Search results

    Filter results

  • Full text

  • Document type

  • Publication year

  • Organisation

Results: 214,360
Number of items: 214,360
  • El Majjodi, A., Holtan, J. B., Starke, A. D., & Trattner, C. (2026). LLM-based healthiness? Analyzing the nutritional quality of an AI-generated recipe dataset. In L. Boratto, A. De Filippo, E. Lex, N. Mauro, F. M. Malloci, & F. Ricci (Eds.), Recommender Systems for Sustainability and Social Good: Second International Workshop, RecSoGood 2025, Prague, Czech Republic, September 26, 2025 : proceedings (pp. 78-89). (Communications in Computer and Information Science; Vol. 2802). Springer. https://doi.org/10.1007/978-3-032-13342-7_7
  • Open Access
    Wubs-Mrozewicz, J., & Gustafsson, S. (2026). The Hanseatic World and Scandinavia. In P. Lantschner, & M. Prak (Eds.), The Cambridge Urban History of Europe. - Volume II: Medieval and Early Modern Europe (pp. 272-291). Cambridge University Press. https://doi.org/10.1017/9781009008839.013
  • Verloo, N. (2026). How Public Participation Depends on What Happens ‘In-Between’: Analysing Emotion, Memory and Meaning in Participatory Policies. Social Policy & Administration, 60(2), 298-309. https://doi.org/10.1111/spol.70047
  • Scholte, H. S., & de Haan, E. H. F. (2026). Beyond binding: specialization without segregation. Trends in Cognitive Sciences, 192-193. https://doi.org/10.1016/j.tics.2025.11.004
  • Ciampi, M., Ravi, D., Siniscalchi, L., & Xia, Y. (2026). Broadcast-Optimal Secure Computation from Black-Box Oblivious Transfer. In G. Hanaoka, & B.-Y. Yang (Eds.), Advances in Cryptology - ASIACRYPT 2025: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025 : proceedings (Vol. V, pp. 133-162). (Lecture Notes in Computer Science; Vol. 16249). Springer. https://doi.org/10.1007/978-981-95-5116-3_5
  • Ciampi, M., Damgárd, I., Ravi, D., Siniscalchi, L., & Yakoubov, S. (2026). Information-Theoretic Broadcast-Optimal MPC. In B. Applebaum, & H. Lin (Eds.), Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025 : proceedings (Vol. I, pp. 152-181). (Lecture Notes in Computer Science; Vol. 16268). Springer. https://doi.org/10.1007/978-3-032-12287-2_6
  • Islam, N. T., & Zhao, Z. (2026). How Good are LLMs at Retrieving Documents in a Specific Domain? In G. De Tré, S. Sotirov, J. Kacprzyk, G. Psaila, G. Smits, T. Andreasen, G. Bordogna, & H. Legind Larsen (Eds.), Flexible Query Answering Systems: 16th International Conference, FQAS 2025, Burgas, Bulgaria, September 11–13, 2025 : proceedings (pp. 277-288). (Lecture Notes in Computer Science; Vol. 16119), (Lecture Notes in Artificial Intelligence). Springer. https://doi.org/10.1007/978-3-032-05607-8_26
  • Jiang, W., Wu, F., Zhang, F., Chen, Q., Zhao, Z., & Guo, S. (2026). CRL-MM: Context-Aware Relational Learning and Multidimensional Matching for Few-Shot Knowledge Graph Completion. IEEE Transactions on Neural Networks and Learning Systems, 37(3), 1405-1419. https://doi.org/10.1109/TNNLS.2025.3615900
  • Polak, S., Lammes, S., Korsten, F.-W., Chouraqui, F., Ieven, B., Gekker, A., & Ince, S. (Eds.) (2026). Playing Politics in Digital Spaces. (Routledge Studies in Newe Media and Cyberculture; Vol. 76). Routledge. https://doi.org/10.4324/9781003629542
  • Open Access
    Icks, M. (2026). The Demon and the Prostitute: Justinian and Theodora in Procopius’s biographical Secret History from sixth-century CE Constantinople. In N. Gernalzick, E. Hagen, M. Icks, J. Keohane, & E. Shiraev (Eds.), Auto/Biography and Reputation Politics (pp. 109-128). (Routledge Auto/Biography Studies). Routledge. https://doi.org/10.4324/9781003355489-5
Page 4 of 21436