咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 13 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 67 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 30 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 11 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 理学
    • 3 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 系统科学
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 2 篇 医学
    • 1 篇 临床医学
  • 1 篇 农学

主题

  • 67 篇 program code
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 7 篇 program
  • 6 篇 conducted emissi...
  • 6 篇 computer softwar...
  • 5 篇 reverse engineer...
  • 5 篇 codes
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 key
  • 3 篇 computer program...
  • 3 篇 java
  • 3 篇 analysis program...
  • 3 篇 press
  • 3 篇 spyware
  • 3 篇 code generation
  • 2 篇 object oriented ...
  • 2 篇 simulating

机构

  • 5 篇 silesian tech un...
  • 1 篇 univ vienna fac ...
  • 1 篇 princeton univ d...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...
  • 1 篇 russian presiden...
  • 1 篇 nvidia research
  • 1 篇 universitat bonn...
  • 1 篇 dhaka univ engn ...
  • 1 篇 siemens ag corpo...
  • 1 篇 guangdong univ t...
  • 1 篇 kharkov national...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 1 篇 roman popp
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 engels g
  • 1 篇 bushehrian o.
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 wegener joachim
  • 1 篇 kurson sergey
  • 1 篇 pavlic mile
  • 1 篇 ruigang liang
  • 1 篇 vidakovic ana m.
  • 1 篇 orehovacki tihom...

语言

  • 64 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Code"
67 条 记 录,以下是31-40 订阅
排序:
Acquisition of E5 Galileo signals in Matlab  3
Acquisition of E5 Galileo signals in Matlab
收藏 引用
3rd IAA-RACTs Conference on Scientific and Technological Experiments on Automatic Space Vehicles and Small Satellites (SPEXP)
作者: Stepanova, Ekaterina Kudryavtsev, Ilya Lohan, Elena Simona Samara State Aerosp Univ Moskovskoye Shosse 34 Samara 443086 Russia Tampere Univ Technol FI-33720 Tampere Finland
The deployment of Galileo constellation leads to the need of efficient algorithms for acquisition and tracking of Galileo signals. These signals are different from GPS signals and this difference should be taken into ... 详细信息
来源: 评论
Power Consumption Analysis of Microprocessor Unit Based on Software Realization  20
Power Consumption Analysis of Microprocessor Unit Based on S...
收藏 引用
20th International Conference on System Controls and Computer Science 2015
作者: Mackowski, Michal Niezabitowski, Michal Silesian Tech Univ Fac Automat Control Elect & Comp Sci 16 Akad St PL-44101 Gliwice Poland
With the advent of portable and high density microelectronic devices, the minimization of power consumption in CMOS VLSI circuits is becoming a critical concern. An embedded system is a combination of electronic hardw... 详细信息
来源: 评论
Development and Application of Remote Laboratory for Embedded Systems Design
收藏 引用
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING 2015年 第3期11卷 27-31页
作者: Parkhomenko, Anzhelika Gladkova, Olga Ivanov, Eugene Sokolyanskii, Aleksandr Kurson, Sergey Zaporizhzhya Natl Tech Univ Software Tools Dept UA-69063 Zaporizhzhya Ukraine
This paper presents Embedded Systems' Hardware-Software codesign and is an overview of the approach based on using ready platforms. Comparable analysis of well-known platforms from different vendors is given. Appl... 详细信息
来源: 评论
Assessment of Line Overloading Risk for Transmission Networks
Assessment of Line Overloading Risk for Transmission Network...
收藏 引用
11th IET International Conference on AC and DC Power Transmission
作者: D. Alali H. Griffiths L. M. Cipcigan A. Haddad Cardiff University Cardiff South Glamorgan GB
Traditional approaches to transmission system security assessment use deterministic criteria e.g. the application of `N-1' or `N-2' circuit depletion under prescribed heavy system loading conditions. However, ... 详细信息
来源: 评论
Antifungal efficiency assessment of the TiO2 coating on facade paints
收藏 引用
ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH 2014年 第19期21卷 11228-11237页
作者: Vucetic, Snezana B. Rudic, Ognjen Lj. Markov, Sinisa L. Bera, Oskar J. Vidakovic, Ana M. Skapin, Andrijana S. Sever Ranogajec, Jonjaua G. Univ Novi Sad Fac Technol Novi Sad 21000 Serbia Slovenian Natl Bldg & Civil Engn Inst Ljubljana 1000 Slovenia
The work studies the photocatalytic activity and the antifungal efficiency of the TiO2/Zn-Al coatings placed on the target commercial facade paints. The photocatalytic active nanocomposite based on TiO2 and Zn-Al-laye... 详细信息
来源: 评论
Applications methods of the objects, and suitability for universal applications in computer graphics context
Applications methods of the objects, and suitability for uni...
收藏 引用
37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
作者: Zeqiri, Nderim State Univ Tetova Fac Sci Appl Tetovo 1200 Macedonia
The use of the primitive objects, can be modified and adapted for universal applications in computer graphics context. The present paper addresses some access and research in the field of computer graphics. The progra... 详细信息
来源: 评论
Quantitatively Exploring Non-code Software Artifacts  14
Quantitatively Exploring Non-code Software Artifacts
收藏 引用
14th Annual International Conference on Quality Software (QSIC)
作者: Bigliardi, Luca Lanza, Michele Bacchelli, Alberto D'Ambros, Marco Mocci, Andrea Univ Lugano Fac Informat Lugano Switzerland Delft Univ Technol NL-2600 AA Delft Netherlands
Most software engineering research focuses its analyses on source code, because correct, well designed, and efficient program code is the desired end output of software development. Nevertheless, source code is not th... 详细信息
来源: 评论
Finding dispatcher gadgets for jump oriented programming code reuse attacks
Finding dispatcher gadgets for jump oriented programming cod...
收藏 引用
8th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
作者: Erdodi, L. Obuda Univ Fac John von Neumann Budapest Hungary
One of the most dangerous forms of the memory manipulation based attacks is the code reuse based attack type. In this type of attack the malwares do not need to place own malicious code in the memory space, they use t... 详细信息
来源: 评论
The Concept of Software-Based Techniques of Increasing Immunity of Microprocessor Unit to Electromagnetic Disturbances
收藏 引用
20th International Conference on Computer Networks (CN)
作者: Kwiecien, Andrzej Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
The essential feature of modern IT systems, related to a device reliability, is their immunity to electromagnetic disturbances. The paper deals with the software-based techniques used for detecting disturbances, which... 详细信息
来源: 评论
Data Security in Microprocessor Units
收藏 引用
20th International Conference on Computer Networks (CN)
作者: Kwiecien, Andrzej Mackowski, Michal Sidzina, Marcin Silesian Tech Univ Inst Comp Sci Gliwice Poland Univ Bielsko Biala Dept Mech Engn Fundamentals Bielsko Biala Poland
Protection of computer systems from an unauthorized access to the classified information is a very essential issue. Security of IT systems can concern various aspects, such as software security, connected with ensurin... 详细信息
来源: 评论