咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 13 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 67 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 30 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 11 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 理学
    • 3 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 系统科学
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 2 篇 医学
    • 1 篇 临床医学
  • 1 篇 农学

主题

  • 67 篇 program code
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 7 篇 program
  • 6 篇 conducted emissi...
  • 6 篇 computer softwar...
  • 5 篇 reverse engineer...
  • 5 篇 codes
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 key
  • 3 篇 computer program...
  • 3 篇 java
  • 3 篇 analysis program...
  • 3 篇 press
  • 3 篇 spyware
  • 3 篇 code generation
  • 2 篇 object oriented ...
  • 2 篇 simulating

机构

  • 5 篇 silesian tech un...
  • 1 篇 univ vienna fac ...
  • 1 篇 princeton univ d...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...
  • 1 篇 russian presiden...
  • 1 篇 nvidia research
  • 1 篇 universitat bonn...
  • 1 篇 dhaka univ engn ...
  • 1 篇 siemens ag corpo...
  • 1 篇 guangdong univ t...
  • 1 篇 kharkov national...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 1 篇 roman popp
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 engels g
  • 1 篇 bushehrian o.
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 wegener joachim
  • 1 篇 kurson sergey
  • 1 篇 pavlic mile
  • 1 篇 ruigang liang
  • 1 篇 vidakovic ana m.
  • 1 篇 orehovacki tihom...

语言

  • 64 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Program code"
67 条 记 录,以下是11-20 订阅
排序:
Invariant based programming: basic approach and teaching experiences
收藏 引用
FORMAL ASPECTS OF COMPUTING 2009年 第3期21卷 227-244页
作者: Back, Ralph-Johan Abo Akad Univ Turku Finland
program verification is usually done by adding specifications and invariants to the program and then proving that the verification conditions are all true. This makes program verification an alternative to or a comple... 详细信息
来源: 评论
A high-efficient tables memory access saving algorithm for CAVLC decoding
收藏 引用
SIGNAL IMAGE AND VIDEO PROCESSING 2015年 第8期9卷 1805-1814页
作者: Wang, Jianhua Cheng, Lianglun Liu, Jun Sun, YunLong Guangdong Univ Technol Fac Automat Guangzhou 510006 Guangdong Peoples R China Guangdong Univ Technol Fac Informat Engn Guangzhou 510006 Guangdong Peoples R China
Frequent table look-up can result in high memory access, and high memory access can cause increased power consumption in CAVLC decoding. Aiming to solve the problem of high table memory access during the process of CA... 详细信息
来源: 评论
Computer aided data acquisition tool for high-throughput phenotyping of plant populations
收藏 引用
PLANT METHODS 2009年 第1期5卷 1-10页
作者: Vankadavath, Raju Naik Hussain, Appibhai Jakir Bodanapu, Reddaiah Kharshiing, Eros Basha, Pinjari Osman Gupta, Soni Sreelakshmi, Yellamaraju Sharma, Rameshwar Univ Hyderabad Sch Life Sci Hyderabad 500046 Andhra Pradesh India JK AgriGenet Hyderabad 500016 Andhra Pradesh India St Edmunds Coll Dept Bot Shillong 793003 Meghalaya India Yogi Vemana Univ Dept Genet & Genom Kadapa 516003 India
Background: The data generated during a course of a biological experiment/study can be sometimes be massive and its management becomes quite critical for the success of the investigation undertaken. The accumulation a... 详细信息
来源: 评论
Automated symbolic calculations in nonequilibrium thermodynamics
收藏 引用
COMPUTER PHYSICS COMMUNICATIONS 2010年 第12期181卷 2149-2157页
作者: Kroeger, Martin Huetter, Markus ETH Dept Mat CH-8093 Zurich Switzerland
We cast the Jacobi identity for continuous fields into a local form which eliminates the need to perform any partial integration to the expense of performing variational derivatives. This allows us to test the Jacobi ... 详细信息
来源: 评论
Antifungal efficiency assessment of the TiO2 coating on facade paints
收藏 引用
ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH 2014年 第19期21卷 11228-11237页
作者: Vucetic, Snezana B. Rudic, Ognjen Lj. Markov, Sinisa L. Bera, Oskar J. Vidakovic, Ana M. Skapin, Andrijana S. Sever Ranogajec, Jonjaua G. Univ Novi Sad Fac Technol Novi Sad 21000 Serbia Slovenian Natl Bldg & Civil Engn Inst Ljubljana 1000 Slovenia
The work studies the photocatalytic activity and the antifungal efficiency of the TiO2/Zn-Al coatings placed on the target commercial facade paints. The photocatalytic active nanocomposite based on TiO2 and Zn-Al-laye... 详细信息
来源: 评论
Lex Informatica: Information Technology as a Legal Tool  6th
Lex Informatica: Information Technology as a Legal Tool
收藏 引用
6th International Conference on Digital Transformation and Global Society (DTGS)
作者: Amelin, Roman Channov, Sergey Lipatov, Eduard Natl Res Saratov State Univ 83 Astrakhanskaya St Saratov 410012 Russia Russian President Acad Natl Econ & Publ Adm 23-25 Sobornaya St Saratov 410031 Russia
In the era of the fourth technological revolution, the implementation of social relations depends on information technology and software systems. The program code that controls the operation of these systems begins to... 详细信息
来源: 评论
Executable visual contracts
Executable visual contracts
收藏 引用
IEEE Symposium on Visual Languages and Human-Centric Computing
作者: Lohmann, M Sauer, S Engels, G Univ Paderborn Dept Comp Sci D-33098 Paderborn Germany
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely by pre- and post-conditions. Existing ... 详细信息
来源: 评论
Smart Contracts: Security Patterns in the Ethereum Ecosystem and Solidity  1
Smart Contracts: Security Patterns in the Ethereum Ecosystem...
收藏 引用
IEEE 1st International Workshop on Blockchain Oriented Software Engineering (IWBOSE)
作者: Woehrer, Maximilian Zdun, Uwe Univ Vienna Fac Comp Sci Wahringerstr 29 A-1090 Vienna Austria
Smart contracts that build up on blockchain technologies are receiving great attention in new business applications and the scientific community, because they allow untrusted parties to manifest contract terms in prog... 详细信息
来源: 评论
The Analysis of Microprocessor Instruction Cycle
The Analysis of Microprocessor Instruction Cycle
收藏 引用
18th Conference on Computer Networks (CN 2011)
作者: Kwiecien, Andrzej Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
Each microcontroller realizing the code saved in a program memory emits electromagnetic disturbances, both conducted that propagate through lines connected to the processor and radiated in the form of electromagnetic ... 详细信息
来源: 评论
Runtime execution monitoring (REM) to detect and prevent malicious code execution
Runtime execution monitoring (REM) to detect and prevent mal...
收藏 引用
IEEE International Conference on Computer Design
作者: Fiskiran, AM Lee, RB Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in Denial of Service attacks are a few exam... 详细信息
来源: 评论