咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300226 条 记 录,以下是1251-1260 订阅
排序:
Mining Rare Temporal Pattern in Time Series  35th
Mining Rare Temporal Pattern in Time Series
收藏 引用
35th Australasian Database Conference
作者: Long Van Ho Ho, Nguyen Cong Trinh Le Anh-Vu Dinh-Duc Quach, Khang Ngoc Tu Nguyen Int Univ Sch Comp Sci & Engn Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City Vietnam Loyola Univ Maryland Dept Comp Sci Baltimore MD USA Quy Nhon Univ Dept Math Quy Nhon Vietnam Griffith Univ Nathan Qld Australia TVT Corp Res Ho Chi Minh City Vietnam
Time series data from various domains is continuously growing, and extracting and analyzing temporal patterns within these series can provide valuable insights. Temporal pattern mining (TPM) extends traditional patter... 详细信息
来源: 评论
Adversarial Malware Detection Official Work-in-Progress Paper  14th
Adversarial Malware Detection Official Work-in-Progress Pape...
收藏 引用
14th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE)
作者: Vishwakarma, Ashish Kashyap, Umesh Ali, Sk Subidh Indian Inst Technol Bhilai 491002 India
Malware detection is one of the most challenging tasks in the domain of Cybersecurity. The use of machine learning models as detectors significantly improved the performance. At the same time, adversarial modeling of ... 详细信息
来源: 评论
Supporting the Development of Oracle APEX Low-Code Applications with Large Language Models  25th
Supporting the Development of Oracle APEX Low-Code Applicati...
收藏 引用
25th International Conference on Product Focused Software Process Improvement
作者: Gorissen, Simon C. Sauer, Stefan Beckmann, Wolf G. TEAM GmbH Software & Consulting Dept D-33104 Paderborn Germany Paderborn Univ Dept Comp Sci D-33095 Paderborn Germany Paderborn Univ Software Innovat Lab SICP D-33095 Paderborn Germany
Large Language Models (LLMs) and low-code development platforms (LCDPs) have shown potential to fundamentally change the way how software products and applications are developed and to both combat the shortage of skil... 详细信息
来源: 评论
Generalizing Soft Actor-Critic Algorithms to Discrete Action Spaces  7th
Generalizing Soft Actor-Critic Algorithms to Discrete Action...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Zhang, Le Gu, Yong Zhao, Xin Zhang, Yanshuo Zhao, Shu Jin, Yifei Wu, Xinxin Beijing Elect Sci & Technol Inst Dept Cybersecur Beijing Peoples R China JiangXi Univ Finance & Econ Sch Software & Internet Things Engn Nanchang Jiangxi Peoples R China
ATARI is a suite of video games used by reinforcement learning (RL) researchers to test the effectiveness of the learning algorithm. Receiving only the raw pixels and the game score, the agent learns to develop sophis... 详细信息
来源: 评论
Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies  29th
Left Alone Facing a Difficult Choice: An Expert Analysis of ...
收藏 引用
29th Nordic Conference on Secure IT Systems
作者: Shams, Shirin Reinke, Sebastian Reinhardt, Delphine Univ Gottingen Inst Comp Sci Gottingen Germany Univ Gottingen Campus Inst Data Sci Gottingen Germany
The privacy community has invested considerable effort in understanding why motivated individuals do not adopt available solutions. As a result, several factors supporting individuals in adopting Privacy Enhancing Tec... 详细信息
来源: 评论
ImgQuant: Towards Adversarial Defense with Robust Boundary via Dual-Image Quantization  7th
ImgQuant: Towards Adversarial Defense with Robust Boundary v...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Lv, Huanhuan Jiang, Songru Wan, Tuohang Chen, Lijun Nanjing Univ Dept Comp Sci & Technol Nanjing Peoples R China
Deep neural networks (DNNs) are vulnerable to adversarial example attacks, which pose a potential threat to safety-sensitive autonomous driving. Previous research on adversarial defense mainly concentrates on modifyin... 详细信息
来源: 评论
Geo-UNet: A Geometrically Constrained Neural Framework for Clinical-Grade Lumen Segmentation in Intravascular Ultrasound  15th
Geo-UNet: A Geometrically Constrained Neural Framework for C...
收藏 引用
15th International Workshop on Machine Learning in Medical Imaging
作者: Chen, Yiming D'Souza, Niharika S. Mandepally, Akshith Henninger, Patrick Kashyap, Satyananda Karani, Neerav Dey, Neel Zachary, Marcos Rizq, Raed Chouinard, Paul Golland, Polina Syeda-Mahmood, Tanveer F. MIT Boston MA USA IBM Res San Jose CA 95120 USA Boston Sci Corp Maple Grove MN USA
Precisely estimating lumen boundaries in intravascular ultrasound (IVUS) is needed for sizing interventional stents to treat deep vein thrombosis (DVT). Unfortunately, current segmentation networks like the UNet lack ... 详细信息
来源: 评论
Synthetic Augmentation for Anatomical Landmark Localization Using DDPMs  9th
Synthetic Augmentation for Anatomical Landmark Localization ...
收藏 引用
9th International Workshop on Simulation and Synthesis in Medical Imaging
作者: Hadzic, Arnela Bogensperger, Lea Joham, Simon Johannes Urschler, Martin Med Univ Graz Inst Med Informat Stat & Documentat Graz Austria Graz Univ Technol Inst Comp Graph & Vis Graz Austria
Deep learning techniques for anatomical landmark localization (ALL) have shown great success, but their reliance on large annotated datasets remains a problem due to the tedious and costly nature of medical data acqui... 详细信息
来源: 评论
Code-Level Safety Verification for Automated Driving: A Case Study  26th
Code-Level Safety Verification for Automated Driving: A Case...
收藏 引用
26th International Symposium on Formal Methods (FM)
作者: Nenchev, Vladislav Imrie, Calum Gerasimou, Simos Calinescu, Radu BMW Grp Petuelring 130 D-80809 Munich Germany Univ York Dept Comp Sci York N Yorkshire England
The formal safety analysis of automated driving vehicles poses unique challenges due to their dynamic operating conditions and significant complexity. This paper presents a case study of applying formal safety verific... 详细信息
来源: 评论
Multi-dimensional Information Awareness Residual Network for Lightweight Image Super-Resolution  7th
Multi-dimensional Information Awareness Residual Network for...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Wei, Ziyan Guo, Zhiqing Wang, Liejun Xinjiang Univ Sch Comp Sci & Technol Urumqi Peoples R China
In recent years, Lightweight image super-resolution technology has achieved good performance. However, many models struggle to effectively capture and process global information, leading to problems such as loss of de... 详细信息
来源: 评论