咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是4751-4760 订阅
排序:
Spatial and Multivariate Statistics in Assessing Water Quality in the North Sea  24th
Spatial and Multivariate Statistics in Assessing Water Quali...
收藏 引用
24th International Conference on Computational science and Its Applications (ICCSA)
作者: Ody, Christopher Ramos, M. Rosario Carolino, E. Univ Aberta Lisbon Portugal Inst Politecn Lisboa H & TRC Hlth & Technol Res Ctr ESTeSL Escola Super Tecnol Saude Lisbon Portugal Univ Lisbon Fac Ciencias CEAUL Ctr Estat & Aplicacoes Lisbon Portugal
The Southern North Sea region plays a vital role for both the economy and society of the surrounding countries. Analyzing the quality of your water is a critical process that involves an assessment of physical, chemic...
来源: 评论
A Valuable Brownfield Site by the Sea Awaiting Regeneration: The Case of the Lipari Pumice Quarries  24th
A Valuable Brownfield Site by the Sea Awaiting Regeneration:...
收藏 引用
24th International Conference on Computational science and Its Applications (ICCSA)
作者: Aversa, Clara Stella Vicari Mediterranea Univ Reggio Calabria UNIRC Dept Architecture & Terr dArTe I-89124 Reggio Di Calabria Italy
The history of pumice and obsidian extraction has ancient roots and identity for the island of Lipari, representing an activit`y of great value, to be protected and promoted. The largest of the Aeolian islands has had...
来源: 评论
Persuasive Technology Through Behavior and Emotion with Pet-Type Artifacts  1
收藏 引用
19th International Conference on Persuasive Technology (PERSUASIVE)
作者: Harada, Rio Sumi, Kaoru Future Univ Hakodate Grad Sch Syst Informat Sci Hakodate Japan
This study examined the behaviors and emotional expressions that artifacts such as four-legged pets use to persuade people. On the basis of a preliminary study, we created six types of emotional expressions (joy, sadn...
来源: 评论
Edge-Dominance Games on Graphs  17th
Edge-Dominance Games on Graphs
收藏 引用
17th International Symposium on Algorithmic Game Theory (SAGT)
作者: Arthaud, Farid Orzech, Edan Rinard, Martin MIT CSAIL Cambridge MA 02139 USA
We consider zero-sum games in which players move between adjacent states, where in each pair of adjacent states one state dominates the other. The states in our game can represent positional advantages in physical con...
来源: 评论
Non-local Temporal Modeling for Practical Skeleton-Based Gait Recognition  6th
Non-local Temporal Modeling for Practical Skeleton-Based Gai...
收藏 引用
6th Chinese Conference on Pattern Recognition and computer Vision (PRCV)
作者: Peng, Pengyu Deng, Zongyong Zhu, Feiyu Zhao, Qijun Sichuan Univ Sch Comp Sci & Technol Chengdu Peoples R China
Gait, a unique biometric identifier for recognizing individual identity at a distance, plays an important role in practical applications. Existing gait recognition methods utilize either a gait set or a sequence. Howe...
来源: 评论
Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method  21st
Evading Userland API Hooking, Again: Novel Attacks and a Pri...
收藏 引用
21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
作者: Assaiante, Cristian Nicchi, Simone D'Elia, Daniele Cono Querzoni, Leonardo Sapienza Univ Rome Rome Italy
Monitoring how a program utilizes userland APIs is behind much dependability and security research. To intercept and study their invocations, the established practice targets the prologue of API implementations for in...
来源: 评论
Assessing the Optimal Scenario of Collective Self-Consumption Groups in Net Zero Condominiums  1
收藏 引用
24th International Conference on Computational science and Its Applications (ICCSA)
作者: Trevisan, Riccardo Ghiani, Emilio Ladu, Mara Balletto, Ginevra Univ Cagliari Dept Elect & Elect Engn Via Marengo 2 I-09123 Cagliari Italy Univ Cagliari Dept Civil & Environm Engn & Architecture Via Marengo 2 I-09123 Cagliari Italy
The energy transition promoted in European countries to improve the sustainability of the energy sector brings together citizens to generate, share and sell energy produced by locally owned renewable plants. Energy co...
来源: 评论
1<SUP>st</SUP> Workshop on Information Retrieval for Understudied Users (IR4U2)  46th
1<SUP>st</SUP> Workshop on Information Retrieval for Underst...
收藏 引用
46th European Conference on Information Retrieval (ECIR)
作者: Pera, Maria Soledad Cena, Federica Huibers, Theo Landoni, Monica Mauro, Noemi Murgia, Emiliana Delft Univ Technol Web Informat Syst Delft Netherlands Univ Turin Turin Italy Univ Twente Enschede Netherlands Univ Svizzera italiana Lugano Switzerland Univ Genoa Genoa Italy
Information Retrieval (IR) remains an active, fast-paced area of research. However, most advances in IR have predominantly benefited the so-called &quot;classical&quot; users, e.g., English-speaking adults. We envisio...
来源: 评论
Knowledge Distillation with Classmate  20th
Knowledge Distillation with Classmate
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Su, Hongwei Liu, Han Cao, Weipeng Ming, Zhong Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen 518060 Peoples R China Shenzhen Univ Guangdong Prov Key Lab Intelligent Informat Proce Shenzhen 518060 Peoples R China Guangdong Lab Artificial Intelligence & Digital E Shenzhen 518060 Peoples R China
Knowledge distillation, as a type of model compression algorithms, has been popularly adopted due to its easy implementation and effectiveness. However, transferring knowledge from a teacher network to a student one e...
来源: 评论
Fast and Simple Point Operations on Edwards448 and E448  27th
Fast and Simple Point Operations on Edwards448 and E448
收藏 引用
27th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC)
作者: Li, Luying Yu, Wei Xu, Peng JinYinHu Lab Wuhan 430040 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Chinese Acad Sci Inst Informat Engn Key Lab Cyberspace Secur Def Beijing 100093 Peoples R China Huazhong Univ Sci & Technol Sch Cyber Sci & Engn Hubei Key Lab Distributed Syst Secur Wuhan 430074 Peoples R China
Since Edwards curves were introduced in elliptic curve cryptography, they have attracted a lot of attention. The twisted Edwards curves are defined by the equation E-a,E-d : ax(2) + y(2) = 1 + dx(2) y(2). Twisted Edwa...
来源: 评论