咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 605 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300226 条 记 录,以下是4971-4980 订阅
排序:
Design of Interactive Digital Virtual Display Application for Chinese Heritage Traditional Herbal Medicine Culture  12th
Design of Interactive Digital Virtual Display Application fo...
收藏 引用
12th International Conference on Culture and Computing (C and C) Held as Part of the 26th International Conference on Human-computer Interaction (HCII)
作者: Li, Haoru Feng, Binlin Su, Mingyang Liu, Zhuohua Shenzhen Univ Shenzhen Peoples R China Tsinghua Shenzhen Int Grad Sch Shenzhen Peoples R China
The project focuses on designing a platform using Unity3D technology to preserve intangible cultural heritage, emphasizing the pharmacological efficacy and processing of herbal treatments in traditional Chinese medici...
来源: 评论
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain  1
收藏 引用
24th World International Conference on Information Security Applications (WISA)
作者: Prihatno, Aji Teguh Suryanto, Naufal Larasati, Harashta Tatimma Oktian, Yustus Eko Le, Thi-Thu-Huong Kim, Howon Pusan Natl Univ Sch Comp Sci & Engn Busan 609735 South Korea Pusan Natl Univ Blockchain Platform Res Ctr Busan 609735 South Korea Pusan Natl Univ IoT Res Ctr Busan 609735 South Korea
Non-Fungible Tokens (NFTs) have transformed the digital asset landscape with unique ownership verification. However, securing NFT images remains a crucial challenge. This paper proposes a verification framework for NF...
来源: 评论
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations  28th
Identity-Based Matchmaking Encryption with Enhanced Privacy ...
收藏 引用
28th European Symposium on Research in computer Security (ESORICS)
作者: Boyen, Xavier Li, Qinyi QUT Brisbane Qld Australia Griffith Univ Brisbane Qld Australia
Identity-based matchmaking encryption (IB-ME), proposed by Ateniese et al. (Crypto 2019), is a type of matchmaking encryption (ME). In IB-ME, the sender can specify a target identity rcv during encryption, and the rec...
来源: 评论
scMulan: A Multitask Generative Pre-Trained Language Model for Single-Cell Analysis  28th
scMulan: A Multitask Generative Pre-Trained Language Model f...
收藏 引用
28th Annual International Conference on Research in Computational Molecular Biology (RECOMB)
作者: Bian, Haiyang Chen, Yixin Dong, Xiaomin Li, Chen Hao, Minsheng Chen, Sijie Hu, Jinyi Sun, Maosong Wei, Lei Zhang, Xuegong Tsinghua Univ Dept Automat MOE Key Lab Bioinformat & Bioinformat Div BNRIST Beijing Peoples R China Tsinghua Univ Dept Comp Sci & Technol Beijing Peoples R China Tsinghua Univ Ctr Synthet & Syst Biol Sch Life Sci & Sch Med Beijing Peoples R China
Gene expression could be perceived as a form of "cell language", with underlying regulatory mechanisms akin to biological grammar. Decoding this language is critical in understanding cellular functions and b...
来源: 评论
Maximizing Data Efficiency of HTR Models by Synthetic Text  16th
Maximizing Data Efficiency of HTR Models by Synthetic Text
收藏 引用
16th IAPR International Workshop on Document Analysis Systems (DAS)
作者: Muth, Markus Peer, Marco Kleber, Florian Sablatnig, Robert TU Wien Comp Vis Lab Favoritenstr 9 A-1040 Vienna Austria
The usability of synthetic handwritten text to improve machine learning models is assessed for the domain of HTR. Synthetic handwritten text is generated using an existing model based on a GAN. The output of this mode...
来源: 评论
Schatten Capped p Regularization for Robust Principle Component Analysis  40th
Schatten Capped p Regularization for Robust Principle Compon...
收藏 引用
40th computer Graphics International Conference (CGI)
作者: Yang, Lan Zhang, Bin Feng, Qingrong Liu, Xinling Wang, Jianjun Southwest Univ Coll Comp & Informat Sci Coll Software Chongqing 400715 Peoples R China Ningxia Med Univ Dept Neurosurg Gen Hosp Yinchuan 750001 Ningxia Peoples R China Southwest Univ Sch Math & Stat Chongqing 400715 Peoples R China
Robust Principal Component Analysis (RPCA) is widely used for low-rank matrix recovery, which restores low-rank structures in damaged data through matrix decomposition. Existing approaches adopt the nuclear norm as a ...
来源: 评论
A Modified Hopfield Model with Adjustable Activation Function for Buridan's Assay  18th
A Modified Hopfield Model with Adjustable Activation Functio...
收藏 引用
18th International Conference on Neural Networks (ISNN)
作者: Liu, Xingjian Du, Chuangyi Tao, Lingyi Tsinghua Univ Sch Biomed Engn Beijing Peoples R China Tsinghua Univ Sch Social Sci Dept Psychol Beijing Peoples R China
Previous findings suggest that the sensory neurons behind thirst and hunger are embedded in circulatory networks that project throughout the brain. The Buridan's assay tests how a hungry and thirsty animal makes u...
来源: 评论
A Bibliometric Analysis of Cognitive Load Sensing Methodologies and Its Applications  15th
A Bibliometric Analysis of Cognitive Load Sensing Methodolog...
收藏 引用
15th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management (DHM)
作者: Villarreal, Ryan Thomas Nordstrom, Parker Andrew Duffy, Vincent G. Purdue Univ Coll Engn Sch Ind Engn W Lafayette IN 47907 USA Purdue Univ Coll Engn Ray Ewry Sports Engn Ctr W Lafayette IN 47907 USA
Cognitive workload refers to the amount of mental resources a person expends while performing a task or processing information. Recent trends in the field have shown that cognitive load can be estimated through the us...
来源: 评论
A Holistic Approach to Elderly Safety: Sensor Fusion, Fall Detection, and Privacy-Preserving Techniques  11th
A Holistic Approach to Elderly Safety: Sensor Fusion, Fall D...
收藏 引用
11th Pacific-Rim Symposium on Image and Video Technology (PSIVT)
作者: Hoa Nguyen ThuGiang Mai Minh Nguyen Auckland Univ Technol Auckland New Zealand
In light of the rising need for elderly care, this paper introduces a comprehensive integrated system centered on ensuring the safety of solitary senior individuals, leveraging the capabilities of the Internet of Thin...
来源: 评论
Key Substructure Learning with Chemical Intuition for Material Property Prediction  29th
Key Substructure Learning with Chemical Intuition for Materi...
收藏 引用
29th International Conference on Database Systems for Advanced Applications (DASFAA)
作者: Zhang, Peiliang Yuan, Jingling Li, Lin Luo, Wen Hu, Jiwei Li, Xin Wuhan Univ Technol Sch Comp Sci & Artificial Intelligence Wuhan 430070 Peoples R China Wuhan Univ Technol Sch Sci Wuhan 430070 Peoples R China Wuhan Fiberhome Tech Serv Co Ltd Wuhan 430070 Peoples R China Univ Sci & Technol China Sch Informat Sci & Technol Hefei 230026 Peoples R China iFLYTEK Co Ltd Artificial Intelligence Res Inst Hefei 230088 Peoples R China
Substructures are crucial factors influencing material molecular properties, and the effective identification of molecular substructures can accelerate novel material discovery. The chemical intuition of irregularity ...
来源: 评论