咨询与建议

限定检索结果

文献类型

  • 108,393 篇 会议
  • 15,710 册 图书
  • 11,132 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 135,098 篇 电子文献
  • 172 种 纸本馆藏

日期分布

学科分类号

  • 107,593 篇 工学
    • 93,034 篇 计算机科学与技术...
    • 66,621 篇 软件工程
    • 23,080 篇 信息与通信工程
    • 12,523 篇 电气工程
    • 8,335 篇 控制科学与工程
    • 8,186 篇 生物工程
    • 8,080 篇 生物医学工程(可授...
    • 6,298 篇 光学工程
    • 4,395 篇 电子科学与技术(可...
    • 3,849 篇 机械工程
    • 3,613 篇 化学工程与技术
    • 2,782 篇 建筑学
    • 2,344 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,013 篇 安全科学与工程
  • 55,645 篇 理学
    • 41,034 篇 数学
    • 9,541 篇 生物学
    • 8,451 篇 物理学
    • 7,807 篇 统计学(可授理学、...
    • 4,824 篇 系统科学
    • 3,129 篇 化学
  • 22,327 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,142 篇 管理科学与工程(可...
    • 6,928 篇 工商管理
  • 5,726 篇 医学
    • 5,270 篇 临床医学
    • 4,545 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,692 篇 法学
    • 3,126 篇 社会学
  • 2,462 篇 教育学
    • 2,420 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 107 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,048 篇 artificial intel...
  • 4,831 篇 computer communi...
  • 3,512 篇 information syst...
  • 2,777 篇 algorithm analys...
  • 2,431 篇 software enginee...
  • 2,003 篇 image processing...
  • 1,991 篇 user interfaces ...
  • 1,974 篇 semantics
  • 1,939 篇 computers
  • 1,917 篇 information stor...
  • 1,657 篇 computer applica...
  • 1,524 篇 pattern recognit...
  • 1,468 篇 data mining and ...
  • 1,432 篇 computer vision
  • 1,424 篇 software enginee...
  • 1,375 篇 database managem...
  • 1,251 篇 distributed comp...
  • 1,227 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,180 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 152 篇 huazhong univers...
  • 151 篇 department of co...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 121 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 91 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 81 篇 university of el...
  • 74 篇 karnataka bangal...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 68 篇 school of comput...
  • 67 篇 university of ch...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 73 篇 vardi moshe y.
  • 70 篇 wang lei
  • 60 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 38 篇 man ka lok
  • 38 篇 li yang
  • 37 篇 jiang xiaoyi
  • 37 篇 stuckey peter j.
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 34 篇 liu bo
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 130,663 篇 英文
  • 2,755 篇 其他
  • 1,490 篇 中文
  • 326 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135240 条 记 录,以下是61-70 订阅
Simulating, Visualizing and Playing with de Sitter and Anti de Sitter Spacetime  24th
Simulating, Visualizing and Playing with de Sitter and Anti ...
收藏 引用
24th International Conference on Computational science (ICCS)
作者: Kopczynski, Eryk Inst Warsaw Inst Informat Warsaw Poland
In this paper we discuss computer simulations of de Sitter and anti de Sitter spacetimes, which are maximally symmetric, relativistic analogs of non-Euclidean geometries. We present prototype games played in these spa... 详细信息
来源: 评论
On Chains of Pairing-Friendly Elliptic Curves  4th
On Chains of Pairing-Friendly Elliptic Curves
收藏 引用
4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024
作者: Grześkowiak, Maciej Faculty of Mathematics and Computer Science Adam Mickiewicz University Uniwersytetu Poznańskiego 4 Poznań61-614 Poland
Recently, many constructions of curves aim to implement different kinds of proof systems efficiently. For the protocol to be efficient, one must generate particular forms of prime numbers. This article prese... 详细信息
来源: 评论
Some Numerical Approaches for Bifurcation of Nonlinear Dynamic Systems  1
收藏 引用
4th International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2023
作者: Faydaoğlu, Şerife Department of Mathematics and Science Education Buca Faculty of Education Dokuz Eylul University Izmir Buca Turkey
This paper introduces a novel application of frequency and amplitude formulation to determine the frequency of nonlinear Duffing oscillations. The formulation represents one of the simplest methods for estimating the ... 详细信息
来源: 评论
Fine-Grained Searchable Encryption Scheme Against Keyword Brute-Force Attacks  1
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Feng, Yawen Zeng, Shengke Xiao, Jixiang Cheng, Shuai Zhang, Fengchun School of Computer Science and Technology Xihua University Chengdu China
The inherent security threat of public key encryption with keyword search (PEKS) is the inside guessing attack since the ciphertext of keyword is generated publicly. Sever-aided schemes and keyword search with authent... 详细信息
来源: 评论
Enabling Visual Intelligence by Leveraging Visual Object States in a Neurosymbolic Framework: A Position Paper  37th
Enabling Visual Intelligence by Leveraging Visual Object St...
收藏 引用
37th Australasian Joint Conference on Artificial Intelligence, AJCAI 2024
作者: Gouidis, Filippos Papoutsakis, Konstantinos Patkos, Theodore Argyros, Antonis Plexousakis, Dimitris Computer Science Department University of Crete Heraklion Greece Institute of Computer Science Foundation for Research and Technology Hellas Heraklion Greece Department of Management Science and Technology Hellenic Mediterranean University Agios Nikolaos Greece
This paper investigates the potential of integrating visual object states for developing methods addressing complex visual intelligence tasks such as Long-Term Action anticipation (LTAA) and proposes that this to achi... 详细信息
来源: 评论
Efficient Quantization-Aware Training on Segment Anything Model in Medical Images and Its Deployment  1
收藏 引用
International Challenge on Segment Anything in Medical Images on Laptop held in conjunction with the IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2024
作者: Lu, Haisheng Fu, Yujie Zhang, Fan Zhang, Le University of Electronic Science and Technology of China Chengdu China
Medical image segmentation is a critical component of clinical practice, and the state-of-the-art MedSAM model has significantly advanced this field. Nevertheless, critiques highlight that MedSAM demands substantial c... 详细信息
来源: 评论
Observability of Boolean Control Networks: New Definition and Verification Algorithm  1
收藏 引用
25th International Conference on Formal Engineering Methods, ICFEM 2024
作者: Wu, Guisen Liu, Zhiming Pang, Jun School of Computer and Information Science Southwest University Chongqing China Department of Computer Science University of Luxembourg Esch-sur-Alzette Luxembourg
Boolean Control Networks (BCNs) are extensively employed for modelling biological systems, attracting considerable attention from biologists and systems scientists, in particularly, on the control theory of BCNs. This... 详细信息
来源: 评论
Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight  1
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Li, Zhihao Chen, Qi Mo, Weichuan Wang, Xiaolin Hu, Li Cao, Yongzhi Institute of Artificial Intelligence Guangzhou University Guangzhou510006 China Xi’an710071 China School of Computer Science Peking University Beijing100871 China
Unmanned Aerial Vehicles (UAVs) serve as highly versatile and efficient tools utilized across diverse industries for data collection purposes. However, they face vulnerabilities associated with wireless communication ... 详细信息
来源: 评论
Lightweight Attention-CycleGAN for Nighttime-Daytime Image Transformation  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Huang, Junhao Xiao, Xiangjun Zhou, Haojun Yasin, Affan Zhou, Zhili School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China Faculty of Science and Technology Universitas Airlangga Surabaya Indonesia School of Artificial Intelligence Guangzhou University Guangzhou China
With the rapid development of deep learning in the field of computer vision, the performance of core vision tasks such as image recognition has achieved significant improvement. In nighttime environment, due to the lo... 详细信息
来源: 评论
High Capacity Reversible Data Hiding in Encrypted Images Based on Pixel Value Preprocessing and Block Classification  1
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Zhang, Tao Zhang, Ju Zou, Yicheng Zhang, Yu College of Computer and Information Science Southwest University Chongqing400715 China
Reversible data hiding in encrypted images (RDHEI) can simultaneously achieve secure transmission of images and secret storage of embedded additional data, which can be used for cloud storage and privacy protection. I... 详细信息
来源: 评论