咨询与建议

限定检索结果

文献类型

  • 108,400 篇 会议
  • 15,696 册 图书
  • 11,120 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,077 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,595 篇 工学
    • 93,050 篇 计算机科学与技术...
    • 66,618 篇 软件工程
    • 23,096 篇 信息与通信工程
    • 12,539 篇 电气工程
    • 8,337 篇 控制科学与工程
    • 8,184 篇 生物工程
    • 8,077 篇 生物医学工程(可授...
    • 6,286 篇 光学工程
    • 4,393 篇 电子科学与技术(可...
    • 3,853 篇 机械工程
    • 3,609 篇 化学工程与技术
    • 2,781 篇 建筑学
    • 2,343 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,012 篇 安全科学与工程
  • 55,648 篇 理学
    • 41,046 篇 数学
    • 9,539 篇 生物学
    • 8,447 篇 物理学
    • 7,806 篇 统计学(可授理学、...
    • 4,825 篇 系统科学
    • 3,126 篇 化学
  • 22,324 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,139 篇 管理科学与工程(可...
    • 6,929 篇 工商管理
  • 5,722 篇 医学
    • 5,266 篇 临床医学
    • 4,540 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,695 篇 法学
    • 3,129 篇 社会学
  • 2,457 篇 教育学
    • 2,415 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 106 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,037 篇 artificial intel...
  • 4,826 篇 computer communi...
  • 3,509 篇 information syst...
  • 2,774 篇 algorithm analys...
  • 2,427 篇 software enginee...
  • 2,002 篇 image processing...
  • 1,984 篇 user interfaces ...
  • 1,975 篇 semantics
  • 1,947 篇 computers
  • 1,915 篇 information stor...
  • 1,656 篇 computer applica...
  • 1,524 篇 pattern recognit...
  • 1,466 篇 data mining and ...
  • 1,442 篇 computer vision
  • 1,422 篇 software enginee...
  • 1,369 篇 database managem...
  • 1,246 篇 distributed comp...
  • 1,227 篇 computer circuit...
  • 1,224 篇 theory of comput...
  • 1,182 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 159 篇 department of co...
  • 152 篇 huazhong univers...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 119 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 91 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 79 篇 school of comput...
  • 78 篇 karnataka bangal...
  • 75 篇 university of ch...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 71 篇 university of el...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 74 篇 vardi moshe y.
  • 70 篇 wang lei
  • 62 篇 zhang lei
  • 59 篇 pnueli amir
  • 51 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 41 篇 li yang
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 39 篇 stuckey peter j.
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 36 篇 liu bo
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 127,567 篇 英文
  • 5,876 篇 其他
  • 1,486 篇 中文
  • 284 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135219 条 记 录,以下是1391-1400 订阅
排序:
The 2D Shape Equipartition Problem Under Minimum Boundary Length  27th
The 2D Shape Equipartition Problem Under Minimum Boundary Le...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Panagiotakis, Costas Department of Management Science and Technology Hellenic Mediterranean University Agios Nikolaos72100 Greece
In this paper, we present a general version 2D Shape Equipartition Problem (2D-SEP) under minimum boundary length. The goal of this problem is to obtain a segmentation into N equal area segments (regions), where the n... 详细信息
来源: 评论
Leveraging computer Vision Networks for Guitar Tablature Transcription  40th
Leveraging Computer Vision Networks for Guitar Tablature Tra...
收藏 引用
40th computer Graphics International Conference (CGI)
作者: El Achkar, Charbel Couturier, Raphael Makhoul, Abdallah Atechian, Talar Antonine Univ UA TICKET Lab Baabda Lebanon Univ Franche Comte CNRS Inst FEMTO ST F-90000 Belfort France
Generating music-related notations offers assistance for musicians in the path of replicating the music using a specific instrument. In this paper, we evaluate the state-of-the-art guitar tablature transcription netwo... 详细信息
来源: 评论
Parallel Vectorized Implementations of Compensated Summation Algorithms  1
收藏 引用
14th International Conference on Parallel Processing and Applied Mathematics, PPAM 2022
作者: Dmitruk, Beata Stpiczyński, Przemyslaw Maria Curie-Sklodowska University Institute of Computer Science ul. Akademicka 9 Lublin20-031 Poland
The aim of this paper is to show that Kahan’s and Gill-Møller compensated summation algorithms that allow to achieve high accuracy of summing long sequences of floating-point numbers can be efficiently vectorize... 详细信息
来源: 评论
Functional Connectivity Disruptions in Alzheimer’s Disease: A Maximum Flow Perspective  12th
Functional Connectivity Disruptions in Alzheimer’s Disease...
收藏 引用
12th International Conference on Computational Advances in Bio and Medical sciences, ICCABS 2023
作者: Stubby, Emma T. Razavi, Seyed Majid Khanmohammadi, Sina School of Computer Science University of Oklahoma Norman73019 United States Data Science and Analytics Institute University of Oklahoma Norman73019 United States
Alzheimer’s disease is a neurological disorder characterized by functional and structural atrophy, leading to symptoms like memory loss and cognitive decline. This study seeks to analyze the disruptions of functional... 详细信息
来源: 评论
Transfer Learning from ImageNet to the Domain of Pigmented Nevi  1
收藏 引用
22nd International Conference on Artificial Intelligence and Soft Computing, ICAISC 2023
作者: Surówka, Grzegorz Department of Physics Astronomy and Applied Computer Science Jagiellonian University ul. Lojasiewicza 11 Krakow30-348 Poland
The transfer learning method enables the use of a pretrained convolutional network to efficiently model a secondary domain with less data. In this article 18 public convolutional networks of different architecture and... 详细信息
来源: 评论
Software Aided Approach for Constrained Optimization Based on QAOA Modifications  1
收藏 引用
23rd International Conference on Computational science, ICCS 2023
作者: Lamża, Tomasz Zawalska, Justyna Sterzel, Mariusz Rycerz, Katarzyna Institute of Computer Science AGH al. Mickiewicza 30 Krakow30-059 Poland Academic Computer Center Cyfronet AGH ul. Nawojki 11 Krakow30-950 Poland
We present two variants of the QAOA modification for solving constrained combinatorial problems. The results presented in this paper were obtained using the QHyper framework, which we developed specifically for this p... 详细信息
来源: 评论
Optimization-Based Trajectory Planning for Autonomous Ground Vehicles  16th
Optimization-Based Trajectory Planning for Autonomous Groun...
收藏 引用
16th International Conference on Social Robotics, ICSR + InnoBiz 2024
作者: Xu, Haoran Ren, Qinyuan College of Control Science and Engineering Zhejiang University Hangzhou310027 China
In social environments, complex interactive scenes and various tasks bring great challenges to the motion planning of autonomous ground vehicles. Application scenarios typically require vehicles to plan a smooth traje... 详细信息
来源: 评论
Use of Game Design and Game Elements in Serious Project Management Games  13th
Use of Game Design and Game Elements in Serious Project Mana...
收藏 引用
13th International Conference on Games and Learning Alliance, GALA 2024
作者: Wang, Alf Inge Norwegian University of Science and Technology TrondheimN7491 Norway
Using serious games to teach project management is a logical choice, as it al-lows students to practice skills without facing real-world economic or human consequences. These games offer a realistic learning environme... 详细信息
来源: 评论
Towards Verifying Physical Assumption in Card-Based Cryptography  1
收藏 引用
15th International Conference on Security for Information Technology and Communications, SECITC 2022
作者: Shimano, Masahisa Sakiyama, Kazuo Miyahara, Daiki The University of Electro-Communications Tokyo Japan National Institute of Advanced Industrial Science and Technology Tokyo Japan
Card-based cryptography realizes cryptographic tasks, such as secure computation, with a deck of physical cards. The primary research subjects for card-based cryptography are theoretical studies that, for example, pro... 详细信息
来源: 评论
An Efficient Threshold Ring Signature from G+G Identification Protocol  2nd
An Efficient Threshold Ring Signature from G+G Identificati...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Wu, Chunhui Jiang, Siwei Zhang, Fangguo Du, Yusong Lin, Qiping School of Internet Finance and Information Engineering Guangdong University of Finance Guangzhou510521 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou510006 China Xingtang Telecommunication Technology Co. Ltd. Beijing100191 China
Threshold ring signature confirms that t signers are participating in the signature and keep them anonymous. It is a generalization of ring signature, and has many important applications such as whistleblower, e-votin... 详细信息
来源: 评论