咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 75 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 326 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 96 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 61 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 37 篇 仪器科学与技术
    • 27 篇 光学工程
    • 27 篇 石油与天然气工程
    • 23 篇 化学工程与技术
    • 20 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 13 篇 环境科学与工程(可...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
  • 198 篇 理学
    • 104 篇 数学
    • 66 篇 生物学
    • 46 篇 化学
    • 32 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 101 篇 管理学
    • 71 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 41 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 15 篇 特种医学
  • 14 篇 法学
    • 11 篇 社会学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 经济学
  • 1 篇 艺术学

主题

  • 79 篇 pattern recognit...
  • 48 篇 artificial intel...
  • 33 篇 computer imaging...
  • 26 篇 computer applica...
  • 25 篇 machine learning
  • 23 篇 computer vision
  • 18 篇 data mining and ...
  • 18 篇 image processing...
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 16 篇 computer systems...
  • 16 篇 layout
  • 15 篇 optical computin...
  • 15 篇 shape
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 pattern matching
  • 12 篇 computer communi...
  • 11 篇 concurrent compu...
  • 11 篇 information stor...

机构

  • 32 篇 shenyang institu...
  • 27 篇 university of ch...
  • 21 篇 shenyang institu...
  • 8 篇 chitkara univers...
  • 7 篇 school of comput...
  • 7 篇 chinese academy ...
  • 6 篇 fujian key labor...
  • 6 篇 guangdong univer...
  • 6 篇 tsinghua univers...
  • 6 篇 zhejiang univers...
  • 6 篇 central south un...
  • 6 篇 unsw sydney
  • 6 篇 university of ch...
  • 5 篇 engineering rese...
  • 5 篇 university of te...
  • 5 篇 dalian universit...
  • 5 篇 university of sy...
  • 5 篇 the 54th researc...
  • 5 篇 institute of aut...
  • 5 篇 school of engine...

作者

  • 10 篇 hornegger joachi...
  • 6 篇 zheng-guang wu
  • 6 篇 hongyi li
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 yu bihui
  • 6 篇 long cheng
  • 5 篇 yihe zhang
  • 5 篇 aiming wu
  • 5 篇 zhou xiaolei
  • 5 篇 baohua qiang
  • 5 篇 hui huang
  • 5 篇 tiwari raj gaura...
  • 5 篇 da-han wang
  • 5 篇 jing dong
  • 5 篇 ajith abraham
  • 5 篇 jiwen lu
  • 5 篇 yongjie yang
  • 5 篇 agarwal ambuj ku...
  • 5 篇 risheng liu

语言

  • 687 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"任意字段=Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition"
696 条 记 录,以下是681-690 订阅
排序:
Attributes and Dimensions of Trust in Secure Systems  22
Attributes and Dimensions of Trust in Secure Systems
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Matthew Bradbury Daniel Prince Victoria Marcinkiewicz Tim Watson School of Computing and Communications Lancaster University UK The Centre for Artificial Intelligence Robotics and Human-Machine Systems School of Psychology Cardiff University UK The Alan Turing Institute UK
What is it to be trusted? this is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how relate... 详细信息
来源: 评论
Identity-based Linkable Blind Ring Signature Scheme on Lattice  22
Identity-based Linkable Blind Ring Signature Scheme on Latti...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Xue Liao Yihua Zhou Jiawei Xu Shuaikun Xing Wei Zou Jin Zhou Qi Wang Zhenhu Ning faculty of Information Technology Beijing University of Technology China Trusted Computing Technology Co.LTD Shenzhen China
Identity-based link-ring signature schemes are widely used in e-commerce, e-voting, blockchain security and other *** link-ability of signature scheme ensures that the same user can only sign once with the same privat... 详细信息
来源: 评论
VRGNet: A Robust Visible Region-Guided Network for Occluded Pedestrian Detection  22
VRGNet: A Robust Visible Region-Guided Network for Occluded ...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Xin Mao Chaoqi Yan Hong Zhang Jianbo Song Ding Yuan The 613th Research Institute of AVIC China Image Processing Center School of Astronautics Beihang University China
Pedestrian detection has made significant progress in both academic and industrial fields. However, there are still some challenging questions with regard to occlusion scene. In this paper, we propose a novel and robu... 详细信息
来源: 评论
Dual Mixed Style Augmentation for Generalized Medical Image Segmentation  23
Dual Mixed Style Augmentation for Generalized Medical Image ...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Jiaxi Li Yuntong Tian Liang Wan Academy of Medical Engineering and Translational Medicine Tianjin University China College of Intelligence and Computing Tianjin University China
Domain generalization aims to generalize models trained on source domains to unseen target domains, which usually have domain shift from the source domains. this challenging setting is common in clinical scenarios due...
来源: 评论
Graph Convolutional Network Representation Learning Method with Community-enhanced Temporal Features for Dynamic Graphs  23
Graph Convolutional Network Representation Learning Method w...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Qi Bi Jiayuan Liu Jiexing Tang school of computing Xi'an University of Posts and Telecommunications China
Dynamic graph representation learning aims at learning the low-dimensional vector representation of nodes in dynamic networks, and the learned network representation can be used for various dynamic network analysis **... 详细信息
来源: 评论
Employing Frequency Independent Structure for Ultra-Wide Band Antenna  23
Employing Frequency Independent Structure for Ultra-Wide Ban...
收藏 引用
proceedings of the 2023 12th international conference on Software and Information Engineering
作者: Mostafa Mohamed Salah Hassan Aly Ragheb Electrical Engineering Department The British University in EgyptEl Sherouk City Misr-Ismaillia Road Egypt. Egypt and Electrical Engineering Department German International University German International University Administrative Capital Regional Ring Rd Cairo Governorate Desert Cairo Governorate Egypt Egypt Electrical Engineering Department The British University in EgyptEl Sherouk City Misr-Ismaillia Road Egypt. Egypt
the paper presents a novel and compact design for an ultra-wideband antenna based on frequency independent ethos. It consists of a Log-Periodic monopole structure with specific angle for the radiating patch with a def... 详细信息
来源: 评论
Instruments for sound therapy vs. music therapy for teenager's emotional development  23
Instruments for sound therapy vs. music therapy for teenager...
收藏 引用
proceedings of the 2023 12th international conference on Software and Information Engineering
作者: Valentina Mihaela Pomazan Equipment and systems/ Faculty of Mechanical Engineering Ovidius University Romania
Sound and music therapy has been used to cope with changes during this period of life. this study was conducted to determine and compare the effect of two types of therapeutic interventions. It aimed to compare the ef... 详细信息
来源: 评论
Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement Learning  22
Task Allocation in Industrial Edge Networks with Particle Sw...
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Philippe Buschmann Mostafa H. M. Shorim Max Helm Arne Bröring Georg Carle Siemens AG Germany and School of Computation Information and Technology Technical University of Munich Germany School of Computation Information and Technology Technical University of Munich Germany Siemens AG Germany
To avoid the disadvantages of a cloud-centric infrastructure, next-generation industrial scenarios focus on using distributed edge networks. Task allocation in distributed edge networks with regards to minimizing the ... 详细信息
来源: 评论
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis  22
Accelerating Command Injection Vulnerability Discovery in Em...
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Xiaokang Yin Ruijie Cai Yizheng Zhang Lukai Li Qichao Yang Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing China
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they wa... 详细信息
来源: 评论
Video Forgery Detection Using Spatio-Temporal Dual Transformer  22
Video Forgery Detection Using Spatio-Temporal Dual Transform...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Chenyu Liu Jia Li Junxian Duan Huaibo Huang Center for Research on IntelligentPerception and Computing Institute of Automation Chinese Academy of Sciences China
the fake videos generated by deep generation technology pose a potential threat to social stability, which makes it critical to detect fake videos. Although the previous detection methods have achieved high accuracy, ... 详细信息
来源: 评论