咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 606 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是4781-4790 订阅
排序:
R-DiP: Re-ranking Based Diffusion Pre-computation for Image Retrieval  35th
R-DiP: Re-ranking Based Diffusion Pre-computation for Image ...
收藏 引用
35th International Conference on Database and Expert Systems Applications (DEXA)
作者: Kato, Tatsuya Komamizu, Takahiro Ide, Ichiro Nagoya Univ Nagoya Aichi Japan
In image retrieval tasks, although efficient methods based on pre-computing information related to retrieval and effective methods utilizing re-ranking have been proposed, developing a method that achieves both effici...
来源: 评论
Diversity Improved Genetic Algorithm for Weapon Target Assignment  15th
Diversity Improved Genetic Algorithm for Weapon Target Assig...
收藏 引用
15th International Conference on Advances in Swarm Intelligence (ICSI)
作者: Weng, Nianfeng Liu, Yi Zheng, Qibin Duan, Weiwei Liu, Kun Qin, Wei Natl Univ Def Technol Res Inst 63 Nanjing 210007 Peoples R China Acad Mil Sci Beijing 100091 Peoples R China Natl Def Univ Joint Operat Coll Shijiazhuang 050000 Hebei Peoples R China
There are many optimization problems inmilitary applications, among which the weapon target assignment (WTA) problem is the most typical and the most widely studied problem. Plenty of evolutionary algorithms-based met...
来源: 评论
Local Alterations of the Lagrange Multipliers for Enhancing the Filtering of the AtMostNValue Constraint  1
收藏 引用
21st International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research (CPAIOR)
作者: Berthiaume, Frederic Quimper, Claude-Guy Univ Laval Quebec City PQ Canada
The reduced cost filtering is a technique that consists in filtering a constraint using the reduced cost of a linear program that encodes this constraint. Sellmann [16] shows that while doing a Lagrangian relaxation o...
来源: 评论
Feature Selection for Malapposition Detection in Intravascular Ultrasound - A Comparative Study  2nd
Feature Selection for Malapposition Detection in Intravascul...
收藏 引用
2nd International Workshop on Applications of Medical Artificial Intelligence (AMAI)
作者: Kashyap, Satyananda Karani, Neerav Shang, Alexander D'Souza, Niharika Dey, Neel Jain, Lay Wang, Ray Akakin, Hatice Li, Qian Li, Wenguang Carlson, Corydon Golland, Polina Syeda-Mahmood, Tanveer IBM Res San Jose CA 95120 USA MIT Cambridge MA 02139 USA Boston Sci Maple Grove MN 55311 USA
Coronary atherosclerosis is a leading cause of morbidity and mortality worldwide. It is often treated by placing stents in the coronary arteries. Inappropriately placed stents or malappositions can result in post-inte...
来源: 评论
Self-supervised Pre-training of Text Recognizers  18th
Self-supervised Pre-training of Text Recognizers
收藏 引用
18th International Conference on Document Analysis and Recognition (ICDAR)
作者: Kiss, Martin Hradis, Michal Brno Univ Technol Fac Informat Technol Brno Czech Republic
In this paper, we investigate self-supervised pre-training methods for document text recognition. Nowadays, large unlabeled datasets can be collected for many research tasks, including text recognition, but it is cost...
来源: 评论
A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing  1
收藏 引用
9th International Conference on Pattern Recognition and Machine Intelligence (PReMI)
作者: Muhammed, Ajnas Pais, Alwyn Roshan Natl Inst Technol Surathkal Informat Secur Res Lab Mangalore Karnataka India
In fingerprint-based authentication system, cancelable fingerprint templates are generated to defend the fingerprint information. In this paper, we proposed a novel cancelable fingerprint template using Visual Secret ...
来源: 评论
Leakage Certification Made Simple  44th
Leakage Certification Made Simple
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Chowdhury, Aakash Roy, Arnab Brunetta, Carlo Oswald, Elisabeth Univ Klagenfurt Klagenfurt Austria Univ Birmingham Birmingham W Midlands England Univ Innsbruck Innsbruck Austria
Side channel evaluations benefit from sound characterisations of adversarial leakage models, which are the determining factor for attack success. Two questions are of interest: can we define and estimate a quantity th...
来源: 评论
Logical Expressibility of Syntactic NL for Complementarity and Maximization  1
收藏 引用
30th International Workshop on Logic, Language, Information and Computation (WoLLIC)
作者: Yamakami, Tomoyuki Univ Fukui Fac Engn 3-9-1 Bunkyo Fukui 9108507 Japan
In a discussion on the computational complexity of "parameterized" NL (nondeterministic logarithmic-space complexity class), Syntactic NL or succinctly SNL was first introduced in 2017 as a "syntactical...
来源: 评论
Pest-YOLO: A Lightweight Pest Detection Model Based on Multi-level Feature Fusion  20th
Pest-YOLO: A Lightweight Pest Detection Model Based on Multi...
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Zhu, Xiaoyue Jia, Bing Huang, Baoqi Li, Haodong Liu, Xiaohao Seah, Winston K. G. Inner Mongolia Univ Coll Comp Sci Hohhot 010000 Inner Mongolia Peoples R China Minist Educ Engn Res Ctr Ecol Big Data Hohhot Peoples R China Victoria Univ Wellington Sch Engn & Comp Sci Wellington 6140 New Zealand
Accurate identification of forest and grassland pests is crucial for ecosystem stability and biodiversity. Given the characteristics of pests in forest and grassland environments-such as a wide variety of species, col...
来源: 评论
The Evolution of Immersive Video Creation  12th
The Evolution of Immersive Video Creation
收藏 引用
12th International Conference on Distributed, Ambient and Pervasive Interactions (DAPI)
作者: Yi, Yuxiao Li, Xinyu Beijing Jiaotong Univ Sch Architecture & Design Beijing Peoples R China Beijing Jiaotong Univ Beijing Peoples R China
XR technology leads the arrival of spatial computing, and outlines a clearer form for the immersive experience of image -- "ultimate cinema". From the birth of film to interactive film, to VR film and game, ...
来源: 评论