咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 75 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 326 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 96 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 61 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 37 篇 仪器科学与技术
    • 27 篇 光学工程
    • 27 篇 石油与天然气工程
    • 23 篇 化学工程与技术
    • 20 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 13 篇 环境科学与工程(可...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
  • 198 篇 理学
    • 104 篇 数学
    • 66 篇 生物学
    • 46 篇 化学
    • 32 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 101 篇 管理学
    • 71 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 41 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 15 篇 特种医学
  • 14 篇 法学
    • 11 篇 社会学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 经济学
  • 1 篇 艺术学

主题

  • 79 篇 pattern recognit...
  • 48 篇 artificial intel...
  • 33 篇 computer imaging...
  • 26 篇 computer applica...
  • 25 篇 machine learning
  • 23 篇 computer vision
  • 18 篇 data mining and ...
  • 18 篇 image processing...
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 16 篇 computer systems...
  • 16 篇 layout
  • 15 篇 optical computin...
  • 15 篇 shape
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 pattern matching
  • 12 篇 computer communi...
  • 11 篇 concurrent compu...
  • 11 篇 information stor...

机构

  • 32 篇 shenyang institu...
  • 27 篇 university of ch...
  • 21 篇 shenyang institu...
  • 8 篇 chitkara univers...
  • 7 篇 school of comput...
  • 7 篇 chinese academy ...
  • 6 篇 fujian key labor...
  • 6 篇 guangdong univer...
  • 6 篇 tsinghua univers...
  • 6 篇 zhejiang univers...
  • 6 篇 central south un...
  • 6 篇 unsw sydney
  • 6 篇 university of ch...
  • 5 篇 engineering rese...
  • 5 篇 university of te...
  • 5 篇 dalian universit...
  • 5 篇 university of sy...
  • 5 篇 the 54th researc...
  • 5 篇 institute of aut...
  • 5 篇 school of engine...

作者

  • 10 篇 hornegger joachi...
  • 6 篇 zheng-guang wu
  • 6 篇 hongyi li
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 yu bihui
  • 6 篇 long cheng
  • 5 篇 yihe zhang
  • 5 篇 aiming wu
  • 5 篇 zhou xiaolei
  • 5 篇 baohua qiang
  • 5 篇 hui huang
  • 5 篇 tiwari raj gaura...
  • 5 篇 da-han wang
  • 5 篇 jing dong
  • 5 篇 ajith abraham
  • 5 篇 jiwen lu
  • 5 篇 yongjie yang
  • 5 篇 agarwal ambuj ku...
  • 5 篇 risheng liu

语言

  • 687 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"任意字段=Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition"
696 条 记 录,以下是681-690 订阅
排序:
Dual Mixed Style Augmentation for Generalized Medical Image Segmentation  23
Dual Mixed Style Augmentation for Generalized Medical Image ...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Jiaxi Li Yuntong Tian Liang Wan Academy of Medical Engineering and Translational Medicine Tianjin University China College of Intelligence and Computing Tianjin University China
Domain generalization aims to generalize models trained on source domains to unseen target domains, which usually have domain shift from the source domains. this challenging setting is common in clinical scenarios due...
来源: 评论
Graph Convolutional Network Representation Learning Method with Community-enhanced Temporal Features for Dynamic Graphs  23
Graph Convolutional Network Representation Learning Method w...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Qi Bi Jiayuan Liu Jiexing Tang school of computing Xi'an University of Posts and Telecommunications China
Dynamic graph representation learning aims at learning the low-dimensional vector representation of nodes in dynamic networks, and the learned network representation can be used for various dynamic network analysis **... 详细信息
来源: 评论
Long-short term anomaly detection in wireless sensor networks based on spatio-temporal correlation in IoT systems  23
Long-short term anomaly detection in wireless sensor network...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Zhihao Wei Meng Li Jianghao Wei Industrial Big Data Laboratory Xi'an University of Posts and Telecommunications China Nanjing University of Science and Technology China
For the large number of different information sources collected by heterogeneous wireless sensor networks, traditional anomaly detection frameworks usually focus on the data analysis itself and lack a focus on unexpec... 详细信息
来源: 评论
Activity Attribute-Based User Behavior Model for Continuous User Authentication  22
Activity Attribute-Based User Behavior Model for Continuous ...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Luthfi Azhari Ari Moesriami Barmawi School of Computing Telkom University INA
In general, authentication using a username and password has been used to manage access to the system. this way, it can be arranged so that only authorized people can access a system. However, it does not rule out the... 详细信息
来源: 评论
Attributes and Dimensions of Trust in Secure Systems  22
Attributes and Dimensions of Trust in Secure Systems
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Matthew Bradbury Daniel Prince Victoria Marcinkiewicz Tim Watson School of Computing and Communications Lancaster University UK The Centre for Artificial Intelligence Robotics and Human-Machine Systems School of Psychology Cardiff University UK The Alan Turing Institute UK
What is it to be trusted? this is an important question as trust is increasingly placed in a system and the degree to which a system is trusted is increasingly being assessed. However, there are issues with how relate... 详细信息
来源: 评论
Employing Frequency Independent Structure for Ultra-Wide Band Antenna  23
Employing Frequency Independent Structure for Ultra-Wide Ban...
收藏 引用
proceedings of the 2023 12th international conference on Software and Information Engineering
作者: Mostafa Mohamed Salah Hassan Aly Ragheb Electrical Engineering Department The British University in EgyptEl Sherouk City Misr-Ismaillia Road Egypt. Egypt and Electrical Engineering Department German International University German International University Administrative Capital Regional Ring Rd Cairo Governorate Desert Cairo Governorate Egypt Egypt Electrical Engineering Department The British University in EgyptEl Sherouk City Misr-Ismaillia Road Egypt. Egypt
the paper presents a novel and compact design for an ultra-wideband antenna based on frequency independent ethos. It consists of a Log-Periodic monopole structure with specific angle for the radiating patch with a def... 详细信息
来源: 评论
Task Allocation in Industrial Edge Networks with Particle Swarm Optimization and Deep Reinforcement Learning  22
Task Allocation in Industrial Edge Networks with Particle Sw...
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Philippe Buschmann Mostafa H. M. Shorim Max Helm Arne Bröring Georg Carle Siemens AG Germany and School of Computation Information and Technology Technical University of Munich Germany School of Computation Information and Technology Technical University of Munich Germany Siemens AG Germany
To avoid the disadvantages of a cloud-centric infrastructure, next-generation industrial scenarios focus on using distributed edge networks. Task allocation in distributed edge networks with regards to minimizing the ... 详细信息
来源: 评论
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis  22
Accelerating Command Injection Vulnerability Discovery in Em...
收藏 引用
proceedings of the 12th international conference on the Internet of things
作者: Xiaokang Yin Ruijie Cai Yizheng Zhang Lukai Li Qichao Yang Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing China
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they wa... 详细信息
来源: 评论
Instruments for sound therapy vs. music therapy for teenager's emotional development  23
Instruments for sound therapy vs. music therapy for teenager...
收藏 引用
proceedings of the 2023 12th international conference on Software and Information Engineering
作者: Valentina Mihaela Pomazan Equipment and systems/ Faculty of Mechanical Engineering Ovidius University Romania
Sound and music therapy has been used to cope with changes during this period of life. this study was conducted to determine and compare the effect of two types of therapeutic interventions. It aimed to compare the ef... 详细信息
来源: 评论
Environment-aware dynamic graph learning for out-of-distribution generalization  23
Environment-aware dynamic graph learning for out-of-distribu...
收藏 引用
proceedings of the 37th international conference on Neural Information Processing Systems
作者: Haonan Yuan Qingyun Sun Xingcheng Fu Ziwei Zhang Cheng Ji Hao Peng Jianxin Li Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University and School of Computer Science and Engineering Beihang University Key Lab of Education Blockchain and Intelligent Technology Guangxi Normal University Department of Computer Science and Technology Tsinghua University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
Dynamic graph neural networks (DGNNs) are increasingly pervasive in exploiting spatio-temporal patterns on dynamic graphs. However, existing works fail to generalize under distribution shifts, which are common in real...
来源: 评论