咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300228 条 记 录,以下是151-160 订阅
排序:
Analyzing the Dynamics of Hate Speech on Online Platforms  16th
Analyzing the Dynamics of Hate Speech on Online Platforms
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Jakhaniya, Dhwani Desarkar, Maunendra Sankar Indian Inst Technol Hyderabad 502285 India
In the rapidly evolving landscape of online microblogging platforms, hate speech has emerged as a particularly troubling issue. Alarmingly, numerous countries have seen a sharp increase in hate crimes driven by malici... 详细信息
来源: 评论
Systematic User Evaluation of a Second Device Based Cast-as-Intended Verifiability Approach  9th
Systematic User Evaluation of a Second Device Based Cast-as-...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Hilt, Tobias Berens, Benjamin Truderung, Tomasz Udovychenko, Margarita Neumann, Stephan Volkamer, Melanie Karlsruhe Inst Technol Karlsruhe Germany POLYAS GmbH Kassel Germany
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast vote... 详细信息
来源: 评论
From Prison Gang to Transnational Criminal Organization. A Social Network Analysis of the Tren de Aragua  16th
From Prison Gang to Transnational Criminal Organization. A S...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Homann, Laura Alvaro-Montes, Oscar Univ Massachusetts Lowell Lowell MA 01854 USA
This research paper explores the evolution of the Venezuelan prison gang Tren de Aragua. This criminal group has emerged as one of the most influential entities in Latin America, exerting control that extends beyond p... 详细信息
来源: 评论
The Impact of Featuring Comments in Online Discussions  16th
The Impact of Featuring Comments in Online Discussions
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Waterschoot, Cedric van den Hemel, Ernst van den Bosch, Antal KNAW Meertens Inst Amsterdam Netherlands Univ Utrecht Inst Language Sci Utrecht Netherlands
A widespread moderation strategy by online news platforms is to feature what the platform deems high quality comments, usually called editor picks or featured comments. In this paper, we compare online discussions of ... 详细信息
来源: 评论
The Dawn of Decentralized Social Media: An Exploration of Bluesky's Public Opening  16th
The Dawn of Decentralized Social Media: An Exploration of Bl...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Sahneh, Erfan Samieyan Nogara, Gianluca DeVerna, Matthew R. Liu, Nick Luceri, Luca Menczer, Filippo Pierri, Francesco Giordano, Silvia ISIN DTI SUPSI Lugano Switzerland Indiana Univ Observ Social Media Bloomington IN USA USC Inst Informat Sci Los Angeles CA USA Politecn Milan Dipartimento Elettron Informazione & Bioingegneri Milan Italy
Bluesky is a Twitter-like decentralized social media platform that has recently grown in popularity. After an invite-only period, it opened to the public worldwide on February 6th, 2024. In this paper, we provide a lo... 详细信息
来源: 评论
You Shall Not Abstain!" A Formal Study of Forced Participation  9th
You Shall Not Abstain!" A Formal Study of Forced Participati...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Jamroga, Wojciech Roenne, Peter B. Kim, Yan Ryan, Peter Y. A. Univ Luxembourg Interdisciplinary Ctr Secur Reliabil & Trust SnT Esch Sur Alzette Luxembourg Polish Acad Sci Inst Comp Sci Warsaw Poland
In this paper we revisit the idea of participation privacy in secure voting, i.e., when public data does not reveal whether a given voter participated in the election. This is an important property, especially when de... 详细信息
来源: 评论
RLAs for 2-Seat STV Elections: Revisited  9th
RLAs for 2-Seat STV Elections: Revisited
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Blom, Michelle Stuckey, Peter J. Teague, Vanessa Vukcevic, Damjan Univ Melbourne Sch Comp & Informat Syst Parkville Vic Australia Monash Univ Dept Data Sci & AI Clayton Vic Australia Thinking Cybersecur Pty Ltd Melbourne Australia Monash Univ Dept Econometr & Business Stat Clayton Vic Australia
Single Transferable Vote (STV) elections are a principled approach to electing multiple candidates in a single election. Each ballot has a starting value of 1, and a candidate is elected if they gather a total vote va...
来源: 评论
Provenance for Longitudinal Analysis in Large Scale Networks  16th
Provenance for Longitudinal Analysis in Large Scale Networks
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Stoica, Andrei Riveni, Mirela Univ Groningen Groningen Netherlands Univ Groningen Informat Syst Grp Groningen Netherlands
Concerns related to the veracity and originality of the content on social networks are at an ongoing rise. Considerable work has been done on information spreading, and tools have been built, while approaches with pro... 详细信息
来源: 评论
Gradient Descent Clustering with Regularization to Recover Communities in Transformed Attributed Networks  16th
Gradient Descent Clustering with Regularization to Recover C...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Shalileh, Soroosh HSE Univ Lab Artificial Intelligence Cognit Sci AICS Moscow Russia HSE Univ Ctr Language & Brain CLB Moscow Russia
Community detection in attributed networks aims to recover clusters in which the within-community nodes are as interconnected and as homogeneous as possible, while the between-communities nodes are as disconnected and... 详细信息
来源: 评论
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited  9th
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Cas...
收藏 引用
9th International Joint Conference on Electronic Voting (E-Vote-ID)
作者: Ronne, Peter B. Finogina, Tamara Herranz, Javier Univ Luxembourg SnT Esch Sur Alzette Luxembourg Univ Lorraine CNRS LORIA Nancy France Internxt Valencia Spain Univ Politecn Cataluna Dept Matemat Barcelona Spain Scytl Elect Technol Barcelona Spain
Coercion and vote-buying are challenging and multi-faceted threats that prevent people from expressing their will freely. Even though there are known techniques to resist or partially mitigate coercion and vote-buying... 详细信息
来源: 评论