咨询与建议

限定检索结果

文献类型

  • 108,400 篇 会议
  • 15,727 册 图书
  • 11,121 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,109 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,605 篇 工学
    • 93,057 篇 计算机科学与技术...
    • 66,619 篇 软件工程
    • 23,096 篇 信息与通信工程
    • 12,539 篇 电气工程
    • 8,337 篇 控制科学与工程
    • 8,184 篇 生物工程
    • 8,077 篇 生物医学工程(可授...
    • 6,286 篇 光学工程
    • 4,393 篇 电子科学与技术(可...
    • 3,853 篇 机械工程
    • 3,609 篇 化学工程与技术
    • 2,781 篇 建筑学
    • 2,343 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,012 篇 安全科学与工程
  • 55,651 篇 理学
    • 41,048 篇 数学
    • 9,539 篇 生物学
    • 8,447 篇 物理学
    • 7,806 篇 统计学(可授理学、...
    • 4,825 篇 系统科学
    • 3,126 篇 化学
  • 22,326 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,141 篇 管理科学与工程(可...
    • 6,929 篇 工商管理
  • 5,722 篇 医学
    • 5,266 篇 临床医学
    • 4,540 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,695 篇 法学
    • 3,129 篇 社会学
  • 2,458 篇 教育学
    • 2,416 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 107 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,057 篇 artificial intel...
  • 4,840 篇 computer communi...
  • 3,516 篇 information syst...
  • 2,779 篇 algorithm analys...
  • 2,432 篇 software enginee...
  • 2,006 篇 image processing...
  • 1,992 篇 user interfaces ...
  • 1,973 篇 semantics
  • 1,939 篇 computers
  • 1,925 篇 information stor...
  • 1,665 篇 computer applica...
  • 1,526 篇 pattern recognit...
  • 1,469 篇 data mining and ...
  • 1,433 篇 computer vision
  • 1,426 篇 software enginee...
  • 1,371 篇 database managem...
  • 1,251 篇 distributed comp...
  • 1,225 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,181 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 152 篇 huazhong univers...
  • 151 篇 department of co...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 120 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 93 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 81 篇 university of el...
  • 73 篇 karnataka bangal...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 68 篇 school of comput...
  • 67 篇 university of ch...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 73 篇 vardi moshe y.
  • 70 篇 wang lei
  • 60 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 37 篇 li yang
  • 36 篇 stuckey peter j.
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 34 篇 liu bo
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 127,590 篇 英文
  • 5,876 篇 其他
  • 1,495 篇 中文
  • 284 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135251 条 记 录,以下是1441-1450 订阅
排序:
MFG-HUI: An Efficient Algorithm for Mining Frequent Generators of High Utility Itemsets  1
收藏 引用
10th International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, IUKM 2023
作者: Duong, Hai Tran, Thong Truong, Tin Le, Bac Department of Mathematics and Computer Science Dalat University Dalat Viet Nam Department of Computer Science Faculty of Information Technology University of Science Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Viet Nam
The discovery of frequent generators of high utility itemsets (FGHUIs) holds great importance as they provide concise representations of frequent high utility itemsets (FHUIs). FGHUIs are crucial for generating nonred... 详细信息
来源: 评论
Intentional Microgesture Recognition for Extended Human-computer Interaction
Intentional Microgesture Recognition for Extended Human-Comp...
收藏 引用
Human-computer Interaction Thematic Area Conference (HCI) Held as Part of the 25th International Conference on Human-computer Interaction (HCII)
作者: Kandoi, Chirag Jung, Changsoo Mannan, Sheikh VanderHoeven, Hannah Meisman, Quincy Krishnaswamy, Nikhil Blanchard, Nathaniel Colorado State Univ Ft Collins CO 80523 USA
As extended reality becomes more ubiquitous, people will more frequently interact with computer systems using gestures instead of peripheral devices. However, previous works have shown that using traditional gestures ... 详细信息
来源: 评论
CavFind: A Novel Algorithm to Detect Cavities on Protein Structure  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Adhikari, Swati Roy, Parthajit Department of Computer Science The University of Burdwan Golapbag West Bengal Purba Bardhaman713104 India
Various essential functions in living organisms are performed by binding of proteins with other molecules (ligands). Proper detection and analysis of ligand binding locations (cavities) leads towards the success of th... 详细信息
来源: 评论
Leveraging computer Vision Networks for Guitar Tablature Transcription  40th
Leveraging Computer Vision Networks for Guitar Tablature Tra...
收藏 引用
40th computer Graphics International Conference (CGI)
作者: El Achkar, Charbel Couturier, Raphael Makhoul, Abdallah Atechian, Talar Antonine Univ UA TICKET Lab Baabda Lebanon Univ Franche Comte CNRS Inst FEMTO ST F-90000 Belfort France
Generating music-related notations offers assistance for musicians in the path of replicating the music using a specific instrument. In this paper, we evaluate the state-of-the-art guitar tablature transcription netwo... 详细信息
来源: 评论
Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction  18th
Probabilistic Offloading Algorithm for Opportunistic Networ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Tang, Qi Xu, Xiaodong Li, Shuai Seah, Winston Xu, Gang College of Computer Science Inner Mongolia University Hohhot010021 China The Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia University Hohhot010021 China Victoria University of Wellington Wellington New Zealand
In Opportunistic Network based mobile data diversion algorithms, the need for multi-hop transmission makes the selection of the next hop node critical. The traditional Prophet algorithm calculates the encounter delive... 详细信息
来源: 评论
Enhancing Interpretability in CT Reconstruction Using Tomographic Domain Transform with Self-supervision  20th
Enhancing Interpretability in CT Reconstruction Using Tomog...
收藏 引用
20th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2023
作者: Huang, Baiyin Tan, Boheng Tang, Xiaoqin Xiao, Guoqiang College of Computer and Information Science Southwest University Chongqing China
Computed tomography (CT) reconstruction faces difficulties in dealing with artifacts caused by imperfect imaging processes. Deep learning-based CT reconstruction models have been proposed to address these challenges, ... 详细信息
来源: 评论
Cost-Efficient Crowdsourcing for Span-Based Sequence Labeling: Worker Selection and Data Augmentation  23rd
Cost-Efficient Crowdsourcing for Span-Based Sequence Labeli...
收藏 引用
23rd China National Conference on Computational Linguistics, CCL 2024
作者: Wang, Yujie Huang, Chao Yang, Liner Fang, Zhixuan Huang, Yaping Liu, Yang Yu, Jingsi Yang, Erhong School of Computer and Information Technology Beijing Jiaotong University Beijing China National Language Resources Monitoring and Research Center for Print Media Beijing Language and Culture University Beijing China Department of Computer Science The University of California Davis United States School of Information Science Beijing Language and Culture University Beijing China Institute for Interdisciplinary Information Sciences Tsinghua University Beijing China
This paper introduces a novel crowdsourcing worker selection algorithm, enhancing annotation quality and reducing costs. Unlike previous studies targeting simpler tasks, this study contends with the complexities of la... 详细信息
来源: 评论
Constant-Size Group Signatures with Message-Dependent Opening from Lattices  1
收藏 引用
17th International Conference on Provable and Practical Security, ProvSec 2023
作者: Chen, Simin Chen, Jiageng Miyaji, Atsuko Chen, Kaiming School of Computer Science Central China Normal University Wuhan China Graduate School of Engineering Osaka University Osaka Japan
Group signatures allow users to sign messages on behalf of the group without prevealing their identities. However, the opening authority can trace signatures back to their source, raising concerns about privacy. To ad... 详细信息
来源: 评论
Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation  10th
Cache Behavior Analysis with SP-Relative Addressing for WC...
收藏 引用
10th International Symposium on Dependable Software Engineering: Theories, Tools and Applications, SETTA 2024
作者: Xiao, Shangshang Sun, Mengxia Zhang, Wei Zhan, Naijun Ju, Lei School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China School of Computer Science Peking University Beijing China
Accurately bounding the worst-case execution time (WCET) is crucial for efficient real-time system design. Precisely analyzing whether a memory reference results in a cache miss or a cache hit significantly impac... 详细信息
来源: 评论
NAOL: NeRF-Assisted Omnidirectional Localization  27th
NAOL: NeRF-Assisted Omnidirectional Localization
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Yu, Muzhou Cai, Zhihan Wu, Kailu Cao, Dapeng Ma, Kaisheng School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Institute for Interdisciplinary Information Sciences Tsinghua University Beijing100080 China
Visual localization is a challenging task involving precise camera position and orientation estimation from an image. Specifically, existing panorama datasets suffer from a limitation in the number of available omnidi... 详细信息
来源: 评论