You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two volumes CCIS 546 and 547 constitute the refereed proceedings of the CCF Chinese Conference on Computer Vision, CCCV 2015, held in Xi'an, China, in September 2015. The total of 89 revised full papers presented in both volumes were carefully reviewed and selected from 176 submissions. The papers address issues such as computer vision, machine learning, pattern recognition, target recognition, object detection, target tracking, image segmentation, image restoration, face recognition, image classification.
For centuries the Chinese referred to their fiction as xiaoshuo, etymologically meaning roadside gossip or small talk, and held it in relative disregard.
The two volumes CCIS 546 and 547 constitute the refereed proceedings of the CCF Chinese Conference on Computer Vision, CCCV 2015, held in Xi'an, China, in September 2015. The total of 89 revised full papers presented in both volumes were carefully reviewed and selected from 176 submissions. The papers address issues such as computer vision, machine learning, pattern recognition, target recognition, object detection, target tracking, image segmentation, image restoration, face recognition, image classification.
This book focuses on reservoir surveillance and management, reservoir evaluation and dynamic description, reservoir production stimulation and EOR, ultra-tight reservoir, unconventional oil and gas resources technology, oil and gas well production testing, and geomechanics. This book is a compilation of selected papers from the 11th International Field Exploration and Development Conference (IFEDC 2021). The conference not only provides a platform to exchanges experience, but also promotes the development of scientific research in oil & gas exploration and production. The main audience for the work includes reservoir engineer, geological engineer, enterprise managers, senior engineers as well as professional students.
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the C...
This eBook is a collection of articles from a Frontiers Research Topic. Frontiers Research Topics are very popular trademarks of the Frontiers Journals Series: they are collections of at least ten articles, all centered on a particular subject. With their unique mix of varied contributions from Original Research to Review Articles, Frontiers Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author by contacting the Frontiers Editorial Office: frontiersin.org/about/contact.