Search results

    Filter results

  • Full text

  • Document type

  • Publication year

  • Organisation

Results: 214,459
Number of items: 214,459
  • Open Access
    Wiers, J., Wessels, D., Alvarez-Florez, L., Bujalance Gomez, A., Ruiperez-Campillo, S., Kolk, M., Bekkers, E., & Tjong, F. (2026). Enhancing stability in cardiac risk stratification with equivariant neural fields. European Heart Journal - Digital Health, 7(Supplement 1), Article ztaf143.052. https://doi.org/10.1093/ehjdh/ztaf143.052
  • Open Access
    De Keere, K., Sarpila, O., & Vonk, L. (2026). Looking Right for the Job: Appearances, Unequal Chances, and Gatekeeping in the Labor Market. In G. Kuipers, & O. Sarpila (Eds.), Handbook of Beauty and Inequality (pp. 185-197). (Handbooks of Sociology and Social Research). Springer. https://doi.org/10.1007/978-3-032-08035-6_14
  • Open Access
    Yakın, D., Uijttewaal, J., Plooij, P., Jacob, G. A., Lee, C. W., Brand-de Wilde, O. M., Fassbinder, E., Harper, R. P., Lavender, A., Lockwood, G., Malogiannis, I. A., Ruths, F. A., Shaw, I. A., Zarbock, G., Farrell, J. M., & Arntz, A. (2026). Schema modes as mechanisms of change in treating borderline personality disorder: A model replication study. Journal of Behavior Therapy and Experimental Psychiatry, 90, Article 102074. https://doi.org/10.1016/j.jbtep.2025.102074
  • Scholte, H. S., & de Haan, E. H. F. (2026). Beyond binding: specialization without segregation. Trends in Cognitive Sciences, 192-193. https://doi.org/10.1016/j.tics.2025.11.004
  • Ciampi, M., Ravi, D., Siniscalchi, L., & Xia, Y. (2026). Broadcast-Optimal Secure Computation from Black-Box Oblivious Transfer. In G. Hanaoka, & B.-Y. Yang (Eds.), Advances in Cryptology - ASIACRYPT 2025: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025 : proceedings (Vol. V, pp. 133-162). (Lecture Notes in Computer Science; Vol. 16249). Springer. https://doi.org/10.1007/978-981-95-5116-3_5
  • Ciampi, M., Damgárd, I., Ravi, D., Siniscalchi, L., & Yakoubov, S. (2026). Information-Theoretic Broadcast-Optimal MPC. In B. Applebaum, & H. Lin (Eds.), Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025 : proceedings (Vol. I, pp. 152-181). (Lecture Notes in Computer Science; Vol. 16268). Springer. https://doi.org/10.1007/978-3-032-12287-2_6
  • Open Access
    Canetti, R., Damgård, I., Kolby, S., Ravi, D., & Yakoubov, S. (2026). Deniable Secret Sharing. In B. Applebaum, & H. Lin (Eds.), Theory of Cryptography : 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025 : proceedings (Vol. II, pp. 399-427). (Lecture Notes in Computer Science; Vol. 16269). Springer. https://doi.org/10.1007/978-3-032-12293-3_13
  • Open Access
    Islam, N. T., & Zhao, Z. (2026). How Good are LLMs at Retrieving Documents in a Specific Domain? In G. De Tré, S. Sotirov, J. Kacprzyk, G. Psaila, G. Smits, T. Andreasen, G. Bordogna, & H. Legind Larsen (Eds.), Flexible Query Answering Systems: 16th International Conference, FQAS 2025, Burgas, Bulgaria, September 11–13, 2025 : proceedings (pp. 277-288). (Lecture Notes in Computer Science; Vol. 16119), (Lecture Notes in Artificial Intelligence). Springer. https://doi.org/10.1007/978-3-032-05607-8_26
  • Jiang, W., Wu, F., Zhang, F., Chen, Q., Zhao, Z., & Guo, S. (2026). CRL-MM: Context-Aware Relational Learning and Multidimensional Matching for Few-Shot Knowledge Graph Completion. IEEE Transactions on Neural Networks and Learning Systems, 37(3), 1405-1419. https://doi.org/10.1109/TNNLS.2025.3615900
  • Polak, S., Lammes, S., Korsten, F.-W., Chouraqui, F., Ieven, B., Gekker, A., & Ince, S. (Eds.) (2026). Playing Politics in Digital Spaces. (Routledge Studies in Newe Media and Cyberculture; Vol. 76). Routledge. https://doi.org/10.4324/9781003629542
Page 44 of 21446