咨询与建议

限定检索结果

文献类型

  • 107,731 篇 会议
  • 15,604 册 图书
  • 11,134 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 134,331 篇 电子文献
  • 176 种 纸本馆藏

日期分布

学科分类号

  • 106,596 篇 工学
    • 92,327 篇 计算机科学与技术...
    • 66,240 篇 软件工程
    • 22,855 篇 信息与通信工程
    • 12,397 篇 电气工程
    • 8,177 篇 生物工程
    • 8,157 篇 控制科学与工程
    • 8,031 篇 生物医学工程(可授...
    • 6,233 篇 光学工程
    • 4,380 篇 电子科学与技术(可...
    • 3,756 篇 机械工程
    • 3,570 篇 化学工程与技术
    • 2,753 篇 建筑学
    • 2,307 篇 动力工程及工程热...
    • 2,285 篇 土木工程
    • 1,991 篇 安全科学与工程
  • 55,336 篇 理学
    • 40,807 篇 数学
    • 9,521 篇 生物学
    • 8,428 篇 物理学
    • 7,763 篇 统计学(可授理学、...
    • 4,799 篇 系统科学
    • 3,118 篇 化学
  • 22,099 篇 管理学
    • 13,119 篇 图书情报与档案管...
    • 9,975 篇 管理科学与工程(可...
    • 6,902 篇 工商管理
  • 5,675 篇 医学
    • 5,222 篇 临床医学
    • 4,499 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,671 篇 法学
    • 3,114 篇 社会学
  • 2,439 篇 教育学
    • 2,397 篇 教育学
  • 2,144 篇 经济学
    • 2,138 篇 应用经济学
  • 1,810 篇 农学
  • 167 篇 军事学
  • 108 篇 文学
  • 51 篇 艺术学
  • 15 篇 哲学
  • 2 篇 历史学

主题

  • 8,001 篇 artificial intel...
  • 4,779 篇 computer communi...
  • 3,519 篇 information syst...
  • 2,775 篇 algorithm analys...
  • 2,439 篇 software enginee...
  • 2,001 篇 image processing...
  • 1,972 篇 semantics
  • 1,939 篇 computers
  • 1,923 篇 information stor...
  • 1,910 篇 user interfaces ...
  • 1,590 篇 computer applica...
  • 1,527 篇 pattern recognit...
  • 1,470 篇 data mining and ...
  • 1,435 篇 computer vision
  • 1,403 篇 software enginee...
  • 1,379 篇 database managem...
  • 1,249 篇 distributed comp...
  • 1,220 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,167 篇 computer systems...

机构

  • 199 篇 university of sc...
  • 153 篇 huazhong univers...
  • 151 篇 department of co...
  • 143 篇 institute of inf...
  • 121 篇 department of co...
  • 117 篇 tsinghua univers...
  • 115 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 95 篇 school of comput...
  • 91 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 76 篇 karnataka bangal...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 71 篇 school of comput...
  • 65 篇 university of el...
  • 65 篇 university of ch...
  • 64 篇 college of compu...
  • 62 篇 school of comput...

作者

  • 73 篇 vardi moshe y.
  • 70 篇 wang lei
  • 61 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 41 篇 marina l. gavril...
  • 40 篇 li xin
  • 39 篇 li yang
  • 39 篇 stuckey peter j.
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 37 篇 liu bo
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 31 篇 andrea vedaldi
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 130,977 篇 英文
  • 1,668 篇 其他
  • 1,497 篇 中文
  • 327 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
检索条件"任意字段=Lecture Notes in Computer Science"
134474 条 记 录,以下是4961-4970 订阅
排序:
Binocular Vision and Vector-Summation Based Integration of Bilateral Innate and Learned Visual Cues in Insect Navigation  13th
Binocular Vision and Vector-Summation Based Integration of B...
收藏 引用
13th International Conference on Biomimetic and Biohybrid Systems, Living Machines 2024
作者: Sun, Qin Sun, Xuelong Li, Haiyang School of Mathematics and Information Science Guangzhou University Guangzhou China Machine Life and Intelligence Research Centre Guangzhou University Guangzhou China
Insects rely extensively on visual information for navigation, utilizing a combination of innate instincts and learned behaviors. The mushroom body (MB) has been identified as a key player in insect visual learning, w... 详细信息
来源: 评论
Contextual Bandit with Herding Effects: Algorithms and Recommendation Applications  21st
Contextual Bandit with Herding Effects: Algorithms and Rec...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Xu, Luyue Wang, Liming Xie, Hong Zhou, Mingqiang Chongqing University Chongqing China University of Science and Technology of China Hefei China State Key Laboratory of Cognitive Intelligence Beijing China
Contextual bandits serve as a fundamental algorithmic framework for optimizing recommendation decisions online. Though extensive attention has been paid to tailoring contextual bandits for recommendation applications,... 详细信息
来源: 评论
E-SAGE: Explainability-Based Defense Against Backdoor Attacks on Graph Neural Networks  18th
E-SAGE: Explainability-Based Defense Against Backdoor Attack...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Yuan, Dingqiang Xu, Xiaohua Yu, Lei Han, Tongchang Li, Rongchang Han, Meng University of Science and Technology of China Hefei230000 China Rensselaer Polytechnic Institute TroyNY12180 United States Zhejiang University Hangzhou310058 China
Graph Neural Networks (GNNs) have recently been widely adopted in multiple domains. Yet, they are notably vulnerable to adversarial and backdoor attacks. In particular, backdoor attacks based on subgraph insertion hav... 详细信息
来源: 评论
Learning Dynamic Representations in Large Language Models for Evolving Data Streams  27th
Learning Dynamic Representations in Large Language Models f...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Srivastava, Ashish Bhatnagar, Shalabh Narasimha Murty, M. Aravinda Raman, J. Indian Institute of Science Bangalore India Centre for AI & Robotics Bangalore India North Carolina State University RaleighNC United States
In the world of Large Language Modeling, incremental learning plays an important role in evolving data such as streaming text. We introduce an incremental learning approach for dynamic contextualized word embeddings i... 详细信息
来源: 评论
Towards Adversarial Robustness and Reducing Uncertainty Bias through Expert Regularized Pseudo-Bidirectional Alignment in Transductive Zero Shot Learning  27th
Towards Adversarial Robustness and Reducing Uncertainty Bias...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Kumar Sinha, Abhishek Mishra, Deepak Moorthi, S. Manthira Signal and Image Processing Area Space Applications Center Ahmedabad India Indian Institute of Space Science and Technology Thiruvananthapuram India
Transductive zero-shot learning (TZSL) aims to minimize the domain shift between the learned and true distribution of the unseen classes by allowing access to the unpaired samples from unseen classes. While many distr... 详细信息
来源: 评论
Dynamic Sharded Blockchain Architecture for Industrial Emergency Data Sharing  18th
Dynamic Sharded Blockchain Architecture for Industrial Emer...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Ren, Linjie Xu, Tianyi Guo, Runkun Wang, Cong Qiu, Tie College of Intelligence and Computing Tianjin University Tianjin300350 China Questrom School of Business Boston University BostonMA02215 United States School of Computer Qinghai Minzu University Xining810007 China
Sharding is a recognized solution for improving blockchain performance in industrial data sharing. Current sharding systems can periodically adjust shards to adapt to dynamic manufacturing scenarios, but they struggle... 详细信息
来源: 评论
The Influence of Social Networking Usage Experience and Activity on Preferences of Explainable Artificial Intelligence (XAI) Representation Methods in a Hate Speech Detection System  25th
The Influence of Social Networking Usage Experience and Acti...
收藏 引用
25th International Conference on Web Information Systems Engineering, WISE 2024
作者: Al-Ansari, Noor Al-Thani, Dena Bahameish, Mariam College of Science and Engineering Hamad Bin Khalifa University Doha Qatar
Hate speech is widespread across social media platforms, where users can influence others positively or negatively through simple actions like typing. These platforms use AI to personalize content, and explainable AI ... 详细信息
来源: 评论
Micro-Expression Recognition via CNN and Multi-path Vision Transformer Integrated with Spatiotemporal Separated Self-attention  18th
Micro-Expression Recognition via CNN and Multi-path Vision T...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Guo, Yingying Xie, Tingxuan Jia, Wenqiang Xu, Sen Ben, Xianye School of Information Science and Engineering Shandong University Qingdao266237 China School of Information Engineering Yancheng Institute of Technology Yancheng224051 China
Deep learning-based methods have exhibited outstanding performance in micro-expression recognition. However, convolutional operations are performed on fixed-size windows, which limits their ability to learn long-range... 详细信息
来源: 评论
AdaSVaT: Adaptive Singular Value Thresholding for Adversarial Detection in Fundus Images  27th
AdaSVaT: Adaptive Singular Value Thresholding for Adversaria...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Joseph, Nirmal George, Sudhish N. Ameer, P.M. Raja, Kiran National Institute of Technology Calicut Kozhikode India Norwegian University of Science and Technology Trondheim Trondheim Norway
Existing detection methods for adversarial attacks in medical images mostly rely on prior knowledge about the attacks and the target models. This work introduces a new attack detector termed as AdaSVaT, that is both i... 详细信息
来源: 评论
Back to Supervision: Boosting Word Boundary Detection Through Frame Classification  27th
Back to Supervision: Boosting Word Boundary Detection Throu...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Carnemolla, Simone Calcagno, Salvatore Palazzo, Simone Giordano, Daniela Department of Electrical Electronic and Computer Engineering University of Catania Via Santa Sofia Catania95123  Italy
Speech segmentation at both word and phoneme levels is crucial for various speech processing tasks. It significantly aids in extracting meaningful units from an utterance, thus enabling the generation of discrete elem... 详细信息
来源: 评论