咨询与建议

限定检索结果

文献类型

  • 51 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 39 篇 计算机科学与技术...
    • 35 篇 软件工程
    • 11 篇 光学工程
    • 10 篇 信息与通信工程
    • 8 篇 生物工程
    • 7 篇 机械工程
    • 6 篇 生物医学工程(可授...
    • 4 篇 控制科学与工程
    • 3 篇 电气工程
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
  • 27 篇 理学
    • 16 篇 数学
    • 11 篇 物理学
    • 9 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
  • 16 篇 管理学
    • 9 篇 图书情报与档案管...
    • 5 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...

主题

  • 4 篇 feature extracti...
  • 3 篇 object detection
  • 3 篇 face recognition
  • 3 篇 image retrieval
  • 2 篇 image enhancemen...
  • 2 篇 support vector m...
  • 2 篇 proposals
  • 2 篇 long short-term ...
  • 2 篇 image segmentati...
  • 2 篇 companies
  • 2 篇 cameras
  • 2 篇 multimedia syste...
  • 2 篇 visualization
  • 2 篇 semantics
  • 2 篇 entropy
  • 2 篇 pipelines
  • 2 篇 image analysis
  • 2 篇 equations
  • 2 篇 telecommunicatio...
  • 2 篇 training

机构

  • 13 篇 tianjin key lab....
  • 11 篇 key laboratory o...
  • 10 篇 multimedia compu...
  • 4 篇 multimedia compu...
  • 2 篇 school of mathem...
  • 2 篇 university of sc...
  • 2 篇 fx palo alto lab...
  • 2 篇 department of co...
  • 2 篇 multimedia infor...
  • 2 篇 department of ps...
  • 2 篇 multimedia compu...
  • 2 篇 multimedia compu...
  • 2 篇 school of inform...
  • 2 篇 indian institute...
  • 2 篇 vision-computing...
  • 2 篇 ctr. for multime...
  • 2 篇 intelligent comp...
  • 2 篇 gfk verein nurem...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...

作者

  • 10 篇 rainer lienhart
  • 10 篇 lienhart rainer
  • 5 篇 zhang degan
  • 5 篇 harzig philipp
  • 4 篇 christian eggert
  • 3 篇 romberg stefan
  • 3 篇 dan zecha
  • 3 篇 zecha dan
  • 3 篇 tripathi satish ...
  • 3 篇 christoph lassne...
  • 2 篇 yang zhican
  • 2 篇 xudong li
  • 2 篇 xiawu zheng
  • 2 篇 loy chen change
  • 2 篇 jingyuan zheng
  • 2 篇 yi liang
  • 2 篇 brehm stephan
  • 2 篇 chen yan-ying
  • 2 篇 yutao liu
  • 2 篇 kaiser carolin

语言

  • 70 篇 英文
  • 3 篇 中文
检索条件"机构=Multimedia Computing and Computer Vision Lab."
73 条 记 录,以下是31-40 订阅
排序:
ProxiTalk: Activate speech input by bringing smartphone to the mouth
收藏 引用
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2019年 第3期3卷 1-25页
作者: Yang, Zhican Yu, Chun Zheng, Fengshi Shi, Yuanchun Key Laboratory of Pervasive Computing Ministry of Education Beijing Key Lab. of Networked Multimedia Beijing National Research Center for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing100084 China
Speech input, such as voice assistant and voice message, is an attractive interaction option for mobile users today. However, despite its popularity, there is a use limitation for smartphone speech input: users need t... 详细信息
来源: 评论
Revoler: Visual analysis of relation evolutions in temporal data
收藏 引用
Journal of Computational Information Systems 2015年 第18期11卷 6555-6569页
作者: He, Qinglai Zhu, Min Xie, Zhaoyang Liu, Hanqing Gan, Wei Vision-Computing Lab. College of Computer Science Sichuan University Chengdu China
Temporal relations are ubiquitous. The emergence, strength and other features of these relations continue to evolve in the course of time, which is complex but valuable to identify the characteristics of related entit... 详细信息
来源: 评论
A clustering algorithm use SOM and K-Means in Intrusion Detection
A clustering algorithm use SOM and K-Means in Intrusion Dete...
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Wang, Huai-Bin Yang, Hong-Liang Xu, Zhi-Jian Yuan, Zheng Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education 300191 Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China
Improving detection definition is a pivotal problem for intrusion detection. Many intelligent algorithms were used to improve the detection rate and reduce the false rate. Traditional SOM cannot provide the precise cl... 详细信息
来源: 评论
A design to visualize cellphone communication log in an interesting way
收藏 引用
Journal of Computational Information Systems 2013年 第22期9卷 9165-9176页
作者: Li, Mingzhao Zhu, Min Gan, Qihong Liang, Ting Vision-Computing Lab. College of Computer Science Sichuan University Chengdu 610064 China
Cellphone communication log contains plenty of temporal information which can highly reect a person's daily routine and social relationships. This paper proposes a novel visualization design to help discover and v... 详细信息
来源: 评论
Watershed-based weighted graph partitioning active contours
Watershed-based weighted graph partitioning active contours
收藏 引用
2010 3rd International Congress on Image and Signal Processing, CISP 2010
作者: Wang, Shaorong Chen, Yisong Li, Sheng Wang, Guoping Li, Hua Key Lab. of Machine Perception and Intelligent MOE Beijing 100871 China HCI and Multimedia Lab. Dept. of Computer Science Peking University Beijing 100871 China National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
A novel Weighted Graph Partitioning Active Contours method based on weighted dissimilarity is introduced. This method is easy to be extended by defining different types of similarities. And it has been greatly acceler... 详细信息
来源: 评论
Deriving semantics for image clustering from accumulated user feedbacks
Deriving semantics for image clustering from accumulated use...
收藏 引用
15th ACM International Conference on multimedia, MM'07
作者: Chen, Yanhua Rege, Manjeet Dong, Ming Fotouhi, Farshad Machine Vision Pattern Recognition Lab. Department of Computer Science Wayne State University Detroit MI 48202 United States Database and Multimedia Systems Group Department of Computer Science Wayne State University Detroit MI 48202 United States
Image clustering solely based on visual features without any knowledge or background information suffers from the problem of semantic gap. In this paper, we propose SS-NMF: a semi-supervised non-negative matrix factor... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论
An efficient image processing method based on web services for mobile devices
An efficient image processing method based on web services f...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yi, Liang Yingyuan, Xiao Jing, Huang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap... 详细信息
来源: 评论
Bandwidth-efficient continuous media streaming through optimal multiplexing
Bandwidth-efficient continuous media streaming through optim...
收藏 引用
Proceedings of the 1999 International Conference on Measurement and Modeling of computer Systems, ACM SIGMETRICS '99
作者: Zhao, Wei Tripathi, Satish K. Mobile Computing and Multimedia Lab. Department of Computer Science University of Maryland College Park MD 20742 United States Bourns College of Engineering University of California Riverside CA 92521-0425 United States
Maximizing bandwidth efficiency in distributed continuous media streaming systems is the key in delivering cost-effective multimedia services to distributed and heterogeneous receivers. We introduce a technique based ... 详细信息
来源: 评论
On security threats for robust perceptual hashing
On security threats for robust perceptual hashing
收藏 引用
Media Forensics and Security
作者: Koval, O. Voloshynovskiy, S. Bas, P. Cayre, F. Computer Vision and Multimedia Laboratory University of Geneva 7 route de Drize 1227 Carouge 4 Switzerland Gipsa-lab. INPG/CNRS BP. 46 Saint Martin d'Hères 38402 France
Perceptual hashing has to deal with the constraints of robustness, accuracy and security. After modeling the process of hash extraction and the properties involved in this process, two different security threats are s... 详细信息
来源: 评论