital complement to the terrestrial backbone network, has emerged as a prospective path for future mobile communication systems, owing to its extensive coverag...
来源: 评论
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog computing Networks  22
Deep Reinforcement Learning-Based Computation Offloading for...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Yongjie Yang Shanshan Tu Haishuang Yan Yihe Zhang Aiming Wu Xuetao Bai Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile (Suzhou) Software Technology Co. Ltd. China Mobile (Suzhou) Software Technology Co. Ltd. China
With the rapid development of IoT and fog computing, mobile devices can offload computing tasks into the fog layer to reduce energy consumption and transmission delay. However, the communication between fog nodes and ... 详细信息
来源: 评论
Key Points Positioning: A Two-Stage Algorithm For Single-view Point Cloud of Human Back Based on Point-wise Network  22
Key Points Positioning: A Two-Stage Algorithm For Single-vie...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Nan Dong Xinfeng Zhang Xiaomin Liu Wei Guo Fei Wang Beijing University of Technology China Air Force Medical Center PLA China
Point cloud data is a collection of massive points containing the spatial position of each point on the target surface, which contains abundant spatial information. At present, it is also applied to the digital modeli... 详细信息
来源: 评论
A Lightweight Brain Tumor Segmentation Network Based on 3D Inverted Residual Modules  22
A Lightweight Brain Tumor Segmentation Network Based on 3D I...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Yuchao Liu Xia Du Da-Han Wang Shunzhi Zhu Fujian Key Laboratory of Pattern Recognition and Image Understanding Xiamen University of Technology China
Semantic segmentation technology based on deep learning has played an important role for doctors in identifying brain tumor regions and formulating treatment plans. Popular automated segmentation methods for brain tum...
来源: 评论
A Real-Time Voice Conversion Method Based on A Non-Parallel Corpus for Training  22
A Real-Time Voice Conversion Method Based on A Non-Parallel ...
收藏 引用
proceedings of the 2022 11th international conference on Networks, Communication and computing
作者: Yang Li Tong Nie Yucheng Shao Zesheng Zhu Tian Yang Shengnan Zhang Ze Zhu Fang Zhang High-tech Institute FanGong-ting South Street on the 12th China
Voice conversion (VC) is a modification of a person's voice to imitate a certain target person. Real-time VC can be widely used in confidential communication, voice enhancement, speech synthesis, and other fields,...
来源: 评论
Verifiable Conditional Broadcast Proxy Re-encryption Based on Certificateless Public Key Scheme  23
Verifiable Conditional Broadcast Proxy Re-encryption Based o...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Sheping Zhai Xianjing Lu Haonan Nie Rui Yang Department of computing Xi'an University of Posts&Telecommunications China
Conditional broadcast proxy re-encryption can grant fine-grained authorization to ciphertext based on conditions. Most existing schemes are based on public key infrastructure or identity public keys, which poses issue...
来源: 评论
Towards Industrial Control from the Edge-Cloud: A Structural Analysis of Adoption Challenges According to Industrial Experts  22
Towards Industrial Control from the Edge-Cloud: A Structural...
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Marco Giani Nelly Frank Alexander Verl Robert Bosch GmbH: Corporate Sector Research and Advance Engineering Germany University of Stuttgart: Institute for Control Engineering of Machine Tools and Manufacturing Units Germany
the migration of industrial controls to an edge-cloud hosted on factory premises can reduce operation costs and increase the interoperability and flexibility of industrial machines. However, the adoption of Industrial... 详细信息
来源: 评论
SPoW: A solution to the problem of centralization of computing power  22
SPoW: A solution to the problem of centralization of computi...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Xuetao Bai Shanshan Tu Haishuang Yan Yongjie Yang Aiming Wu Yihe Zhang Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile(SuZhou) Software Technology Co. Ltd China Mobile(SuZhou) Software Technology Co.Ltd China
As the underlying data structure of encrypted digital currency, blockchain technology has become the key technology of current research because of its decentralization characteristics. Engineers and scholars from indu... 详细信息
来源: 评论
Performance Optimization Blockchain-Enabled Fog computing with Deep Reinforcement Learning  22
Performance Optimization Blockchain-Enabled Fog Computing wi...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Yihe Zhang Shanshan Tu Shengju Zhang Yongjie Yang Aiming Wu Xuetao Bai Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile (Suzhou) Software Technology Co. Ltd China Mobile (Suzhou) Software Technology Co. Ltd China
With the rapid development of Internet of things technology and cloud computing technology, Fog computing emerges with the demand of distributed and decentralized. Blockchain is considered to be an advanced technology... 详细信息
来源: 评论
Computation Offloading in Mobile Edge computing-Enabled Blockchain using Matching and Contract theory  23
Computation Offloading in Mobile Edge Computing-Enabled Bloc...
收藏 引用
proceedings of the 2023 12th international conference on Networks, Communication and computing
作者: Yijun Li Liming Chen Wenjie Zhang Yifeng Zheng Ziqiong Lin School of Computer Sciences Minnan Normal University China Zhangzhou Afffliated Hospital of Fujian Medical University China
the application of blockchain technology on mobile devices requires significant computing resources. However, the limited capacity of mobile devices cannot meet the high computing power requirements of blockchain tech...
来源: 评论