咨询与建议

限定检索结果

文献类型

  • 282,612 篇 会议
  • 17,616 册 图书

馆藏范围

  • 299,997 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,825 篇 工学
    • 277,760 篇 计算机科学与技术...
    • 67,756 篇 软件工程
    • 14,904 篇 信息与通信工程
    • 8,424 篇 电气工程
    • 8,036 篇 控制科学与工程
    • 4,694 篇 生物医学工程(可授...
    • 985 篇 生物工程
    • 839 篇 光学工程
    • 610 篇 机械工程
    • 572 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 494 篇 交通运输工程
  • 35,922 篇 理学
    • 28,741 篇 数学
    • 5,545 篇 生物学
    • 1,703 篇 物理学
    • 1,138 篇 统计学(可授理学、...
    • 524 篇 系统科学
    • 486 篇 化学
  • 30,405 篇 医学
    • 22,130 篇 临床医学
    • 9,245 篇 特种医学
    • 3,041 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,802 篇 管理学
    • 6,500 篇 管理科学与工程(可...
    • 3,343 篇 图书情报与档案管...
    • 1,777 篇 工商管理
    • 743 篇 公共管理
  • 4,316 篇 教育学
    • 4,043 篇 教育学
  • 2,352 篇 法学
    • 2,009 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,824 篇 artificial intel...
  • 4,630 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,636 篇 software enginee...
  • 3,329 篇 machine learning
  • 3,242 篇 algorithm analys...
  • 3,224 篇 semantics
  • 2,287 篇 information stor...
  • 2,189 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,803 篇 database managem...
  • 1,791 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,772 篇 cryptography
  • 1,755 篇 software enginee...
  • 1,706 篇 data mining and ...

机构

  • 647 篇 univ chinese aca...
  • 539 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 358 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 244 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,286 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture notes in computer science,"
300228 条 记 录,以下是4991-5000 订阅
排序:
Multimodal Imaging Classification Based on Mixture Model Networks  15th
Multimodal Imaging Classification Based on Mixture Model Net...
收藏 引用
15th International Conference on Advances in Swarm Intelligence (ICSI)
作者: Li, Xuan Yu, Fuyuan Cui, Jiachen Liu, Ju Wu, Qiang Shandong Univ Sch Informat Sci & Engn Qingdao Peoples R China
In medical imaging, different modality reflect different clinical information due to their different imaging principles. Compared with single-modality imaging analysis, multimodal fusion technology can make use of com...
来源: 评论
CD-Font: One-Shot Font Generation via Conditional Diffusion Model with Disentangled Guidance  1
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Chen, Siyi Li, Zhenhua Liang, Dong Nanjing Univ Aeronaut & Astronaut Sch Comp Sci & Technol MIIT Key Lab Pattern Anal & Machine Intelligence Nanjing Peoples R China
One-shot font generation aims to create a new font. library by extracting style information from the reference font. Most existing font generation methods rely on GAN-based image-to-image translation frameworks, which...
来源: 评论
Safe and Infinite Resource Scheduling Using Energy Timed Automata  18th
Safe and Infinite Resource Scheduling Using Energy Timed Aut...
收藏 引用
18th International Conference on Theoretical Aspects of Software Engineering (TASE)
作者: Cuijpers, Pieter J. L. Hansen, Jonas Larsen, Kim G. Tech Univ Eindhoven Eindhoven Netherlands Radboud Univ Nijmegen Nijmegen Netherlands Aalborg Univ Aalborg Denmark
We study the existence of infinite and safe schedules for resource-aware timed systems, in the setting of multiple continuous resources. Specifically, we explore the multi-variable extension of Energy Timed Automata, ...
来源: 评论
Feature Activation-Driven Zero-Shot NAS: A Contrastive Learning Framework  33rd
Feature Activation-Driven Zero-Shot NAS: A Contrastive Learn...
收藏 引用
33rd International Conference on Artificial Neural Networks and Machine Learning (ICANN)
作者: Wang, Di Xiang, Xunzhi Jing, Kun Xu, Jungang Univ Chinese Acad Sci Beijing Peoples R China Anhui Univ Hefei Anhui Peoples R China
The main bottleneck in current neural architecture search (NAS) algorithms is the inability to efficiently evaluate various neural architectures. While existing performance predictor-based approaches have significantl...
来源: 评论
Scheduling Distributed I/O Resources in HPC Systems  30th
Scheduling Distributed I/O Resources in HPC Systems
收藏 引用
30th European Conference on Parallel and Distributed Processing (Euro-Par)
作者: Bandet, Alexis Boito, Francieli Pallez, Guillaume Univ Bordeaux CNRS Bordeaux INP InriaLaBRIUMR 5800 F-33400 Talence France INRIA Rennes France
This paper presents a comprehensive investigation on optimizing I/O performance in the access to distributed I/O resources in high-performance computing (HPC) environments. I/O resources, such as the I/O forwarding no...
来源: 评论
Network-Agnostic Multi-party Computation Revisited  27th
Network-Agnostic Multi-party Computation Revisited
收藏 引用
27th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC)
作者: Bhimrajka, Nidhish Choudhury, Ashish Varadarajan, Supreeth Int Inst Informat Technol Bangalore Bengaluru India
We study network-agnostic secure multi-party computation (MPC) in the presence of computationally-bounded adversaries. A network-agnostic protocol provides the best possible security guarantees, irrespective of the ty...
来源: 评论
Natively Neuromorphic LMU Architecture for Encoding-Free SNN-Based HAR on Commercial Edge Devices  33rd
Natively Neuromorphic LMU Architecture for Encoding-Free SNN...
收藏 引用
33rd International Conference on Artificial Neural Networks and Machine Learning (ICANN)
作者: Fra, Vittorio Leto, Benedetto Pignata, Andrea Macii, Enrico Urgese, Gianvito Politecn Torino Turin Italy
Neuromorphic models take inspiration from the human brain by adopting bio-plausible neuron models to build alternatives to traditional Machine Learning (ML) and Deep Learning (DL) solutions. The scarce availability of...
来源: 评论
OntoEditor: Real-Time Collaboration via Distributed Version Control for Ontology Development  21st
OntoEditor: Real-Time Collaboration via Distributed Version ...
收藏 引用
21st International Conference on The Semantic Web (ESWC)
作者: Hemid, Ahmad Shabbir, Waleed Khiat, Abderrahmane Lange, Christoph Quix, Christoph Decker, Stefan Fraunhofer FIT Data Sci & Artificial Intelligence St Augustin Germany Fraunhofer IAIS Enterprise Informat Syst St Augustin Germany Hsch Niederrhein Krefeld Germany Rhein Westfal TH Aachen Aachen Germany
In today's remote work environment, the demand for real-time collaborative tools has surged. Our research targets efficient collaboration among knowledge engineers and domain experts in Ontology development. We de...
来源: 评论
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security  2nd
ProvIoT: Detecting Stealthy Attacks in IoT through Federated...
收藏 引用
22nd International Conference on Applied Cryptography and Network Security (ACNS)
作者: Mukherjee, Kunal Wiedemeier, Joshua Wang, Qi Kamimura, Junpei Rhee, John Junghwan Wei, James Li, Zhichun Yu, Xiao Tang, Lu-An Gui, Jiaping Jee, Kangkook Univ Texas Dallas Richardson TX 75083 USA Univ Illinois Champaign IL USA Stellar Cyber San Jose CA USA Univ Cent Oklahoma Edmond OK USA NEC Labs Amer Inc Princeton NJ USA Shanghai Jiao Tong Univ Shanghai Peoples R China
Internet of Things (IoT) devices have increased drastically in complexity and prevalence within the last decade. Alongside the proliferation of IoT devices and applications, attacks targeting them have gained populari...
来源: 评论
SecGraph: Towards SGX-based Efficient and Confidentiality-Preserving Graph Search  29th
SecGraph: Towards SGX-based Efficient and Confidentiality-Pr...
收藏 引用
29th International Conference on Database Systems for Advanced Applications (DASFAA)
作者: Wang, Qiuhao Yang, Xu Qi, Saiyu Qi, Yong Xi An Jiao Tong Univ Xian Shaanxi Peoples R China
Graphs have more expressive power and are widely researched in various search demand scenarios, compared with traditional relational and XML models. Today, many graph search services have been deployed on a third-part...
来源: 评论