咨询与建议

限定检索结果

文献类型

  • 108,675 篇 会议
  • 15,736 册 图书
  • 11,140 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,412 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,907 篇 工学
    • 93,317 篇 计算机科学与技术...
    • 66,594 篇 软件工程
    • 23,339 篇 信息与通信工程
    • 12,752 篇 电气工程
    • 8,395 篇 控制科学与工程
    • 8,180 篇 生物工程
    • 8,059 篇 生物医学工程(可授...
    • 6,260 篇 光学工程
    • 4,395 篇 电子科学与技术(可...
    • 3,909 篇 机械工程
    • 3,622 篇 化学工程与技术
    • 2,805 篇 建筑学
    • 2,355 篇 动力工程及工程热...
    • 2,333 篇 土木工程
    • 2,011 篇 安全科学与工程
  • 55,858 篇 理学
    • 41,256 篇 数学
    • 9,532 篇 生物学
    • 8,422 篇 物理学
    • 7,812 篇 统计学(可授理学、...
    • 4,830 篇 系统科学
    • 3,126 篇 化学
  • 22,371 篇 管理学
    • 13,200 篇 图书情报与档案管...
    • 10,175 篇 管理科学与工程(可...
    • 6,953 篇 工商管理
  • 5,732 篇 医学
    • 5,275 篇 临床医学
    • 4,548 篇 基础医学(可授医学...
    • 3,115 篇 药学(可授医学、理...
  • 3,709 篇 法学
    • 3,145 篇 社会学
  • 2,488 篇 教育学
    • 2,446 篇 教育学
  • 2,167 篇 经济学
    • 2,160 篇 应用经济学
  • 1,828 篇 农学
  • 171 篇 军事学
  • 107 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,080 篇 artificial intel...
  • 4,842 篇 computer communi...
  • 3,516 篇 information syst...
  • 2,780 篇 algorithm analys...
  • 2,434 篇 software enginee...
  • 2,006 篇 image processing...
  • 1,992 篇 user interfaces ...
  • 1,974 篇 semantics
  • 1,940 篇 computers
  • 1,925 篇 information stor...
  • 1,669 篇 computer applica...
  • 1,526 篇 pattern recognit...
  • 1,471 篇 data mining and ...
  • 1,430 篇 computer vision
  • 1,428 篇 software enginee...
  • 1,371 篇 database managem...
  • 1,250 篇 distributed comp...
  • 1,225 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,188 篇 computer systems...

机构

  • 203 篇 university of sc...
  • 151 篇 department of co...
  • 145 篇 institute of inf...
  • 140 篇 huazhong univers...
  • 121 篇 department of co...
  • 120 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 111 篇 national institu...
  • 96 篇 school of comput...
  • 93 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 77 篇 university of el...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 71 篇 karnataka bangal...
  • 70 篇 school of comput...
  • 68 篇 university of ch...
  • 63 篇 school of comput...
  • 62 篇 college of compu...

作者

  • 73 篇 vardi moshe y.
  • 72 篇 wang lei
  • 60 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 39 篇 marina l. gavril...
  • 38 篇 man ka lok
  • 38 篇 jiang xiaoyi
  • 37 篇 li xin
  • 36 篇 li yang
  • 36 篇 stuckey peter j.
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 34 篇 liu bo
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 128,934 篇 英文
  • 4,784 篇 其他
  • 1,494 篇 中文
  • 281 篇 德文
  • 55 篇 罗马尼亚文
  • 5 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135554 条 记 录,以下是741-750 订阅
MMAT: Multi-scale Multi-attention Transformer for Fine-Grained Wild Fungi Visual Classification  21st
MMAT: Multi-scale Multi-attention Transformer for Fine-Grai...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Dai, Qinyan Lu, Yuxiang Wang, Chunlin Lu, Hongtao Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China School of Information Science and Technology Chuxiong Normal University Yunnan China
Fine-Grained Visual Classification (FGVC) is a computer vision task that involves classifying subtle differences in images. While the Vision Transformer (ViT) is excellent at capturing long-range dependencies in seque... 详细信息
来源: 评论
Defense Against Textual Backdoors via Elastic Weighted Consolidation-Based Machine Unlearning  1
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xuan, Haojun Wang, Yajie Wu, Huishu Liu, Tao Zhang, Chuan Zhu, Liehuang Beijing Institute of Technology Beijing China China University of Political Science and Law Beijing China China Academy of Information and Communications Technology Beijing China
Backdoor attacks pose significant threats to Natural Language Processing (NLP) models. Various backdoor defense methods for NLP models primarily function by identifying and subsequently manipulating backdoor triggers ... 详细信息
来源: 评论
Chinese Macro Discourse Parsing on Generative Fusion and Distant Supervision  20th
Chinese Macro Discourse Parsing on Generative Fusion and D...
收藏 引用
20th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2023
作者: He, Longwang Jiang, Feng Bao, Xiaoyi Fan, Yaxin Li, Peifeng Chu, Xiaomin School of Computer Science and Technology Soochow University Suzhou China School of Data Science The Chinese University of Hong Kong Shenzhen China School of Information Science and Technology University of Science and Technology of China Hefei China
Most previous studies on discourse parsing have utilized discriminative models to construct tree structures. However, these models tend to overlook the global perspective of the tree structure as a whole during the st... 详细信息
来源: 评论
Social Perception and Scene Awareness in Human-Robot Interaction  15th
Social Perception and Scene Awareness in Human-Robot Inter...
收藏 引用
15th International Conference on Social Robotics, ICSR 2023
作者: Paplu, Sarwar Khadka, Prabesh Bhat, Bhalachandra Gajanana Berns, Karsten Department of Computer Science University of Kaiserslautern-Landau RRLAB Kaiserslautern67663 Germany
This paper introduces various aspects of social perception skills and scene awareness for interactive robots. The low-level audio-visual perceptual cues e.g., interruption events, eye contact, speech energy, etc. have... 详细信息
来源: 评论
Scheduling Algorithm for Low Energy Consumable Parallel Task Application Based on DVFS  1
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Liu, Xun Zhao, Hui College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Henan University Kaifeng475000 China
With the continuous improvement of various high-performance computing systems, various data centers had also been fully expanded. Energy consumption and actual performance measurement were very important indicators, w... 详细信息
来源: 评论
Investigating Racial and Ethnic Differences in Learning with a Digital Game and Tutor for Decimal Numbers  19th
Investigating Racial and Ethnic Differences in Learning with...
收藏 引用
19th European Conference on Technology Enhanced Learning (EC-TEL)
作者: Ni, Xiaolin Nguyen, Huy A. Else-Quest, Nicole Pagano, Alessandro McLaren, Bruce M. Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ North Carolina Chapel Hill NC 27599 USA Univ Bari Aldo Moro Bari Italy
This study investigates the effects on different racial/ethnic groups of middle school students when learning with a digital learning game, Decimal Point, and a comparable computer tutor. Using data from three classro... 详细信息
来源: 评论
BAnDIT: Business Process Anomaly Detection in Transactions  29th
BAnDIT: Business Process Anomaly Detection in Transactions
收藏 引用
29th International Conference on Cooperative Information Systems, CoopIS 2023
作者: Rudolf, Nico Böhmer, Kristof Leitner, Maria Faculty of Computer Science Research Group Workflow Systems and Technology University of Vienna Währinger Straße 29 Vienna Austria Faculty of Informatics and Data Science Chair of Artificial Intelligence in IT Security University of Regensburg Regensburg Germany
Business process anomaly detection enables the prevention of misuse and failures. Existing approaches focus on detecting anomalies in control, temporal, and resource behavior of individual instances, neglecting the co... 详细信息
来源: 评论
Computations and Complexities of Tarski’s Fixed Points and Supermodular Games  18th
Computations and Complexities of Tarski’s Fixed Points an...
收藏 引用
18th International Joint Conference on Theoretical computer science-Frontier of Algorithmic Wisdom, IJTCS-FAW 2024
作者: Dang, Chuangyin Qi, Qi Ye, Yinyu Department of Systems Engineering City University of Hong Kong Kowloon Tong Hong Kong Gaoling School of Artificial Intelligence Renmin University of China Beijing China Department of Management Science and Engineering Stanford University StanfordCA94305-4026 United States
We consider two models of computation for Tarski’s order preserving function f related to fixed points in a complete lattice: the oracle function model and the polynomial function model. In both models, we find the f... 详细信息
来源: 评论
Complex Network Community Discovery Algorithms Based on Node Similarity and Network Embeddings  1
收藏 引用
13th International Conference on Frontier Computing, FC 2023
作者: Zhang, Zhixun Wang, Juan Xu, Yanqiang School of Computer Science and Artificial Intelligence Lanzhou Institute of Technology Gansu Lanzhou730050 China
This paper briefly analyzes the summary of network embedding and node similarity, emphasizes the discovery, and takes numerical simulation as the entry point to study the evaluation index, real network and artificial ... 详细信息
来源: 评论
Not What I was Trained for - Out-of-Distribution-Tests for Interactive AIs  15th
Not What I was Trained for - Out-of-Distribution-Tests for I...
收藏 引用
15th ACMSIGCHI Conference on Engineering Interactive Computing Systems (EICS)
作者: Severing, Benedikt Werger, Ole Hesenius, Marc Univ Duisburg Essen Inst Software Engn Schutzenbahn 70 D-45127 Essen Germany
Recent advances in AI demonstrate its capacities to not only automate more and more everyday tasks, but also make direct Human-AI-Interaction possible. When using AI models in production, we might face situations wher... 详细信息
来源: 评论