咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300228 条 记 录,以下是881-890 订阅
排序:
Kadabra: Adapting Kademlia for the Decentralized Web  27th
Kadabra: Adapting Kademlia for the Decentralized Web
收藏 引用
27th International Conference on Financial Cryptography and Data Security (FC)
作者: Zhang, Yunqi Venkatakrishnan, Shaileshh Bojja Ohio State Univ Columbus OH 43210 USA
Blockchains have become the catalyst for a growing movement to create a more decentralized Internet. A fundamental operation of applications in a decentralized Internet is data storage and retrieval. As today's bl... 详细信息
来源: 评论
Verifying and Interpreting Neural Networks Using Finite Automata  1
收藏 引用
28th International Conference on Developments in Language Theory (DLT)
作者: Salzer, Marco Alsmann, Eric Bruse, Florian Lange, Martin Univ Kassel Sch Elect Engn & Comp Sci Kassel Germany
Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose... 详细信息
来源: 评论
Deploying ChatGPT for Automated Tagging of Greek Dialogue Data of University Students  20th
Deploying ChatGPT for Automated Tagging of Greek Dialogue Da...
收藏 引用
20th International Conference on Intelligent Tutoring Systems (ITS)
作者: Gavros, Andreas Demetriadis, Stavros Tegos, Stergios Aristotle Univ Thessaloniki Thessaloniki Greece
In this study, we propose a methodology of automated labelling for dialogues. We analyze dialogue data by deploying ChatGPT 3.5 model. Large language models (LLMs) have recently been in the focus of the scientific wor... 详细信息
来源: 评论
Does Players' Prosocial Behavior in computer Game Predict Their Well-Being in Real Life?  12th
Does Players' Prosocial Behavior in Computer Game Predict Th...
收藏 引用
12th International Conference on Games and Learning Alliance (GALA)
作者: Miwa, Kazuhisa Nagoya Univ Nagoya Aichi 4648601 Japan
This study investigates the correlation between players' prosocial behavior in computer games and their well-being in real life. Participants were invited to engage in a simple computer game where their task was t... 详细信息
来源: 评论
New Dimensions: The Impact of the Metaverse and AI Avatars on Social science Education  17th
New Dimensions: The Impact of the Metaverse and AI Avatars o...
收藏 引用
17th International Conference on Blended Learning. Intelligent Computing in Education (ICBL)
作者: Wong, Paulina Pui Yun Lee, Jaemin Gonzales, Wilkinson Daniel Wong Choi, Sunny Hee Sun Hwang, Haerim Shen, Daniel Jiandong Lingnan Univ Tuen Mun Hong Kong Peoples R China Chinese Univ Hong Kong Cent Ave Hong Kong Peoples R China Hong Kong Polytech Univ Hung Hom Hong Kong Peoples R China Soqqle Hong Kong Ltd Hong Kong Peoples R China
This study investigates the integration of the metaverse and artificial intelligence (AI) avatars in social science education, amidst global challenges that necessitate holistic approaches for cultivating critical glo... 详细信息
来源: 评论
Optimising a Peer Based Learning Environment  20th
Optimising a Peer Based Learning Environment
收藏 引用
20th International Conference on Intelligent Tutoring Systems (ITS)
作者: Murphy, Aidan Mahdinejad, Mahsa Ahmad, Syed Saeed Kenny, Joe Ventresque, Anthony Lero Sci Fdn Ireland Res Ctr Software Limerick Ireland Univ Coll Dublin Dublin Ireland Zeeko NovaUCD Dublin Ireland Trinity Coll Dublin Dublin Ireland
Primary School education in Ireland is in the process of updating its pedagogical approaches, embracing new teaching methods and desiring new learning outcomes. In particular, the new curriculum emphasizes developing ... 详细信息
来源: 评论
On the Sustainability of Bitcoin Partitioning Attacks  27th
On the Sustainability of Bitcoin Partitioning Attacks
收藏 引用
27th International Conference on Financial Cryptography and Data Security (FC)
作者: Ha, Jaehyun Baek, Seungjin Muoi Tran Kang, Min Suk Korea Adv Inst Sci & Technol Daejeon South Korea Swiss Fed Inst Technol Zurich Switzerland
A series of recent studies have shown that permissionless blockchain peer-to-peer networks can be partitioned at low cost (e.g., only a few thousand bots are needed), stealthily (e.g., no control plane detection is av... 详细信息
来源: 评论
Unveiling the Invisible: Caseworkers' Data Work in a Public Welfare Organization  23rd
Unveiling the Invisible: Caseworkers' Data Work in a Public ...
收藏 引用
23rd International Conference on Electronic Government (EGOV)
作者: Crivellari, Ilaria Oskarsen, Johanne Svanes Groder, Charlotte Husom Norwegian Univ Sci & Technol N-7030 Trondheim Norway Univ Oslo N-0371 Oslo Norway
The public sector is undergoing a transformation characterized by the increasing adoption of digital technologies, commonly referred to as digital government. Within this context, caseworkers who manage citizens seeki... 详细信息
来源: 评论
Exploring User Preferences in Al-Generated Car Wheel Frame Designs: A Preliminary Study of Users with Varied Design Experience
Exploring User Preferences in Al-Generated Car Wheel Frame D...
收藏 引用
Conference on Human Interface and the Management of Information Thematic Area (HIMI) Held as Part of the 26th International Conference on Human-computer Interaction (HCII)
作者: Lee, Yu-Hsu Huang, Hsin-Wei Natl Yunlin Univ Sci & Technol Touliu 64002 Yunlin Taiwan
This study explores the application of AI in a specific product design field and investigates the differences between individuals with professional and non-professional backgrounds. Using wheel rim design as an exampl... 详细信息
来源: 评论
Relationships Between Security Management and Technical Security of Norwegian Energy Entities  1
收藏 引用
18th International Conference on Critical Information Infrastructures Security (CRITIS)
作者: Toftegaard, Oyvind Hagen, Janne Haemmerli, Bernhard Norwegian Univ Sci & Technol Gjovik Norway Norwegian Energy Regulatory Author Oslo Norway Norwegian Water Resources & Energy Directorate Oslo Norway Univ Oslo Oslo Norway Lucerne Sch Comp Sci & Informat Technol Rotkreuz Switzerland
Security management standards such as ISO/IEC 27001 and NIST Cybersecurity Framework are common approaches to audit cybersecurity compliance and maturity. Little is known about how well such security management audits... 详细信息
来源: 评论