咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300228 条 记 录,以下是31-40 订阅
排序:
Weaponizing the Wall: The Role of Sponsored News in Spreading Propaganda on Facebook  16th
Weaponizing the Wall: The Role of Sponsored News in Spreadin...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Singh, Daman Deep Chauhan, Gaurav Nguyen, Minh-Kha Goga, Oana Chakraborty, Abhijnan Indian Inst Technol Delhi New Delhi India Univ Grenoble Alpes Grenoble France Inst Polytech Paris CNRS INRIA Paris France Indian Inst Technol Kharagpur Kharagpur W Bengal India
A large fraction of people today consume most of their news online, and social media platforms like Facebook play a significant role in directing traffic to news articles. While news organizations often use Facebook a...
来源: 评论
On Mining Dynamic Graphs for k Shortest Paths  16th
On Mining Dynamic Graphs for k Shortest Paths
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: D'Ascenzo, Andrea D'Emidio, Mattia Luiss Univ Rome Italy Univ Aquila Laquila Italy
Mining graphs, upon query, for k shortest paths between vertex pairs is a prominent primitive to support several analytics tasks on complex networked datasets. The state-of-the-art method to implement this primitive i...
来源: 评论
You Must Be a Trump Supporter: Political Identity Projections on the Social Web  16th
You Must Be a Trump Supporter: Political Identity Projection...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Mittal, Shubh Chawla, Tisha KhudaBukhsh, Ashiqur R. Vellore Inst Technol Vellore 632014 Tamil Nadu India Rochester Inst Technol Rochester NY 14623 USA
This paper contains offensive content. This paper assesses the extent of political polarization in the United States by demonstrating the phenomenon of political identity projection, where individuals attribute politi...
来源: 评论
Emotional Believability of Non-playable Game Characters - Animations of Anger, Sadness and Happiness  17th
Emotional Believability of Non-playable Game Characters - An...
收藏 引用
17th International Conference on Interactive Digital Storytelling
作者: Johansson, Therese Eladhari, Mirjam Palosaari Stockholm Univ Stockholm Sweden
This study investigates the relationship between the perceived believability of NPC animations and their portrayal of three core emotional expressions: anger, sadness and happiness in well-known, recently released, ch...
来源: 评论
HyperSMOTE-MC: Enhancing Multiclass Bot Detection on X Through Hypergraph-Based Resampling  16th
HyperSMOTE-MC: Enhancing Multiclass Bot Detection on X Throu...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: AlKulaib, Lulwah Lu, Chang-Tien Sabah AlSalem Univ City Kuwait Univ Dept Comp Sci Kuwait Kuwait Virginia Tech Dept Comp Sci Falls Church VA 22043 USA
The complexity and variety of bot behaviors on social media platforms like X (formerly Twitter) demand advanced detection methods that can handle multiclass imbalances effectively. Existing binary classification metho...
来源: 评论
PRAGyan - Connecting the Dots in Tweets  16th
PRAGyan - Connecting the Dots in Tweets
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Ravi, Rahul Ginde, Gouri Rokne, Jon Univ Calgary Calgary AB T2N 1N4 Canada
Understanding the underlying reasons behind events and statements is crucial for businesses, policymakers, and researchers. In this research the data available from social media platform is analyzed, aiming to extract...
来源: 评论
Balancing Efficiency and Quality in LLM-Based Entity Resolution on Structured Data  16th
Balancing Efficiency and Quality in LLM-Based Entity Resolut...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Nananukul, Navapat Kekriwal, Mayank Univ Southern Calif Inst Informat Sci Los Angeles CA 90292 USA
Entity Resolution (ER) is the problem of automatically determining when two or more entities refer to the same underlying entity. ER has been researched for over fifty years across multiple domains (including healthca...
来源: 评论
Shoal: Improving DAG-BFT Latency and Robustness  28th
Shoal: Improving DAG-BFT Latency and Robustness
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Spiegelman, Alexander Arun, Balaji Gelashvili, Rati Li, Zekun Aptos Labs Palo Alto CA 94301 USA
The Narwhal system is a state-of-the-art Byzantine fault-tolerant (BFT) scalable architecture that involves constructing a directed acyclic graph (DAG) of messages among a set of validators in a Blockchain network. Bu...
来源: 评论
FairNet: A Genetic Framework to Reduce Marginalization in Social Networks  16th
FairNet: A Genetic Framework to Reduce Marginalization in So...
收藏 引用
16th International Conference on Social Networks Analysis and Mining
作者: Mazzoni, Federico Failla, Andrea Rossetti, Giulio Univ Pisa Dept Comp Sci I-56127 Pisa Italy CNR ISTI Natl Res Council I-56127 Pisa Italy
Discrimination in social networks often assumes the form of marginalization against nodes with specific features, e.g., segregation of/against minorities. In this work, we propose a metric that proxies social discrimi...
来源: 评论
Towards Practical Doubly-Efficient Private Information Retrieval  28th
Towards Practical Doubly-Efficient Private Information Retri...
收藏 引用
28th International Conference on Financial Cryptography and Data Security
作者: Okada, Hiroki Player, Rachel Pohmann, Simon Weinert, Christian Royal Holloway Univ London London England KDDI Res Fujimino Japan Univ Tokyo Bunkyo Japan
Private information retrieval (PIR) protocols allow clients to access database entries without revealing the queried indices. They have many real-world applications, including privately querying patent-, compromised c...
来源: 评论