咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300228 条 记 录,以下是91-100 订阅
排序:
On-Chain Timestamps are Accurate  28th
On-Chain Timestamps are Accurate
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Tzinas, Apostolos Sridhar, Srivatsan Zindros, Dionysis Stanford Univ Stanford CA 94305 USA Natl Tech Univ Athens Athens Greece Common Prefix Athens Greece
When Satoshi Nakamoto introduced Bitcoin, a central tenet was that the blockchain functions as a timestamping server. In the Ethereum era, smart contracts widely assume on-chain timestamps are mostly accurate. In this...
来源: 评论
Popcorn Movie: Dynamic Narrative Feedback for Spontaneous Live Action Video Storytelling  17th
Popcorn Movie: Dynamic Narrative Feedback for Spontaneous Li...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Riley, Allen Univ Calif Santa Cruz Santa Cruz CA 95064 USA
This paper describes Popcorn Movie, a movie-making party game demonstrating a theoretical and practical framework for generating stories using a dynamic narrative feedback loop between the improvised dialogue performe...
来源: 评论
Data Composition for Continual Learning in Application of Cyberattack Detection  16th
Data Composition for Continual Learning in Application of Cy...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Lian, Jiayi Liu, Xueying Choi, Kevin Veeramani, Balaji Murli, Sathvik Hu, Alison Freeman, Laura Bowen, Edward Deng, Xinwei Virginia Tech Dept Stat Falls Church VA 22043 USA Deloitte & Touche AI Ctr Excellence New York CA USA
Continual learning (CL) focuses on enabling machine learning algorithms to learn from a series of tasks without forgetting previously acquired knowledge. The use of continual learning has not been widely explored in c...
来源: 评论
Affective Sound: Developing a Critical Framework for Audio-Based Interactive Digital Narratives  17th
Affective Sound: Developing a Critical Framework for Audio-B...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Holloway-Attaway, Lissa Fawcus, Jamie Univ Skovde Skovde Sweden
In our current research project we develop a critical framework to facilitate the design and the critique of audio-based interactive narrative experiences. We foreground deep material connections to sound and affect a...
来源: 评论
Multi Objective Optimization Approach for WSN Based on Reinforcement Learning  16th
Multi Objective Optimization Approach for WSN Based on Reinf...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Hajjej, Faten Hamdi, Monia Zaied, Mourad Gabes Univ Res Team Intelligent Machines Gabes Tunisia Gabes Univ Hosp Minist Publ Hlth Gabes Tunisia
Wireless sensor networks (WSNs) are gradually invading our daily lives, offering us new services every day. They can be found in applications that affect us more and more. First used to monitor the environment and urb...
来源: 评论
Short Paper: Onion Messages on Leash  28th
Short Paper: Onion Messages on Leash
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Bashiri, Amin Khabbazian, Majid Univ Alberta Edmonton AB Canada
Onion messages (OMs) are private messages sent between nodes in the Lightning Network (LN) using onion routing. While they are intended to enable interesting applications such as static invoices, refunds, and asynchro...
来源: 评论
Short Paper: Naysayer Proofs  28th
Short Paper: Naysayer Proofs
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Seres, Istvan Andras Glaeser, Noemi Bonneau, Joseph Eotvos Lorand Univ Budapest Hungary Univ Maryland College Pk MD USA Max Planck Inst Secur & Privacy Bochum Germany a16z Crypto Res New York NY USA NYU New York NY USA
This work introduces the notion of naysayer proofs. We observe that in numerous (zero-knowledge) proof systems, it is significantly more efficient for the verifier to be convinced by a so-called naysayer that a false ...
来源: 评论
MLCDG: Multi-Level Contrastive Graph Clustering in Dynamic Graphs  16th
MLCDG: Multi-Level Contrastive Graph Clustering in Dynamic G...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Amar, Mohamed Mahmoud Bouguessa, Mohamed Diallo, Abdoulaye Banire Univ Quebec Montreal Montreal PQ Canada
Dynamic graphs are widespread in social networks, biological networks, and recommendation systems. Community detection in dynamic graphs presents several challenges because these graphs continually change over time. T...
来源: 评论
Anonymous Reputation Systems with Revocation, Revisited  28th
Anonymous Reputation Systems with Revocation, Revisited
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Hayashi, Ryuya Katsumata, Shuichi Sakai, Yusuke Univ Tokyo Tokyo Japan PQShield Ltd Oxford England AIST Tokyo Japan
An anonymous reputation system (ARS) was first proposed by Blomer, Juhnke, and Kolb (FC, 2015), a protocol similar to group signatures in concept, and its definition has been refined for example by El Kaafarani, Katsu...
来源: 评论
PARALLAX: Leveraging Polarization Knowledge for Misinformation Detection  16th
PARALLAX: Leveraging Polarization Knowledge for Misinformati...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Paschalides, Demetris Pallis, George Dikaiakos, Marios D. Univ Cyprus Dept Comp Sci Nicosia Cyprus
Recent techniques for the automated detection of online misinformation typically rely on ML models trained with features extracted from content analysis and/or general-purpose Knowledge Graphs (KGs). These techniques ...
来源: 评论