咨询与建议

限定检索结果

文献类型

  • 186 篇 会议
  • 112 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 214 篇 工学
    • 141 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 59 篇 信息与通信工程
    • 41 篇 光学工程
    • 30 篇 生物工程
    • 25 篇 生物医学工程(可授...
    • 24 篇 控制科学与工程
    • 20 篇 机械工程
    • 10 篇 化学工程与技术
    • 9 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 电气工程
    • 6 篇 建筑学
    • 5 篇 安全科学与工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 4 篇 交通运输工程
  • 136 篇 理学
    • 61 篇 数学
    • 56 篇 物理学
    • 32 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 11 篇 化学
    • 8 篇 系统科学
  • 56 篇 管理学
    • 41 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
  • 10 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 药学(可授医学、理...
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 17 篇 feature extracti...
  • 15 篇 image segmentati...
  • 15 篇 convolution
  • 13 篇 semantics
  • 12 篇 image reconstruc...
  • 11 篇 computer vision
  • 10 篇 image edge detec...
  • 9 篇 image color anal...
  • 8 篇 face recognition
  • 7 篇 generative adver...
  • 7 篇 three-dimensiona...
  • 7 篇 face
  • 7 篇 training
  • 6 篇 pixels
  • 6 篇 shape
  • 5 篇 writing
  • 5 篇 pattern recognit...
  • 4 篇 image enhancemen...
  • 4 篇 support vector m...
  • 4 篇 semantic segment...

机构

  • 40 篇 university of ch...
  • 40 篇 shenzhen key lab...
  • 31 篇 national key lab...
  • 31 篇 computer vision ...
  • 26 篇 shenzhen key lab...
  • 22 篇 faculty of compu...
  • 21 篇 siat branch shen...
  • 19 篇 shanghai ai labo...
  • 16 篇 sensetime resear...
  • 16 篇 shenzhen key lab...
  • 11 篇 shanghai artific...
  • 8 篇 shanghai ai lab
  • 8 篇 the chinese univ...
  • 7 篇 department of st...
  • 7 篇 the university o...
  • 6 篇 shanghai jiao to...
  • 6 篇 shenzhen key lab...
  • 6 篇 university of ma...
  • 6 篇 guangzhou power ...
  • 5 篇 arc lab tencent ...

作者

  • 59 篇 qiao yu
  • 27 篇 yu qiao
  • 27 篇 dong chao
  • 19 篇 pal umapada
  • 17 篇 umapada pal
  • 17 篇 wang yali
  • 17 篇 lu tong
  • 16 篇 tong lu
  • 16 篇 palaiahnakote sh...
  • 15 篇 maier andreas
  • 15 篇 shivakumara pala...
  • 11 篇 chao dong
  • 10 篇 he junjun
  • 9 篇 chen xiangyu
  • 9 篇 gu jinjin
  • 9 篇 peng xiaojiang
  • 8 篇 chen shifeng
  • 8 篇 ren jimmy s.
  • 7 篇 blumenstein mich...
  • 7 篇 zhou zhipeng

语言

  • 292 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Vision and Pattern Recognition Lab."
299 条 记 录,以下是121-130 订阅
排序:
Multiple objects segmentation based on Maximum-likelihood Estimation and Optimum Entropy-distribution(MLE-OED)
Proceedings - International Conference on Pattern Recognitio...
收藏 引用
Proceedings - International Conference on pattern recognition 2002年 第1期16卷 707-710页
作者: Jun, Xie Tsui, H.T. Deshen, Xia Image Processing and Computer Vision Lab Department of Electronic Engineering Chinese University of Hong Kong Hong Kong Pattern Recognition Lab Department of Computer Science Nanjing University of Sci. and Tech. China
A new method based on MLE-OED is proposed for unsupervised image segmentation of multiple objects which have fuzzy edges. It adjusts the parameters of a mixture of Gaussian distributions via minimizing a new loss func... 详细信息
来源: 评论
Reduced memory zerotree envelop coding for wavelet image
Reduced memory zerotree envelop coding for wavelet image
收藏 引用
MIPPR 2007: Automatic Target recognition and Image Analysis;and Multispectral Image Acquisition
作者: Wentao, Wang Guoyou, Wang Jianguo, Liu State Key Lab. for Multi-spectral Information Processing Technologies Institute for Pattern Recognition and Artificial Intelligence Huazhong University of Science and Technology Wuhan 430074 China College of Computer Science South-Central University for Nationalities 708 Minyuan Road Wuhan 430074 China
In this paper, we propose a new image codec, which called embedded zerotree wavelet coefficients envelop coding (EZWCEC). The coefficients envelop is characterized by describing the global tendency of the significant ... 详细信息
来源: 评论
Fast template matching with partial skipping using sub-template
Fast template matching with partial skipping using sub-templ...
收藏 引用
2012 3rd IEEE/IET International Conference on Audio, Language and Image Processing, ICALIP 2012
作者: Zhang, Qiao Gao, Huijie Kang, Zhen State Key Lab. of Multi-spectral Information Processing Technology Institute for Pattern Recognition and Artificial Intelligence Huazhong Univ. of Sci. and Tech. Wuhan 430074 China School of Mathematic and Computer Science Wuhan Polytechnic University Wuhan 430023 China
This paper presents a new fast template matching method with partial skipping using sub-template. In this method, we use sub-template to search point by point in the current searched window, and compare every SAD with... 详细信息
来源: 评论
Non-deterministic behavior of ranking-based metrics when evaluating embeddings
arXiv
收藏 引用
arXiv 2018年
作者: Nicolaou, Anguelos Dey, Sounak Christlein, Vincent Maier, Andreas Karatzas, Dimosthenis Computer Vision Center Edificio O Campus UAB Bellaterra08193 Spain Pattern Recognition Lab Friedrich-Alexander-Universitat Erlangen-Nurnberg
Embedding data into vector spaces is a very popular strategy of pattern recognition methods. When distances between embeddings are quantized, performance metrics become ambiguous. In this paper, we present an analysis... 详细信息
来源: 评论
DF2Net: A Dense-Fine-Finer Network for Detailed 3D Face Reconstruction
DF2Net: A Dense-Fine-Finer Network for Detailed 3D Face Reco...
收藏 引用
International Conference on computer vision (ICCV)
作者: Xiaoxing Zeng Xiaojiang Peng Yu Qiao ShenZhen Key Lab of Computer Vision and Pattern Recognition SIAT-SenseTime Joint Lab Shenzhen Institutes of Advanced Technology University of Chinese Academy of Sciences China
Reconstructing the detailed geometric structure from a single face image is a challenging problem due to its ill-posed nature and the fine 3D structures to be recovered. This paper proposes a deep Dense-Fine-Finer Net... 详细信息
来源: 评论
Local gradient difference features for classification of 2D-3D natural scene text images  25
Local gradient difference features for classification of 2D-...
收藏 引用
25th International Conference on pattern recognition, ICPR 2020
作者: Nandanwar, Lokesh Shivakumara, Palaiahnakote Raghavendra, Ramachandra Lu, Tong Pal, Umapada Lopresti, Daniel Anuar, Nor Badrul Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Faculty of Information Technology and Electrical Engineering IIK NTNU Norway National Key Lab for Novel Software Technology Nanjing University Nanjing China Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India Computer Science and Engineering Lehigh University BethlehemPA United States
Methods developed for normal 2D text detection do not work well for text that is rendered using decorative, 3D effects, etc. This paper proposes a new method for classification of 2D and 3D natural scene text images s... 详细信息
来源: 评论
Anomaly Handwritten Text Detection for Automatic Descriptive Answer Evaluation  11
Anomaly Handwritten Text Detection for Automatic Descriptive...
收藏 引用
11th International Conference on Computing and pattern recognition, ICCPR 2022
作者: Chatterjee, Nilanjana Shivakumara, Palaiahnaakote Pal, Umapada Lu, Tong Lu, Yue Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia National Key Lab for Novel Software Technology Nanjing University Nanjing China Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai China
Although there are advanced technologies for character recognition, automatic descriptive answer evaluation is an open challenge for the document image analysis community due to large diversified handwritten text and ... 详细信息
来源: 评论
PA3D: Pose-Action 3D Machine for Video recognition
PA3D: Pose-Action 3D Machine for Video Recognition
收藏 引用
IEEE/CVF Conference on computer vision and pattern recognition
作者: An Yan Yali Wang Zhifeng Li Yu Qiao Shenzhen Key Lab of Computer Vision and Pattern Recognition SIAT-SenseTime Joint Lab Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Tencent AI Lab
Recent studies have witnessed the successes of using 3D CNNs for video action recognition. However, most 3D models are built upon RGB and optical flow streams, which may not fully exploit pose dynamics, i.e., an impor... 详细信息
来源: 评论
Word-Wise Handwriting Based Gender Identification Using Multi-Gabor Response Fusion  4th
Word-Wise Handwriting Based Gender Identification Using Mult...
收藏 引用
4th Workshop on Document Analysis and recognition, DAR 2018, held in Conjunction with the 11th Indian Conference on vision, Graphics, and Image Processing, ICVGIP 2018
作者: Asadzadeh Kaljahi, Maryam Vidya Varshini, P.V. Shivakumara, Palaiahnakote Pal, Umapada Lu, Tong Guru, D.S. Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Vellore Institute of Technology VelloreTamil Nadu India Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India National Key Lab for Novel Software Technology Nanjing University Nanjing China Department of Studies in Computer Science Manasagangotri University of Mysuru Mysore India
Handwriting based gender identification at the word level is challenging due to free style writing, use of different scripts, and inadequate information. This paper presents a new method based on Multi-Gabor Response ... 详细信息
来源: 评论
Dynamic Feature Queue for Surveillance Face Anti-spoofing via Progressive Training
Dynamic Feature Queue for Surveillance Face Anti-spoofing vi...
收藏 引用
IEEE computer Society Conference on computer vision and pattern recognition Workshops (CVPRW)
作者: Keyao Wang Mouxiao Huang Guosheng Zhang Haixiao Yue Gang Zhang Yu Qiao Department of Computer Vision Technology (VIS) Baidu Inc. ShenZhen Key Lab of Computer Vision and Pattern Recognition Shenzhen Institute of Advanced Technology Chinese Academy of Sciences University of Chinese Academy of Sciences
In recent years, face recognition systems have faced increasingly security threats, making it essential to employ Face Anti-spoofing (FAS) to protect against various types of attacks in traditional scenarios like phon...
来源: 评论