咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 605 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是11-20 订阅
排序:
Friendship with AI? - Immersive science Fiction Prototyping for Responsible Innovation  17th
Friendship with AI? - Immersive Science Fiction Prototyping ...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Brucker-Kley, Elke Keller, Thomas Michot, Janick Borghoff, Birgitta Stutz, Isabelle Zurich Univ Appl Sci Winterthur Switzerland
This paper presents the experiences from a science communication project that applied Immersive science Fiction Prototyping to explore the concept of friendship with emotional AI. The aim of this paper is to introduce... 详细信息
来源: 评论
Leveraging Secure Social Media Crowdsourcing for Gathering Firsthand Account in Conflict Zones  16th
Leveraging Secure Social Media Crowdsourcing for Gathering F...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Orojo, Abanisenioluwa Bhagat, Pranish Wilburn, John Donahoo, Michael Vishwamitra, Nishant Baylor Univ Waco TX 76798 USA Univ Texas San Antonio San Antonio TX USA
The Russo-Ukrainian conflict underscores challenges in obtaining reliable firsthand accounts. Traditional methods such as satellite imagery and journalism fall short due to limited access to zones. Secure social media...
来源: 评论
Privacy-Preserving Anti-money Laundering Using Secure Multi-party Computation  28th
Privacy-Preserving Anti-money Laundering Using Secure Multi-...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: van Egmond, Marie Beth Dunning, Vincent van den Berg, Stefan Rooijakkers, Thomas Sangers, Alex Poppe, Ton Veldsink, Jan Netherlands Org Appl Sci Res TNO The Hague Netherlands ABN AMRO Amsterdam Netherlands Rabobank Utrecht Netherlands
Money laundering is a serious financial crime where criminals aim to conceal the illegal source of their money via a series of transactions. Although banks have an obligation to monitor transactions, it is difficult t...
来源: 评论
From Complexity to Clarity: Applying Systems Thinking and Mapping to the Co-creation of Learning Idns  17th
From Complexity to Clarity: Applying Systems Thinking and Ma...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Roth, Christian Pitt, Breanne Bender-Salazar, Rahmin Univ Arts Utrecht Lange Viestr 2BPostbox 1520 NL-3500 BM Utrecht Netherlands Univ Dublin Trinity Coll Dublin Dublin D02 PN40 Ireland Univ Galway Univ Rd Galway H91 TK33 Ireland
This case study examines how two areas within Interactive Digital Narratives (IDNs)-systems thinking and mapping, and digital learning and education-come together to create communicative and transformative tools for t...
来源: 评论
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols  28th
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Proto...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Sarenche, Roozbeh Nikova, Svetla Preneel, Bart Katholieke Univ Leuven COSIC Leuven Belgium
It has been shown that the selfish mining attack enables a miner to achieve an unfair relative revenue, posing a threat to the progress of longest-chain blockchains. Although selfish mining is a well-studied attack in...
来源: 评论
Federated Learning-Based Tokenizer for Domain-Specific Language Models in Finance  16th
Federated Learning-Based Tokenizer for Domain-Specific Langu...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Damoun, Farouk Seba, Hamida State, Radu Univ Luxembourg Luxembourg Luxembourg Univ Claude Bernard Lyon 1 Lyon France CNRS UCBL INSA Lyon LIRISUMR 5205 Villeurbanne France
The Federated Byte-level Byte-Pair Encoding (BPE) Tokenizer (FedByteBPE) leverages a Federated Learning (FL) approach for a privacy-preserving approach to train language models tokenizer across distributed datasets. T...
来源: 评论
An Analysis of Fixed-Spread Liquidation Lending in DeFi  9th
An Analysis of Fixed-Spread Liquidation Lending in DeFi
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Moallemi, Ciamac Patange, Utkarsh Columbia Business Sch New York NY 10027 USA
We model and analyze fixed spread liquidation in DeFi lending as implemented by popular pooled lending protocols such as AAVE, JustLend, and Compound. Empirically, we observe that over 70% of liquidations occur in the...
来源: 评论
The Emergence of Threads: The Birth of a New Social Network  16th
The Emergence of Threads: The Birth of a New Social Network
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Zhang, Peixian He, Yupeng Ehsan-Ul Haq He, Jiahui Tyson, Gareth Hong Kong Univ Sci & Technol GZ Guangzhou Peoples R China
Threads, a new microblogging platform from Meta, was launched in July 2023. In contrast to prior new platforms, Threads was born from an existing parent platform, Instagram, for which all users must already possess an...
来源: 评论
Optimizing Airline Destinations with AIRNODE: A Graph Attention Network Approach  16th
Optimizing Airline Destinations with AIRNODE: A Graph Attent...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Shaik, Abdul Raheem Alhamadani, Abdulaziz Sarkar, Shailik Lu, Chang-Tien Virginia Tech Bradley Dept Elect & Comp Engn Falls Church VA 22043 USA Florida Polytech Univ Dept Data Sci & Business Analyt Lakeland FL 33805 USA Virginia Tech Dept Comp Sci Falls Church VA 22043 USA
The airline industry faces the critical challenge of meeting increasing passenger expectations amidst rapid technological advancements and intense competition. To remain competitive, airlines must gain a deeper unders...
来源: 评论
Shared Sequencing and Latency Competition as a Noisy Contest  28th
Shared Sequencing and Latency Competition as a Noisy Contest
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Mamageishvili, Akaki Schlegel, Christoph Offchain Labs Zurich Switzerland Flashbots Zurich Switzerland
We study shared sequencing for different chains from an economic angle. We introduce a minimal non-trivial model that captures cross-domain arbitrageurs' behavior and compare the performance of shared sequencing t...
来源: 评论