咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300228 条 记 录,以下是1-10 订阅
排序:
lecture notes in computer science: Beyond simulators, Using F1 Games to Predict Driver Performance, Learning and Potential  2
Lecture Notes in Computer Science: Beyond simulators, Using ...
收藏 引用
2nd International Conference on Games and Learning Alliance (GALA)
作者: Hislop, Matthew Sivanathan, Aparajithan Lim, Theodore Ritchie, James M. Rajendran, Gnanathusharan Louchart, Sandy Heriot Watt Univ Edinburgh EH14 4AS Midlothian Scotland
Formula One (F1) drivers are amongst the most highly skilled drivers in the world, but not every F1 driver is destined to be a F1 World Champion. Discovering new talent or refreshing strategies are long-term investmen... 详细信息
来源: 评论
SoK: A Stratified Approach to Blockchain Decentralization  28th
SoK: A Stratified Approach to Blockchain Decentralization
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Ovezik, Christina Karakostas, Dimitris Kiayias, Aggelos Univ Edinburgh Edinburgh Midlothian Scotland IOG Edinburgh Midlothian Scotland
Decentralization has been touted as the principal security advantage which propelled blockchain systems at the forefront of developments in the financial technology space. Its exact semantics nevertheless remain highl... 详细信息
来源: 评论
Methodology for Identifying Social Groups Within a Transactional Graph  16th
Methodology for Identifying Social Groups Within a Transacti...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Morin, Maxence Hemery, Baptiste Jeanne, Fabrice Pawlowski-Cherrier, Estelle Normandie Univ GREYC CNRS ENSICAENUNICAEN F-14000 Caen France Orange Innovat F-14000 Caen France
Social network analysis is pivotal for organizations aiming to leverage the vast amounts of data generated from user interactions on social media and other digital platforms. These interactions often reveal complex so... 详细信息
来源: 评论
Topics, Temporal Patterns, and Network Characteristics of AI-Related Discourse on Reddit  16th
Topics, Temporal Patterns, and Network Characteristics of AI...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Yang, Pingjing Han, Kanyao Diesner, Jana Univ Illinois Urbana IL 61820 USA Tech Univ Munich D-80333 Munich Germany
How does the public perceive Artificial Intelligence (AI)? We present a sliver of an answer to this question by analyzing discussions on 26 AI-related subreddits from 2005 to early 2023. We apply (1) topic modeling to... 详细信息
来源: 评论
Across Platforms and Languages: Dutch Influencers and Legal Disclosures on Instagram, YouTube and TikTok  16th
Across Platforms and Languages: Dutch Influencers and Legal ...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Gui, Haoyang Bertaglia, Thales Goanta, Catalina de Vries, Sybe Spanakis, Gerasimos Univ Utrecht Utrecht Netherlands Maastricht Univ Maastricht Netherlands
Content monetization on social media fuels a growing influencer economy. Influencer marketing remains largely undisclosed or inappropriately disclosed on social media. Non-disclosure issues have become a priority for ... 详细信息
来源: 评论
Evaluating Deep Graph Network Performance by Augmenting Node Features with Structural Features  16th
Evaluating Deep Graph Network Performance by Augmenting Node...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Abushofa, Mohamad Atapour-Abarghouei, Amir Forshaw, Matthew McGough, A. Stephen Newcastle Univ Sch Comp Newcastle Upon Tyne Tyne & Wear England Univ Durham Dept Comp Sci Durham England
In machine learning, features play a vital role in modeling and understanding the data;their quality and representation essentially determine how accurate the results are. The problem is compounded in the graph-based ... 详细信息
来源: 评论
Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners  28th
Scan, Shuffle, Rescan: Two-Prover Election Audits With Untru...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Jones, Douglas W. Park, Sunoo Rivest, Ronald L. Sealfon, Adam Univ Iowa Iowa City IA 52242 USA NYU New York NY 10012 USA MIT CSAIL 77 Massachusetts Ave Cambridge MA 02139 USA Univ Calif Berkeley Berkeley CA USA
We introduce a new way to conduct election audits using untrusted scanners. Post-election audits perform statistical hypothesis testing to confirm election outcomes. However, existing approaches are costly and laborio...
来源: 评论
BBCA-CHAIN: Low Latency, High Throughput BFT Consensus on a DAG  28th
BBCA-CHAIN: Low Latency, High Throughput BFT Consensus on a ...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Malkhi, Dahlia Stathakopoulou, Chrysoula Yin, Maofan Chainlink Labs Wilmington DE 19808 USA
This paper presents a partially synchronous BFT consensus protocol powered by BBCA, a lightly modified Byzantine Consistent Broadcast (BCB) primitive. BBCA provides a Complete-Adopt semantic through an added probing i... 详细信息
来源: 评论
Exploring Crisis-Driven Social Media Patterns: A Twitter Dataset of Usage During the Russo-Ukrainian War  16th
Exploring Crisis-Driven Social Media Patterns: A Twitter Dat...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Lamprou, Ioannis Shevtsov, Alexander Antonakaki, Despoina Pratikakis, Polyvios Ioannidis, Sotiris Tech Univ Crete Khania Greece ICS FORTH Iraklion Greece
On 24 February 2022, Russia's invasion of Ukraine, now known as the Russo-Ukrainian War, sparked extensive discussions on Online Social Networks (OSN). We initiate a data collection using the Twitter API to captur... 详细信息
来源: 评论
Ethereum Proof-of-Stake Consensus Layer: Participation and Decentralization  9th
Ethereum Proof-of-Stake Consensus Layer: Participation and D...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Grandjean, Dominic Heimbach, Lioba Wattenhofer, Roger Swiss Fed Inst Technol Zurich Switzerland
In September 2022, Ethereum transitioned from Proof-of-Work (PoW) to Proof-of-Stake (PoS) during "the merge"-making it the largest PoS cryptocurrency in terms of market capitalization. With this work, we pre... 详细信息
来源: 评论