咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是4761-4770 订阅
排序:
Noise Robustness of a Multiparty Quantum Summation Protocol  24th
Noise Robustness of a Multiparty Quantum Summation Protocol
收藏 引用
24th International Conference on Computational science (ICCS)
作者: Rodriguez-Otero, Anton Neumann, Niels M. P. van Der Schoot, Ward Wezeman, Robert Netherlands Org Appl Sci Res The Hague Netherlands
Connecting quantum computers to a quantum network opens a wide array of new applications, such as securely performing computations on distributed data sets. Near-term quantum networks are noisy, however, and hence cor... 详细信息
来源: 评论
Cross-Layer Profiling of IoTBench  1
收藏 引用
15th BenchCouncil International Symposium on Benchmarking, Measuring and Optimizing (Bench)
作者: Zhang, Fan Wang, Chenxi Luo, Chunjie Wang, Lei Chinese Acad Sci Inst Comp Technol Beijing 100190 Peoples R China Univ Chinese Acad Sci Sch Comp Sci & Technol Beijing 100049 Peoples R China Int Open Benchmark Council BenchCouncil Beijing Peoples R China
The rapid expansion of the Internet of Things (IoT) industry highlights the significance of workload characterization when evaluating microprocessors tailored for IoT applications. The streamlined yet comprehensive sy...
来源: 评论
Improving the Rectangle Attack on GIFT-64  30th
Improving the Rectangle Attack on GIFT-64
收藏 引用
30th Annual International Research Conference on Selected Areas in Cryptography (SAC)
作者: Chen, Yincen Zhang, Nana Liang, Xuanyu Song, Ling Yang, Qianqian Feng, Zhuohui Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Chinese Acad Sci Inst Informat Engn Key Lab Cyberspace Secur Def Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
GIFT is a family of lightweight block ciphers based on SPN structure and composed of two versions named GIFT-64 and GIFT-128. In this paper, we reevaluate the security of GIFT-64 against the rectangle attack under the...
来源: 评论
Global Sensitivity Analysis of Thrombus Formation in the Left Atrial Appendage of Atrial Fibrillation Patients  14th
Global Sensitivity Analysis of Thrombus Formation in the Lef...
收藏 引用
14th International Workshop on Statistical Atlases and Computational Modelling of the Heart (STACOM)
作者: Smine, Zineb Melidoro, Paolo Qureshi, Ahmed Longobardi, Stefano Williams, Steven E. Aslanidi, Oleg De Vecchi, Adelaide Kings Coll London Sch Biomed Engn & Imaging Sci London England
Atrial Fibrillation (AF) is the most common type of cardiac arrhythmia. Most AF-related thrombi originate within the left atrial appendage (LAA). This study investigated the key factors influencing thrombus formation ...
来源: 评论
A New Blockage Detection Approach for 6G THz Systems  23rd
A New Blockage Detection Approach for 6G THz Systems
收藏 引用
23rd International Conference on Next Generation Wired/Wireless Networks and Systems (NEW2AN) / 16th Conference on Internet of Things and Smart Spaces (RuSMART)
作者: Khakimov, Abdukodir Prikhodko, Anatoliy Mokrov, Evgeny Begishev, Vyacheslav Shurakov, Alexander Gol'tsman, Gregory Moscow Pedag State Univ Moscow Russia Natl Res Univ Higher Sch Econ Moscow Russia Peoples Friendship Univ Russia RUDN Univ Moscow Russia
Blockage detection is a critical functionality for the air interface in modern 5G and future 6G systems operating in millimeter wave (mmWave, 30-300 GHz) and terahertz (0.3-3 THz) frequency bands. In operational syste...
来源: 评论
Recursion-Theoretic Alternation  20th
Recursion-Theoretic Alternation
收藏 引用
20th Conference on Computability in Europe (CiE)
作者: Skapinakis, Eduardo NOVA Sch Sci & Technol NOVA FCT Ctr Math & Applicat NOVA Math Setubal Portugal Univ Tubingen Carl Friedrich von Weizsacker Zentrum Tubingen Germany
We introduce four recursion schemes, which, operating on a tree-like data structure, capture different models of computation based on alternating bounded quantifiers. By encoding inputs as paths, we recover and expand...
来源: 评论
Exploring Self-competition as a Viable Motivation to Promote Physical Activity  1
收藏 引用
19th International Conference on Persuasive Technology (PERSUASIVE)
作者: Hyypio, Henna Giri, Sarthak Oinas-Kukkonen, Harri Univ Oulu Oulu Adv Res Serv & Informat Syst Oulu 90570 Finland
Persuasive systems design encompasses a wide range of concepts that may help users be motivated to achieve the targeted goal or behavior change. This study evaluates contemporary applications that seek to promote phys...
来源: 评论
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning  29th
Exploiting Layerwise Feature Representation Similarity For B...
收藏 引用
29th European Symposium on Research in computer Security (ESORICS)
作者: Walter, Kane Nepal, Surya Kanhere, Salil Univ New South Wales Kensington NSW 2033 Australia CSIRO Data61 Marsfield NSW 2122 Australia
Federated learning is an emerging paradigm for distributed machine learning that enables clients to collaboratively train models while maintaining data privacy. However, this approach introduces vulnerabilities, notab...
来源: 评论
HiFi-WaveGAN: Generative Adversarial Network with Auxiliary Spectrogram-Phase Loss for High-Fidelity Singing Voice Generation  18th
HiFi-WaveGAN: Generative Adversarial Network with Auxiliary ...
收藏 引用
18th International Conference on Neural Networks (ISNN)
作者: Wang, Chunhui Zeng, Chang Chen, Jun Xue, Ouyang Geely Hangzhou Peoples R China Natl Inst Informat Tokyo Japan Tsinghua Univ Shenzhen Int Grad Sch Beijing Peoples R China Yunnan Univ Sch Informat Sci & Engn Kunming Peoples R China
Entertainment-oriented singing voice synthesis (SVS) requires a vocoder to generate high-fidelity (e.g. 48 kHz) audio. However, most text-to-speech (TTS) vocoders cannot reconstruct the waveform well in this scenario....
来源: 评论
Tabulation with Zippers  17th
Tabulation with Zippers
收藏 引用
17th International Symposium on Functional and Logic Programming (FLOPS)
作者: Viera, Marcos Pardo, Alberto Saraiva, Joao Univ Republica Inst Comp Montevideo Uruguay Univ Minho Dept Informat Braga Portugal Univ Minho INESC TEC HASLab Braga Portugal
Tabulation is a well-known technique for improving the efficiency of recursive functions with redundant function calls. A key point in the application of this technique is to identify a suitable representation for the...
来源: 评论