咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300228 条 记 录,以下是21-30 订阅
排序:
Optimizing Airline Destinations with AIRNODE: A Graph Attention Network Approach  16th
Optimizing Airline Destinations with AIRNODE: A Graph Attent...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Shaik, Abdul Raheem Alhamadani, Abdulaziz Sarkar, Shailik Lu, Chang-Tien Virginia Tech Bradley Dept Elect & Comp Engn Falls Church VA 22043 USA Florida Polytech Univ Dept Data Sci & Business Analyt Lakeland FL 33805 USA Virginia Tech Dept Comp Sci Falls Church VA 22043 USA
The airline industry faces the critical challenge of meeting increasing passenger expectations amidst rapid technological advancements and intense competition. To remain competitive, airlines must gain a deeper unders...
来源: 评论
Regulatory Implications of MEV Mitigations  9th
Regulatory Implications of MEV Mitigations
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Ji, Yan Grimmelmann, James Cornell Tech New York NY 10044 USA
This paper examines the legal ramifications of Miner / Maximal Extractable Value (MEV), a phenomenon in which some entities (e.g., miners or validators) leverage their positional advantages to generate extra profits o...
来源: 评论
Evaluating LLMs Capabilities Towards Understanding Social Dynamics  16th
Evaluating LLMs Capabilities Towards Understanding Social Dy...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Tahir, Anique Cheng, Lu Sandoval, Manuel Silva, Yasin N. Hall, Deborah L. Liu, Huan Arizona State Univ Sch Comp & AI Tempe AZ 85287 USA Univ Illinois Chicago IL USA Loyola Univ Chicago Chicago IL 60611 USA Arizona State Univ Sch Social & Behav Sci Glendale AZ USA
Social media discourse involves people from different backgrounds, beliefs, and motives. Thus, often such discourse can devolve into toxic interactions. Generative Models, such as Llama and ChatGPT, have recently expl...
来源: 评论
Robust Stance Detection: Understanding Public Perceptions in Social Media  16th
Robust Stance Detection: Understanding Public Perceptions in...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Kim, Nayoung Mosallanezhad, David Cheng, Lu Mancenido, Michelle V. Liu, Huan Arizona State Univ Tempe AZ 85281 USA NVIDIA Santa Clara CA 95051 USA Univ Illinois Chicago IL 60607 USA Arizona State Univ West Valley Campus Glendale AZ 85306 USA
The abundance of social media data has presented opportunities for accurately determining public and group-specific stances around policy proposals or controversial topics. In contrast with sentiment analysis which fo...
来源: 评论
Dynamic Inter-organizational Communication Network in a Post-merger Integration  16th
Dynamic Inter-organizational Communication Network in a Post...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Benzinger, Michael Ghawi, Raji Zenk, Lukas Pfeffer, Juergen Tech Univ Munich Arcisstr 21 D-80333 Munich Germany Danube Univ Krems Dr Karl Dorrek Str 30 A-3500 Krems Austria
During a Post-Merger Integration, the communication structure of an organization changes profoundly. Effective communication and personal interaction are crucial for the success of Mergers and Acquisitions, as many su...
来源: 评论
Medical Report Generation from Medical Images Using Vision Transformer and Bart Deep Learning Architectures  16th
Medical Report Generation from Medical Images Using Vision T...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Ucan, Murat Kaya, Buket Kaya, Mehmet Alhajj, Reda Dicle Univ Dept Comp Technol Diyarbakir Turkiye Firat Univ Dept Elect & Automat Elazig Turkiye Firat Univ Dept Comp Engn Elazig Turkiye Univ Calgary Dept Comp Sci Calgary AB Canada
Generating medical reports from medical images using traditional methods is a time-consuming process that is prone to human error and requires experience. Failure to generate fast reports from medical images delays th...
来源: 评论
Exploring Behavioral Tendencies on Social Media: A Perspective Through Claim Check-Worthiness  16th
Exploring Behavioral Tendencies on Social Media: A Perspecti...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Zhang, Zeyu Zhu, Zhengyuan Zhang, Haiqi Li, Chengkai Univ Texas Arlington Arlington TX 76019 USA
This study examines how factual claims of different significance influence and reflect social media users' behavioral patterns. Leveraging "check-worthiness" as a measure of the factual significance of c...
来源: 评论
Whispers of Trauma: Leveraging Social Media for Assessing Mental Health in Victims of Childhood Sexual Abuse  16th
Whispers of Trauma: Leveraging Social Media for Assessing Me...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Phukan, Orchid Chetia Sharma, Rajesh Buduru, Arun Balaji IIIT Delhi New Delhi India Univ Tartu Tartu Estonia
Warning: Reader discretion is recommended as our study tackles topics such as child sexual abuse, molestation, etc. Online Social Media (OSM) is increasingly being used by individuals with different mental health prob...
来源: 评论
Scam Token Detection Based on Static Analysis Before Contract Deployment  9th
Scam Token Detection Based on Static Analysis Before Contrac...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Igarashi, Taichi Matsuura, Kanta Fast Retailing Tokyo Japan Univ Tokyo Tokyo Japan
In recent years, the number of crimes using smart contracts has increased. In particular, fraud using tokens, such as rug-pull, has become an ignorable issue in the field of decentralized finance because a lot of user...
来源: 评论
Don't Do That! Reverse Role Prompting Helps Large Language Models Stay in Personality Traits  17th
Don't Do That! Reverse Role Prompting Helps Large Language M...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Chen, Siyuan Taveekitworachai, Pittawat Xia, Yi Li, Xiaoxu Gursesli, Mustafa Can Lanata, Antonio Guazzini, Andrea Thawonmas, Ruck Ritsumeikan Univ Grad Sch Informat Sci & Engn Ibaraki Japan Univ Firenze Dept Informat Engn Florence Italy Univ Firenze Dept Educ Literatures Intercultural Studies Langu Florence Italy Ritsumeikan Univ Coll Informat Sci & Engn Ibaraki Japan
This paper investigates effectiveness of role prompting, an approach used to condition a large language model (LLM) with a role or personality trait. Conditioning an LLM with a specific role or personality trait is cr...
来源: 评论