咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300226 条 记 录,以下是1211-1220 订阅
排序:
Bounded-Ratio Gapped String Indexing  31st
Bounded-Ratio Gapped String Indexing
收藏 引用
31st International Symposium on String Processing and Information Retrieval (SPIRE)
作者: Ganguly, Arnab Gibney, Daniel MacNichol, Paul Thankachan, Sharma V. Univ Wisconsin Whitewater Whitewater WI USA Univ Texas Dallas Dallas TX 75390 USA North Carolina State Univ Raleigh NC USA
In the gapped string indexing problem, one is given a text T[1.. n] to preprocess. At query time, a gapped pattern P = P-1[alpha.. beta]P-2 and an integer range [alpha.. beta] are provided, where P-1 and P-2 are strin... 详细信息
来源: 评论
Playing Games on Automata  22nd
Playing Games on Automata
收藏 引用
22nd International Symposium on Automated Technology for Verification and Analysis
作者: Kupferman, Orna Hebrew Univ Jerusalem Sch Engn & Comp Sci Jerusalem Israel
The interaction between a system and its environment corresponds to a game in which the system and the environment generate a word over the alphabet of assignments to the input and output signals. The system player wi... 详细信息
来源: 评论
Voices of Asynchronous Learning Students: Revealing Learning Characteristics Through Vocabulary Analysis of notes Tagged in Videos  10th
Voices of Asynchronous Learning Students: Revealing Learning...
收藏 引用
29th International Conference on Database Systems for Advanced Applications (DASFAA)
作者: Wang, Xiaonan Su, Yancong Sun, Yi Nishida, Takeshi Ohtsuki, Kazuhiro Kiyomitsu, Hidenari Kobe Univ Grad Sch Intercultural Studies Kobe Hyogo Japan Xiamen Univ Technol Sch Design & Art Xiamen Peoples R China Grad Sch Informat Technol Kobe Inst Comp Kobe Hyogo Japan
This paper describes a method for analyzing learning data from video courses. The data comes from an on-demand introductory programming course at a university. The study analyzes differences in note content characteri... 详细信息
来源: 评论
SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection  28th
SC-WGAN: GAN-Based Oversampling Method for Network Intrusion...
收藏 引用
28th International Conference on Engineering of Complex computer Systems (ICECCS)
作者: Bai, Wuxia Wang, Kailong Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Huazhong Univ Sci & Technol Wuhan 430074 Peoples R China
The growing cyber threat landscape necessitates robust defenses, with Network Intrusion Detection Systems (NIDS) at the forefront. Leveraging Deep Neural Networks (DNN) has significantly improved detection accuracy in... 详细信息
来源: 评论
From Coarse to Fine: A Novel Colon Polyp Segmentation Method Like Human Observation  7th
From Coarse to Fine: A Novel Colon Polyp Segmentation Method...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Wang, Wei Sun, Huiying Wang, Xin Changsha Univ Sci & Technol Sch Comp & Commun Engn Changsha Peoples R China
Colon polyp screening is critical for the prevention of colon cancer, and the use of colon polyp segmentation to assist physicians in identifying potential polyps can improve detection efficiency and reduce misdiagnos... 详细信息
来源: 评论
Serious Practices for Interactive Waste Sorting Mini-game  10th
Serious Practices for Interactive Waste Sorting Mini-game
收藏 引用
10th Joint International Conference on Serious Games
作者: Sun, Qiming Hsiao, I-Han Santa Clara Univ Santa Clara CA 95053 USA
Effective waste management is crucial for sustainable living, but many individuals find it challenging to navigate the complexities of waste classification. This study presents a web-based serious game that utilizes i... 详细信息
来源: 评论
Temporal Evaluation of Uncertainty Quantification Under Distribution Shift  1st
Temporal Evaluation of Uncertainty Quantification Under Dist...
收藏 引用
1st International Workshop on AI in Drug Discovery (AIDD)
作者: Svensson, Emma Friesacher, Hannah Rosa Arany, Adam Mervin, Lewis Engkvist, Ola Johannes Kepler Univ Linz Inst Machine Learning ELLIS Unit Linz A-4040 Linz Austria Katholieke Univ Leuven ESAT STADIUS B-3000 Leuven Belgium AstraZeneca Gothenburg R&D Discovery Sci Mol AI S-43183 Molndal Sweden AstraZeneca Cambridge R&D Discovery Sci Mol AI Cambridge CB2 0AA England Chalmers Univ Technol Dept Comp Sci & Engn S-41296 Gothenburg Sweden
Uncertainty quantification is emerging as a critical tool in high-stakes decision-making processes, where trust in automated predictions that lack accuracy and precision can be time-consuming and costly. In drug disco... 详细信息
来源: 评论
Automated Flaw Detection for Industrial Robot RESTful Service  26th
Automated Flaw Detection for Industrial Robot RESTful Servic...
收藏 引用
26th International Conference on Verification Model Checking and Abstract Interpretation
作者: Wang, Yuncheng Liu, Puzhuo Zheng, Yaowen Fang, Dongliang Si, Shuaizong Pan, Zhiwen Zhang, Weidong Sun, Limin Chinese Acad Sci Inst Informat Engn Beijing Key Lab IOT Informat Secur Technol Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Tsinghua Univ Beijing Peoples R China
As industrial robots become an integral part of Industry 4.0 in the manufacturing sector, their interconnection and interoperability introduce significant security challenges. RESTful Web services have emerged as the ... 详细信息
来源: 评论
HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical  30th
HELIOPOLIS: Verifiable Computation over Homomorphically Encr...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Aranha, Diego F. Costache, Anamaria Guimaraes, Antonio Soria-Vazquez, Eduardo Aarhus Univ Aarhus Denmark NTNU Trondheim Norway IMDEA Software Inst Madrid Spain Technol Innovat Inst Abu Dhabi U Arab Emirates
Homomorphic encryption (HE) enables computation on encrypted data, which in turn facilitates the outsourcing of computation on private data. However, HE offers no guarantee that the returned result was honestly comput... 详细信息
来源: 评论
Local Reactivation for Communication Efficient Federated Learning Based on Sparse Gradient Deviation  7th
Local Reactivation for Communication Efficient Federated Lea...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Mu, Chang Zhang, Ziyang Tian, Xiang Guo, Kailing Xu, Xiangmin South China Univ Technol Guangzhou 510641 Peoples R China Pazhou Lab Guangzhou 510330 Peoples R China Hefei Comprehens Natl Sci Ctr Inst Artificial Intelligence Hefei 230088 Peoples R China
Communication volume is a critical bottleneck restricting federated learning efficiency. Pruning is commonly employed to address this problem. To enhance the expressive ability of the pruned models, parameter reactiva... 详细信息
来源: 评论