咨询与建议

限定检索结果

文献类型

  • 222 篇 会议
  • 84 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 307 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 269 篇 工学
    • 202 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 87 篇 电气工程
    • 36 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 23 篇 信息与通信工程
    • 13 篇 机械工程
    • 12 篇 土木工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 8 篇 仪器科学与技术
    • 7 篇 测绘科学与技术
    • 6 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
  • 131 篇 理学
    • 121 篇 数学
    • 16 篇 系统科学
    • 8 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 3 篇 化学
    • 2 篇 生物学
  • 41 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 5 篇 医学
    • 3 篇 临床医学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 307 篇 data flow graphs
  • 14 篇 scheduling
  • 9 篇 multiprocessing ...
  • 9 篇 high level synth...
  • 7 篇 parallel archite...
  • 7 篇 processor schedu...
  • 6 篇 algorithms
  • 6 篇 very large scale...
  • 6 篇 data flow
  • 6 篇 field programmab...
  • 5 篇 integrated circu...
  • 5 篇 retiming
  • 5 篇 system-on-chip
  • 5 篇 high-level synth...
  • 5 篇 optimisation
  • 5 篇 directed graphs
  • 5 篇 pipeline process...
  • 5 篇 digital signal p...
  • 4 篇 signal processin...
  • 4 篇 embedded systems

机构

  • 3 篇 dept. of compute...
  • 2 篇 offis research i...
  • 2 篇 ericsson bv eind...
  • 2 篇 fudan university...
  • 2 篇 pesit dept ece b...
  • 2 篇 e-just center ky...
  • 2 篇 tsinghua univers...
  • 2 篇 univ london impe...
  • 2 篇 dept. of compute...
  • 2 篇 eindhoven univer...
  • 2 篇 the university o...
  • 2 篇 school of electr...
  • 2 篇 university of al...
  • 2 篇 department of ad...
  • 2 篇 chinese acad sci...
  • 2 篇 school of microe...
  • 2 篇 dept. of compute...
  • 2 篇 broadcom corp ir...
  • 2 篇 department of el...
  • 2 篇 university of mi...

作者

  • 5 篇 sheng weiguang
  • 4 篇 tudruj marek
  • 4 篇 yagain deepa
  • 4 篇 he weifeng
  • 4 篇 parhi kk
  • 3 篇 denk tc
  • 3 篇 mao zhigang
  • 3 篇 masko lukasz
  • 3 篇 zhu xue-yang
  • 3 篇 inoue koji
  • 3 篇 haubelt christia...
  • 3 篇 mehdipour farhad
  • 2 篇 park nohbyung
  • 2 篇 knight j.p.
  • 2 篇 ha soonhoi
  • 2 篇 murakami kazuaki
  • 2 篇 vijaya krishna a...
  • 2 篇 sengupta a.
  • 2 篇 vijayakrishna a.
  • 2 篇 parker alice

语言

  • 261 篇 英文
  • 42 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"主题词=Data Flow Graphs"
307 条 记 录,以下是31-40 订阅
排序:
Enhancing Smart Contract Vulnerability Detection with Hybrid Pre-Trained Models on Source Code and Byte Code  6
Enhancing Smart Contract Vulnerability Detection with Hybrid...
收藏 引用
6th International Conference on Frontier Technologies of Information and Computer, ICFTIC 2024
作者: Yang, Yuhao Xu, Hongxing Yao, Shaowen School of Software Yunnan University Kunming China
Smart contracts have caused significant economic losses due to various vulnerabilities, highlighting the importance of their security. Traditional vulnerability detection methods often focus on a single aspect, either... 详细信息
来源: 评论
An empirical study on the impact of graph representations for code vulnerability detection using graph learning  7
An empirical study on the impact of graph representations fo...
收藏 引用
7th International Conference on Multimedia Analysis and Pattern Recognition, MAPR 2024
作者: Gia Lac, Le Tran Cao Cuong, Nguyen Hoang Son, Ngo Duc Pham, Van-Hau Duy, Phan The University of Information Technology Information Security Laboratory Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Viet Nam
The increasing complexity of software systems has necessitated more sophisticated security measures, particularly in the domain of vulnerability detection. Traditional machine learning (ML) and deep learning (DL) tech... 详细信息
来源: 评论
Software Fault Detection Based on Program Static Analysis and Fault Tree  4
Software Fault Detection Based on Program Static Analysis an...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Li, Yan Wuhan Qingchuan University Hubei Wuhan China
In today's software systems, software failures may lead to serious catastrophic consequences. This paper proposes a comprehensive method based on program static analysis and fault trees to detect software defects.... 详细信息
来源: 评论
Enhancing Incremental dataflow Analysis in an IDE  24
Enhancing Incremental Dataflow Analysis in an IDE
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Harianto, Koko Wang, Feng-Jian Abouzeid, Mahmoud M. National Yang Ming Chiao Tung University Eecs International Graduate Program Hsinchu Taiwan National Yang Ming Chiao Tung University Department of Computer Science Hsinchu Taiwan
Incremental dataflow analysis is a conventional technique adopted in syntax-directed editors, popularly used in Integrated Development Environments (IDEs). However, dataflow anomaly detection during program editing in... 详细信息
来源: 评论
An Overview+Detail Layout for Visualizing Compound graphs
An Overview+Detail Layout for Visualizing Compound Graphs
收藏 引用
2024 IEEE Visualization and Visual Analytics Conference, VIS 2024
作者: Han, Chang Lieffers, Justin Morrison, Clayton Isaacs, Katherine E. The University of Utah United States The University of Arizona United States Lum Ai
Compound graphs are networks in which vertices can be grouped into larger subsets, with these subsets capable of further grouping, resulting in a nesting that can be many levels deep. In several applications, includin... 详细信息
来源: 评论
Practical Experiment of Predicting Cash flows with LSTM and Double-entry Bookkeeping data
Practical Experiment of Predicting Cash Flows with LSTM and ...
收藏 引用
2024 IEEE International Conference on Big data, Bigdata 2024
作者: Motai, Ryoki Mashiko, Sota Kamebuchi, Masato Watanabe, Sora Matsumoto, Ryo Okada, Yukihiko University of Tsukuba Graduate School of Science and Technology Tsukuba Japan Tax Accountant Corporation Nihon Keiei Toyonaka Japan Center for Artificial Intelligence Research University of Tsukuba Institute of Systems and Information Engineering Tsukuba Institute for Advanced Research Tsukuba Japan
Double-entry bookkeeping data (DBD) systematically record the daily transactions of an organization and are the foundation of accounting information. Typically, they are more detailed and larger in scale than financia... 详细信息
来源: 评论
Graphflow: A Fast and Accurate Distributed Streaming Graph Computation Model  30
GraphFlow: A Fast and Accurate Distributed Streaming Graph C...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Liang, Zheheng Zheng, Yingying Bi, Sheng Yao, Chaosheng Wang, Jiayan Xu, Lijie Ji, Shuping Wang, Wei Duan, Shikai Information Center Guangdong Power Grid Limited Liability Company Guangzhou China Joint Laboratory on Cyberspace Security China Southern Power Grid Guangzhou China State Key Lab of Computer Science at Iscas China University of Cas Beijing China Guangzhou Power Supply Bureau Guangzhou China University of Toronto Toronto Canada Nanjing Institute of Software Technology China University of Cas Nanjing China Ant Group-Payment Business Group Hangzhou China
Streaming graph computation has been widely applied in many fields, e.g., social network analysis and online product recommendation. However, existing streaming graph computation approaches still present limitations o... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
A CRCLA Task Partition Algorithm Based on Ant Colony Algorithm  3
A CRCLA Task Partition Algorithm Based on Ant Colony Algorit...
收藏 引用
3rd International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2022
作者: Yang, Chen-Guang Wei, Li Tao, Chen Nan, Long-Mei Key Laboratory of Information Security Information Engineering University Zhengzhou450001 China
In order to find the optimal solution of task partitioning for data flow graph of cryptography algorithm based on reconfigurable logical array, a task partition algorithm ACP based on ant colony algorithm is *** algor... 详细信息
来源: 评论
Traffic flow Prediction Method Based on Fast Statistics of Traffic flow and Graph Convolutional Network  8
Traffic Flow Prediction Method Based on Fast Statistics of T...
收藏 引用
8th IEEE International Conference on Intelligent Transportation Engineering, ICITE 2023
作者: Jiang, Dan Hou, Qun Liu, Xin Gao, Shidi Lingjiu HI-TECH Co. Ltd Hubei Wuhan China School of Artificial Intelligence Jianghan University Hubei Wuhan China Lingjiu HI-TECH Co. Ltd Hubei Wuhan China
Traffic flow prediction is an important issue in the intelligent transportation system, and traffic flow statistics is the data source of traffic flow prediction. The commonly used target detection and tracking traffi... 详细信息
来源: 评论