咨询与建议

限定检索结果

文献类型

  • 108,400 篇 会议
  • 15,696 册 图书
  • 11,120 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,077 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,595 篇 工学
    • 93,050 篇 计算机科学与技术...
    • 66,618 篇 软件工程
    • 23,096 篇 信息与通信工程
    • 12,539 篇 电气工程
    • 8,337 篇 控制科学与工程
    • 8,184 篇 生物工程
    • 8,077 篇 生物医学工程(可授...
    • 6,286 篇 光学工程
    • 4,393 篇 电子科学与技术(可...
    • 3,853 篇 机械工程
    • 3,609 篇 化学工程与技术
    • 2,781 篇 建筑学
    • 2,343 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,012 篇 安全科学与工程
  • 55,648 篇 理学
    • 41,046 篇 数学
    • 9,539 篇 生物学
    • 8,447 篇 物理学
    • 7,806 篇 统计学(可授理学、...
    • 4,825 篇 系统科学
    • 3,126 篇 化学
  • 22,324 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,139 篇 管理科学与工程(可...
    • 6,929 篇 工商管理
  • 5,722 篇 医学
    • 5,266 篇 临床医学
    • 4,540 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,695 篇 法学
    • 3,129 篇 社会学
  • 2,457 篇 教育学
    • 2,415 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 106 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,037 篇 artificial intel...
  • 4,826 篇 computer communi...
  • 3,509 篇 information syst...
  • 2,774 篇 algorithm analys...
  • 2,427 篇 software enginee...
  • 2,002 篇 image processing...
  • 1,984 篇 user interfaces ...
  • 1,975 篇 semantics
  • 1,947 篇 computers
  • 1,915 篇 information stor...
  • 1,656 篇 computer applica...
  • 1,524 篇 pattern recognit...
  • 1,466 篇 data mining and ...
  • 1,442 篇 computer vision
  • 1,422 篇 software enginee...
  • 1,369 篇 database managem...
  • 1,246 篇 distributed comp...
  • 1,227 篇 computer circuit...
  • 1,224 篇 theory of comput...
  • 1,182 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 159 篇 department of co...
  • 152 篇 huazhong univers...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 119 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 91 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 79 篇 school of comput...
  • 78 篇 karnataka bangal...
  • 75 篇 university of ch...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 71 篇 university of el...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 74 篇 vardi moshe y.
  • 70 篇 wang lei
  • 62 篇 zhang lei
  • 59 篇 pnueli amir
  • 51 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 41 篇 li yang
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 39 篇 stuckey peter j.
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 36 篇 liu bo
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 127,567 篇 英文
  • 5,876 篇 其他
  • 1,486 篇 中文
  • 284 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135219 条 记 录,以下是1491-1500 订阅
排序:
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning  26th
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Base...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Cui, Bo Liu, Shuai Engineering Research Center of Ecological Big Data Ministry of Education Beijing China College of Computer Science Inner Mongolia University Hohhot China
As the economic value of cryptocurrencies continues to ascend, an increasing number of cybercriminals exploit malicious browser scripts to commandeer the system and network resources of victims for unauthorized crypto... 详细信息
来源: 评论
Probabilistic Offloading Algorithm for Opportunistic Networks Integrating Node Influence Prediction  18th
Probabilistic Offloading Algorithm for Opportunistic Networ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Tang, Qi Xu, Xiaodong Li, Shuai Seah, Winston Xu, Gang College of Computer Science Inner Mongolia University Hohhot010021 China The Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia University Hohhot010021 China Victoria University of Wellington Wellington New Zealand
In Opportunistic Network based mobile data diversion algorithms, the need for multi-hop transmission makes the selection of the next hop node critical. The traditional Prophet algorithm calculates the encounter delive... 详细信息
来源: 评论
Multi-modal Information Multi-angle Mining for Multimedia Recommendation  31st
Multi-modal Information Multi-angle Mining for Multimedia Re...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Zhu, Yijie Li, Mingyong College of Computer and Information Science Chongqing Normal University Chongqing401331 China
Unlike traditional recommendation systems that rely solely on historical user-item interactions for recommendations, multimodal recommendation systems integrate multimodal features of items to enhance the accuracy of ... 详细信息
来源: 评论
Translate-and-Revise: Boosting Large Language Models for Constrained Translation  23rd
Translate-and-Revise: Boosting Large Language Models for Co...
收藏 引用
23rd China National Conference on Computational Linguistics, CCL 2024
作者: Huang, Pengcheng Mu, Yongyu Wu, Yuzhang Li, Bei Xiao, Chunyang Xiao, Tong Zhu, Jingbo NLP Lab School of Computer Science and Engineering Northeastern University Shenyang China NiuTrans Research Shenyang China JP Morgan London United Kingdom
Imposing constraints on machine translation systems presents a challenging issue because these systems are not trained to make use of constraints in generating adequate, fluent translations. In this paper, we leverage... 详细信息
来源: 评论
Intentional Microgesture Recognition for Extended Human-computer Interaction
Intentional Microgesture Recognition for Extended Human-Comp...
收藏 引用
Human-computer Interaction Thematic Area Conference (HCI) Held as Part of the 25th International Conference on Human-computer Interaction (HCII)
作者: Kandoi, Chirag Jung, Changsoo Mannan, Sheikh VanderHoeven, Hannah Meisman, Quincy Krishnaswamy, Nikhil Blanchard, Nathaniel Colorado State Univ Ft Collins CO 80523 USA
As extended reality becomes more ubiquitous, people will more frequently interact with computer systems using gestures instead of peripheral devices. However, previous works have shown that using traditional gestures ... 详细信息
来源: 评论
Semantic Annotation in Collaborative Document Transcription: A Gamified Citizen science Approach  11th
Semantic Annotation in Collaborative Document Transcription:...
收藏 引用
11th International Conference on Culture and Computing (C&C) part of the 25th International Conference on Human-computer Interaction (HCI)
作者: Ezequiel Bracco, Christian Ezequiel Cuevas, Lucas Torres, Diego UNLP Fac Informat CICPBA LIFIA RA-1900 La Plata Argentina UNQ Dept Ciencia & Tecnol Roque Saenz Pena 352 Bernal Argentina
Human or manual transcription is the task where a person reads a handwritten document and types in a digital environment the text she is reading. The manual transcription task is a long and time-consuming process for ... 详细信息
来源: 评论
Composite Concept Extraction Through Backdooring  27th
Composite Concept Extraction Through Backdooring
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Ghosh, Banibrata Harikumar, Haripriya Doan, Khoa D. Venkatesh, Svetha Rana, Santu Applied Artificial Intelligence Institute Deakin University Waurn Ponds Geelong Australia College of Engineering and Computer Science VinUniversity Hanoi Viet Nam
Learning composite concepts, such as "red car", from individual examples—like a white car representing the concept of "car" and a red strawberry representing the concept of "red"—is inh... 详细信息
来源: 评论
AIS - A Metric for Assessing the Impact of an Influencer’s Twitter Activity on the Price of a Cryptocurrency  29th
AIS - A Metric for Assessing the Impact of an Influencer...
收藏 引用
29th International Conference on Cooperative Information Systems, CoopIS 2023
作者: Miller, Kevin Böhmer, Kristof Faculty of Computer Science Research Group Software Architecture University of Vienna Währinger Straße 29 Vienna Austria
Individual users on social media platforms like Twitter can significantly volatile assets, including cryptocurrencies. However, current research has overlooked this aspect, focusing on sentiment analysis that includes... 详细信息
来源: 评论
Autonomous Unmanned Aerial Vehicle Systems in Wildfire Detection and Management-Challenges and Opportunities  4th
Autonomous Unmanned Aerial Vehicle Systems in Wildfire Dete...
收藏 引用
4th International Conference on Dynamic Data Driven Applications Systems, DDDAS 2022
作者: Afghah, Fatemeh Holcombe Department of Electrical and Computer Engineering Clemson University ClemsonSC29631 United States
Wildfires are one of the costliest and deadliest natural disasters in the United States, particularly in the Western USA. Wildfire frequency and severity are increasing due to climate change and urban sprawl. Detectin... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance Network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论