咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 29 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 59 篇 工学
    • 36 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 12 篇 电气工程
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 8 篇 医学
    • 5 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 口腔医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学

主题

  • 83 篇 program code
  • 8 篇 program
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 7 篇 computer softwar...
  • 6 篇 conducted emissi...
  • 6 篇 reverse engineer...
  • 6 篇 codes
  • 4 篇 computer program...
  • 4 篇 analysis program...
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 algorithms
  • 3 篇 key
  • 3 篇 java
  • 3 篇 specifications
  • 3 篇 press
  • 3 篇 spyware
  • 3 篇 legal executions

机构

  • 5 篇 silesian tech un...
  • 2 篇 va greater los a...
  • 1 篇 univ vienna fac ...
  • 1 篇 fdn bruno kessle...
  • 1 篇 ryukoku univ dep...
  • 1 篇 princeton univ d...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 natl acad sci be...
  • 1 篇 jesse brown va m...
  • 1 篇 mt sinai st luke...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 univ calif los a...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 2 篇 ko clifford y.
  • 1 篇 roman popp
  • 1 篇 zingmond david s...
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 galoyan a. s.
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 seidel kristy
  • 1 篇 engels g
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 mccormick suzann...
  • 1 篇 gibbons melinda ...
  • 1 篇 maeda tsuyoshi

语言

  • 80 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Code"
83 条 记 录,以下是61-70 订阅
排序:
Simple Bisimilarity Minimization in O(m log n) Time
收藏 引用
FUNDAMENTA INFORMATICAE 2010年 第3期105卷 319-339页
作者: Valmari, Antti Tampere Univ Technol Dept Software Syst FI-33101 Tampere Finland
A new algorithm for bisimilarity minimization of labelled directed graphs is presented. Its time consumption is O (m log n), where n is the number of states and m is the number of transitions. Unlike earlier algorithm... 详细信息
来源: 评论
Instruction Prediction in Microprocessor Unit Based on Power Supply Line
Instruction Prediction in Microprocessor Unit Based on Power...
收藏 引用
17th International Conference Computer Networks
作者: Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
This paper illustrates the research results concerning the character of signals emitted by the selected microcontroller via the power supply lines. The main purpose of the study is to determinate the instruction that ... 详细信息
来源: 评论
Technical Perspective Large-Scale Sound and Precise program Analysis
收藏 引用
COMMUNICATIONS OF THE ACM 2010年 第8期53卷 114-114页
作者: Henglein, Fritz Univ Copenhagen DIKU Dept Comp Sci Algorithms & Programming Languages Grp Copenhagen Denmark
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of it dead code? Can I replace that code fragment with a more efficient one? Which exceptions can... 详细信息
来源: 评论
Predicting Execution Time of Computer programs Using Sparse Polynomial Regression  10
Predicting Execution Time of Computer Programs Using Sparse ...
收藏 引用
Annual Conference on Neural Information Processing Systems
作者: Ling Huang Byung-Gon Chun Jinzhu Jia Petros Maniatis Bin Yu Mayur Naik Intel Labs Berkeley UC Berkeley
Predicting the execution time of computer programs is an important but challenging problem in the community of computer systems. Existing methods require experts to perform detailed analysis of program code in order t... 详细信息
来源: 评论
Detecting Computer code Plagiarism in Higher Education
Detecting Computer Code Plagiarism in Higher Education
收藏 引用
31st International Conference on Information Technology Interfaces
作者: Konecki, Mario Orehovacki, Tihomir Lovrencic, Alen Fac Org & Informat Varazhdin 42000 Croatia
Rapid development of industry and economy requires quick and efficient education of large amount of theoretical knowledge and practical skills. In computer science, especially in programming, this trend is very notice... 详细信息
来源: 评论
Computer aided data acquisition tool for high-throughput phenotyping of plant populations
收藏 引用
PLANT METHODS 2009年 第1期5卷 18-18页
作者: Vankadavath, Raju Naik Hussain, Appibhai Jakir Bodanapu, Reddaiah Kharshiing, Eros Basha, Pinjari Osman Gupta, Soni Sreelakshmi, Yellamaraju Sharma, Rameshwar Univ Hyderabad Sch Life Sci Hyderabad 500046 Andhra Pradesh India JK AgriGenet Hyderabad 500016 Andhra Pradesh India St Edmunds Coll Dept Bot Shillong 793003 Meghalaya India Yogi Vemana Univ Dept Genet & Genom Kadapa 516003 India
Background: The data generated during a course of a biological experiment/study can be sometimes be massive and its management becomes quite critical for the success of the investigation undertaken. The accumulation a... 详细信息
来源: 评论
Automating Uncompressing and Static Analysis of Conficker Worm
Automating Uncompressing and Static Analysis of Conficker Wo...
收藏 引用
IEEE Malaysia International Conference on Communications
作者: Lee Ling Chuan Chan Lee Yee Mahamod Ismail Kasmiran Jumari Faculty of Engineering & Built Environment Universiti Kebangsaan Malaysia
The infamous computer worm, Conficker, which targeting the Microsoft Windows operating system, was literally over the media. This malicious worm used modern malware technique, where it hide its malicious portion of th... 详细信息
来源: 评论
TinyModules: code Module Exchange in TinyOS
TinyModules: Code Module Exchange in TinyOS
收藏 引用
International Conference on Networked Sensing Systems
作者: Matthias Gauger Pedro Jose Marron Christoph Niedermeier Universitat Bonn Bonn Germany and Fraunhofer IAIS Siemens AG Corporate Research and Technologies
The ability to update or exchange the program code running on sensor nodes is a core requirement in many wireless sensor network scenarios. Such code update mechanisms must take the specific resource limitations of wi... 详细信息
来源: 评论
A sensitivity-based method for direct Stochastic analysis of nonlinear forced response for bladed disks with friction interfaces
收藏 引用
JOURNAL OF ENGINEERING FOR GAS TURBINES AND POWER-TRANSACTIONS OF THE ASME 2008年 第2期130卷 191-199页
作者: Petrov, E. P. Univ London Imperial Coll Sci Technol & Med Dept Mech Engn Ctr Vibrat Engn London SW7 2AZ England
An efficient method is developed to calculate stochastic and uncertainty characteristics of forced response for nonlinear vibrations of bladed disks with friction and gap contact interfaces. Uncertainty ranges, statis... 详细信息
来源: 评论
Hash Function Based Software Watermarking
Hash Function Based Software Watermarking
收藏 引用
International Conference on Advanced Software Engineering and Its Applications
作者: Zhang, Xuesong He, Fengling Zuo, Wanli Jilin Univ Coll Comp Sci & Technol Changchun 130012 Peoples R China
Software piracy is the greatest threats to soft-are industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research a... 详细信息
来源: 评论