咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300228 条 记 录,以下是131-140 订阅
排序:
EIP-4844 Economics and Rollup Strategies  9th
EIP-4844 Economics and Rollup Strategies
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Crapis, Davide Felten, Edward W. Mamageishvili, Akaki Ethereum Fdn Zug Switzerland Offchain Labs Princeton NJ 08542 USA
We study the economics of the Ethereum improvement proposal 4844 and its effect on rollups' data posting strategies. Rollups' cost consists of two parts: data posting and delay. In the new proposal, the data p... 详细信息
来源: 评论
Designing Agency in Detective Video Games: An Analysis of Shadows of Doubt (2023)  17th
Designing Agency in Detective Video Games: An Analysis of Sh...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Feng, Paola Rojas-Salazar, Alberto Univ Costa Rica San Jose Costa Rica
In many video games where the player assumes the role of a detective, gameplay often focuses more on advancing an established narrative rather than allowing the player to perform as a detective. To empower the player ... 详细信息
来源: 评论
Utilizing Fractional Order Epidemiological Model to Understand High and Moderate Toxicity Spread on Social Media Platforms  16th
Utilizing Fractional Order Epidemiological Model to Understa...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Addai, Emmanuel Yousefi, Niloofar Agarwal, Nitin Univ Arkansas COSMOS Res Ctr Little Rock AR 72204 USA
The COVID-19 pandemic has increased social media usage significantly, highlighting its critical role in public statements, information dissemination, news propagation. In this study, we construct and evaluate a fracti... 详细信息
来源: 评论
Analyzing X's Web of Influence: Dissecting News Sharing Dynamics Through Credibility and Popularity with Transfer Entropy and Multiplex Network Measures  16th
Analyzing X's Web of Influence: Dissecting News Sharing Dyna...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Abdidizaji, Sina Baekey, Alexander Jayalath, Chathura Mantzaris, Alexander Garibay, Ozlem Ozmen Garibay, Ivan Univ Cent Florida Ind Engn & Management Syst Orlando FL 32816 USA Univ Cent Florida Comp Sci Orlando FL 32816 USA Univ Cent Florida Stat & Data Sci Orlando FL 32816 USA
The dissemination of news articles on social media platforms significantly impacts the public's perception of global issues, with the nature of these articles varying in credibility and popularity. The challenge o... 详细信息
来源: 评论
Goldfish: No More Attacks on Ethereum?!  28th
Goldfish: No More Attacks on Ethereum?!
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: D'Amato, Francesco Neu, Joachim Tas, Ertem Nusret Tse, David Ethereum Fdn Berlin Germany Stanford Univ Stanford CA 94305 USA
The LMD GHOST consensus protocol is a critical but brittle component of proof-of-stake Ethereum. We propose Goldfish, a new consensus protocol that satisfies key properties required of a drop-in replacement: Goldfish ... 详细信息
来源: 评论
DeepFairRank: A Multi-objective Framework for Fair Top-k Node Ranking in Network Data  16th
DeepFairRank: A Multi-objective Framework for Fair Top-k Nod...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Santos, Francisco Masrour, Farzan Tan, Pang-Ning Esfahanian, Abdol-Hossein Michigan State Univ E Lansing MI 48825 USA
The fair top-k node ranking problem aims to find the k most significant nodes in a network without discriminating against particular groups of nodes as defined by their protected attribute. However, unlike fair rankin...
来源: 评论
Computational Analysis of Communicative Acts for Understanding Crisis News Comment Discourses  16th
Computational Analysis of Communicative Acts for Understandi...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Paakki, Henna Ghorbanpour, Faeze Aalto Univ Espoo Finland Ludwig Maximilian Univ Munich Munich Germany
Social media analyses using computational methods are becoming increasingly important, especially for crisis communication and social media monitoring. We seek to investigate the validity and utility of computationall... 详细信息
来源: 评论
LedgerHedger: Gas Reservation for Smart Contract Security  28th
LedgerHedger: Gas Reservation for Smart Contract Security
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Tsabary, Itay Manuskin, Alex Bar-Zur, Roi Eyal, Ittay Technion Haifa Israel
In smart contract blockchain platforms such as Ethereum, users interact with the system by issuing transactions. System operators called miners or validators add those transactions to the blockchain. Users attach to e... 详细信息
来源: 评论
ZK-SNARKs for Ballot Validity: A Feasibility Study  9th
ZK-SNARKs for Ballot Validity: A Feasibility Study
收藏 引用
9th International Joint Conference on Electronic Voting (E-Vote-ID)
作者: Huber, Nicolas Kuesters, Ralf Liedtke, Julian Rausch, Daniel Univ Stuttgart Stuttgart Germany
Electronic voting (e-voting) systems have become more prevalent in recent years, but security concerns have also increased, especially regarding the privacy and verifiability of votes. As an essential ingredient for c... 详细信息
来源: 评论
A Longitudinal Network Analysis of the Space Sector Using International Trade Data  16th
A Longitudinal Network Analysis of the Space Sector Using In...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Guldstrand, Frank Lindstrom, Sandra Mattsson, Linn Westman, Jonatan Swedish Def Res Agcy FOI Dept Space Syst Stockholm Sweden
The space domain is attracting increasing commercial and military interest, and thus there is an interest from several parties to better understand the actors in this domain, and their interrelations and interdependen... 详细信息
来源: 评论