咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300228 条 记 录,以下是171-180 订阅
排序:
Streams of Consciousness in Interactive Digital Narrative Research Design  17th
Streams of Consciousness in Interactive Digital Narrative Re...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Daiute, Colette Wright, Jack Murray, John T. CUNY Grad Ctr New York NY 10036 USA Seton Educ Partners New York NY USA Univ Cent Florida Orlando FL 32816 USA
Interactive Digital Narrative researchers have used a variety of methodologies to assess players' experiences with IDN processes, systems and artifacts. Interviewing and surveying have been the most prevalent meth... 详细信息
来源: 评论
Experience, Don't Tell! Integration of IDN into Journalistic Narratives  17th
Experience, Don't Tell! Integration of IDN into Journalistic...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Silva, Claudia Zamora-Medina, Rocio Suminas, Andrius Univ Lisbon ITI LARSyS IST Lisbon Portugal Univ Murcia La Merced Spain Vilnius Univ Vilnius Lithuania
This paper presents a qualitative case study of Interactive Digital Narratives (IDNs) in journalism, focusing on three examples produced by news media outlets. The first is the BBC's Syrian Journey, which depicts ... 详细信息
来源: 评论
Subverting Cryptographic Hardware Used in Blockchain Consensus  28th
Subverting Cryptographic Hardware Used in Blockchain Consens...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Tiwari, Pratyush Ranjan Green, Matthew Johns Hopkins Univ Baltimore MD 21218 USA
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on cryptographic puzzles (A full version of this work is available at https://***/2022/477). Puzzles are difficult proble... 详细信息
来源: 评论
Browsing Amazon's Book Bubbles  16th
Browsing Amazon's Book Bubbles
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Bouchaud, Paul Ctr Social Anal & Math EHESS Paris France Complex Syst Inst Paris Ile France CNRS Paris France
This study investigates Amazon's book recommendation system, uncovering cohesive communities of semantically similar books. The confinement within communities is extremely high, a user following Amazon's recom... 详细信息
来源: 评论
Mitigating the Spread of COVID-19 Misinformation Using Agent-Based Modeling and Delays in Information Diffusion  16th
Mitigating the Spread of COVID-19 Misinformation Using Agent...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Alassad, Mustafa Agarwal, Nitin Univ Arkansas Little Rock COSMOS Res Ctr Little Rock AR 72204 USA
The rapid spread of COVID-19 misinformation on social media poses challenges in detection and analysis. There has been extensive discussion about the roles of online and offline campaigns in spreading misinformation. ... 详细信息
来源: 评论
Efficient Weighting Schemes for Auditing Instant-Runoff Voting Elections  9th
Efficient Weighting Schemes for Auditing Instant-Runoff Voti...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Ek, Alexander Stark, Philip B. Stuckey, Peter J. Vukcevic, Damjan Monash Univ Dept Econometr & Business Stat Clayton Vic Australia Univ Calif Berkeley Dept Stat Berkeley CA USA Monash Univ Dept Data Sci & AI Clayton Vic Australia
Various risk-limiting audit (RLA) methods have been developed for instant-runoff voting (IRV) elections. A recent method, AWAIRE, is the first efficient approach that can take advantage of, but does not require, cast ...
来源: 评论
Scalable High-Performance Community Detection Using Label Propagation in Massive Networks  16th
Scalable High-Performance Community Detection Using Label Pr...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Boddu, Sharon Khan, Maleq Texas A&M Univ Dept Elect Engn & Comp Sci Kingsville TX 78363 USA
Community detection is the problem of finding naturally forming clusters in networks. It is an important problem in mining and analyzing social and other complex networks. Community detection can be used to analyze co... 详细信息
来源: 评论
Threshold Receipt-Free Single-Pass eVoting  9th
Threshold Receipt-Free Single-Pass eVoting
收藏 引用
9th International Joint Conference on Electronic Voting (E-Vote-ID)
作者: Thi Van Thao Doan Pereira, Olivier Peters, Thomas Catholic Univ Louvain ICTEAM Crypto Grp B-1348 Louvain La Neuve Belgium Microsoft Res Redmond WA USA
In 2001, Hirt proposed a receipt-free voting scheme, which prevents malicious voters from proving to anybody how they voted, under the assumption of the availability of a helping server that is trusted for receipt-fre... 详细信息
来源: 评论
Transaction Fee Mechanism Design with Active Block Producers  9th
Transaction Fee Mechanism Design with Active Block Producers
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Bahrani, Maryam Garimidi, Pranav Roughgarden, Tim A16z Crypto Menlo Pk CA 94025 USA Columbia Univ New York NY USA
The incentive-compatibility properties of blockchain transaction fee mechanisms have been investigated with passive block producers that are motivated purely by the net rewards earned at the consensus layer. This work... 详细信息
来源: 评论
SAVER: SNARK-Compatible Verifiable Encryption  28th
SAVER: SNARK-Compatible Verifiable Encryption
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Lee, Jiwon Choi, Jaekyoung Kim, Jihye Oh, Hyunok Samsung Res Seoul South Korea Zkrypto Inc Seoul South Korea Kookmin Univ Seoul South Korea Hanyang Univ Seoul South Korea
In applications involving zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK), there often exists a requirement for the proof system to be combined with encryption. As a typical example, a user m... 详细信息
来源: 评论