語系:
繁體中文
English
說明(常見問題)
登入
Series in machine perception and artificial intelligence ;
書目資訊
fighting terror in cyberspace
fighting terror in cyberspace
data mining in time series databases
data mining in time series databases
multimodal interactive handwritten t...
multimodal interactive handwritten text transcription
graph-theoretic techniques for web c...
graph-theoretic techniques for web content mining
personalization techniques and recom...
personalization techniques and recommender systems
ensemble learning :
ensemble learning :
graph classification and clustering ...
graph classification and clustering based on vector space embedding
image pattern recognition
image pattern recognition
recognition of whiteboard notes
recognition of whiteboard notes
data mining in time series and strea...
data mining in time series and streaming databases /
wavelet theory approach to pattern r...
wavelet theory approach to pattern recognition
handwritten historical document anal...
handwritten historical document analysis, recognition, and retrieval
data mining with decision trees
data mining with decision trees
robust range image registration :
robust range image registration :
image pattern recognition
image pattern recognition
formal models, languages and applica...
formal models, languages and applications
progress in computer vision and imag...
progress in computer vision and image analysis /
data mining with decision trees
data mining with decision trees
bridging the gap between graph edit ...
bridging the gap between graph edit distance and kernel machines
computational intelligence in softwa...
computational intelligence in software quality assurance
integration of swarm intelligence an...
integration of swarm intelligence and artificial neural network /
pattern classification using ensembl...
pattern classification using ensemble methods
dissimilarity representation for pat...
dissimilarity representation for pattern recognition
data mining in time series databases
data mining in time series databases
lognormality principle and its appli...
lognormality principle and its applications in e-security, e-learning and e-health
graph-theoretic techniques for web c...
graph-theoretic techniques for web content mining
image pattern recognition
image pattern recognition
computational web intelligence
computational web intelligence
progress in computer vision and imag...
progress in computer vision and image analysis
computational web intelligence
computational web intelligence
kernels for structured data
kernels for structured data
integration of swarm intelligence an...
integration of swarm intelligence and artificial neutral network
fuzzy systems to quantum mechanics
fuzzy systems to quantum mechanics
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入