咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是4711-4720 订阅
排序:
Dynamic Resolution Network for Kidney Tumor Segmentation  1
收藏 引用
3rd International Challenge on Kidney and Kidney Tumor Segmentation (KiTS)
作者: Liu, Shuolin Han, Bing Canon Med Syst China Co Ltd Beijing Peoples R China
Segmentation of kidneys, kidney tumors and kidney cysts from contrast-enhanced CT images has significant potential to facilitate large-scale imaging and radiological analysis. However, the task is challenging due to t...
来源: 评论
Towards Pricing4SaaS: A Framework for Pricing-Driven Feature Toggling in SaaS  24th
Towards Pricing4SaaS: A Framework for Pricing-Driven Feature...
收藏 引用
24th International Conference Web Engineering (ICWE)
作者: Garcia-Fernandez, Alejandro Antonio Parejo, Jose Trinidad, Pablo Ruiz-Cortes, Antonio Univ Seville I3US Inst SCORE Lab Seville Spain
In a rapidly evolving digital marketplace, the ability to enable features and services dynamically on SaaS products in alignment with market conditions and pricing strategies is essential for sustaining competitivenes...
来源: 评论
Design Research of User-Driven Mobile Sleep Aid Audio App Based on User Needs  5th
Design Research of User-Driven Mobile Sleep Aid Audio App Ba...
收藏 引用
5th International Conference on Human-Centered Design, Operation and Evaluation of Mobile Communications held as Part of the 26th International Conference on Human-computer Interaction (HCII)
作者: Guo, Chang Li, Anglu Sichuan Univ Arts Coll Chengdu 610207 Sichuan Peoples R China
With the development of society and the accelerated pace of life, insomnia has become a problem that affects people's physical and mental health. How to alleviate the problem of insomnia and improve the quality of...
来源: 评论
Attacking a Levelled Fully Homomorphic Encryption System with Topological Data Analysis  8th
Attacking a Levelled Fully Homomorphic Encryption System wit...
收藏 引用
8th International Conference on Mathematical Software (ICMS)
作者: Kaushik, Aaruni Univ Kaiserslautern Landau Kaiserslautern Germany
In this paper, we study the Fully Homomorphic Encryption system proposed by Craig Gentry, Amit Sahai, and Brent Waters in [3]. We present a restated version of the proposed cryptosystem, and consider the ciphertexts r...
来源: 评论
Massive Conscious Neighborhood-Based Crow Search Algorithm for the Pseudo-Coloring Problem  15th
Massive Conscious Neighborhood-Based Crow Search Algorithm f...
收藏 引用
15th International Conference on Advances in Swarm Intelligence (ICSI)
作者: Viana, Monique Simplicio Contreras, Rodrigo Colnago Pessoa, Paulo Cavalcanti dos Santos Bongarti, Marcelo Adriano Zamani, Hoda Guido, Rodrigo Capobianco Morandin Junior, Orides Univ Fed Sao Carlos Sao Carlos SP Brazil Sao Paulo State Univ UNESP Inst Biosci Letters & Exact Sci Sao Jose Do Rio Preto SP Brazil Univ Sao Paulo Sao Carlos SP Brazil Weierstr Inst Berlin Germany Islamic Azad Univ Fac Comp Engn Najafabad Iran Islamic Azad Univ Najafabad Branch Big Data Res Ctr Najafabad Iran
The pseudo-coloring problem (PsCP) is a combinatorial optimization challenge that involves assigning colors to elements in a way that meets specific criteria, often related to minimizing conflicts or maximizing some f...
来源: 评论
Exploring Alternative Machine Learning Models for Variable Ordering in Cylindrical Algebraic Decomposition  8th
Exploring Alternative Machine Learning Models for Variable O...
收藏 引用
8th International Conference on Mathematical Software (ICMS)
作者: John, Rohit Davenport, James Univ Bath Bath BA2 7AY Avon England
Cylindrical Algebraic Decomposition is a computer algebra tool with many applications, from robotics to biochemistry. But it can be very sensitive to the ordering of the variables, which may be partially prescribed by... 详细信息
来源: 评论
Improving Comprehensibility of Event-Driven Microservice Architectures by Graph-Based Visualizations  18th
Improving Comprehensibility of Event-Driven Microservice Arc...
收藏 引用
18th European Conference on Software Architecture (ECSA)
作者: Schoop, Sven Hebisch, Erik Franz, Thomas Univ Appl Sci Duesseldorf Dusseldorf Germany Ausbildung De GmbH Bochum Germany
This paper presents an industrial case study examining challenges faced by software architects and developers during planning and assessing the correctness of event-driven communication behaviour. We present a novel a...
来源: 评论
A Streaming Approach to Neural Team Formation Training  46th
A Streaming Approach to Neural Team Formation Training
收藏 引用
46th European Conference on Information Retrieval (ECIR)
作者: Fani, Hossein Barzegar, Reza Dashti, Arman Saeedi, Mahdis Univ Windsor Windsor ON Canada
Predicting future successful teams of experts who can effectively collaborate is challenging due to the experts' temporality of skill sets, levels of expertise, and collaboration ties, which is overlooked by prior...
来源: 评论
How (not) to Build Quantum PKE in Minicrypt  44th
How (not) to Build Quantum PKE in Minicrypt
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Li, Longcheng Li, Qian Li, Xingjian Liu, Qipeng Chinese Acad Sci Inst Comp Technol State Key Lab Processors Beijing Peoples R China Shenzhen Res Inst Big Data Shenzhen Int Ctr Ind & Appl Math Shenzhen Peoples R China Tsinghua Univ Beijing Peoples R China Univ Calif San Diego San Diego CA 92103 USA
The seminal work by Impagliazzo and Rudich (STOC'89) demonstrated the impossibility of constructing classical public key encryption (PKE) from one-way functions (OWF) in a black-box manner. Quantum information has...
来源: 评论
CtxFuzz: Discovering Heap-Based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing  18th
CtxFuzz: Discovering Heap-Based Memory Vulnerabilities Throu...
收藏 引用
18th International Conference on Theoretical Aspects of Software Engineering (TASE)
作者: Jiang, Jiacheng Wen, Cheng Qin, Shengchao Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen Peoples R China Xidian Univ Guangzhou Inst Technol Xian Peoples R China
Heap-based memory vulnerabilities are significant contributors to software security and reliability. The presence of these vulnerabilities is influenced by factors such as code coverage, the frequency of heap operatio...
来源: 评论