咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 29 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 59 篇 工学
    • 36 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 12 篇 电气工程
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 8 篇 医学
    • 5 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 口腔医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学

主题

  • 83 篇 program code
  • 8 篇 program
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 7 篇 computer softwar...
  • 6 篇 conducted emissi...
  • 6 篇 reverse engineer...
  • 6 篇 codes
  • 4 篇 computer program...
  • 4 篇 analysis program...
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 algorithms
  • 3 篇 key
  • 3 篇 java
  • 3 篇 specifications
  • 3 篇 press
  • 3 篇 spyware
  • 3 篇 legal executions

机构

  • 5 篇 silesian tech un...
  • 2 篇 va greater los a...
  • 1 篇 univ vienna fac ...
  • 1 篇 fdn bruno kessle...
  • 1 篇 ryukoku univ dep...
  • 1 篇 princeton univ d...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 natl acad sci be...
  • 1 篇 jesse brown va m...
  • 1 篇 mt sinai st luke...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 univ calif los a...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 2 篇 ko clifford y.
  • 1 篇 roman popp
  • 1 篇 zingmond david s...
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 galoyan a. s.
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 seidel kristy
  • 1 篇 engels g
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 mccormick suzann...
  • 1 篇 gibbons melinda ...
  • 1 篇 maeda tsuyoshi

语言

  • 80 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Program code"
83 条 记 录,以下是41-50 订阅
排序:
Applications methods of the objects, and suitability for universal applications in computer graphics context
Applications methods of the objects, and suitability for uni...
收藏 引用
37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
作者: Zeqiri, Nderim State Univ Tetova Fac Sci Appl Tetovo 1200 Macedonia
The use of the primitive objects, can be modified and adapted for universal applications in computer graphics context. The present paper addresses some access and research in the field of computer graphics. The progra... 详细信息
来源: 评论
Model of a system for team software development
Model of a system for team software development
收藏 引用
28th International Conference on Information Technology Interfaces
作者: Candrlic, Sanja Pavlic, Mile Poscic, Patrizia Univ Rijeka Fac Arts & Sci Omladinska 14 Rijeka Croatia
The paper describes a program support system for team development in a computer network environment. Existing program solutions already on the market are encapsulated and are not adapted to the needs of users working ... 详细信息
来源: 评论
The Concept of Software-Based Techniques of Increasing Immunity of Microprocessor Unit to Electromagnetic Disturbances
收藏 引用
20th International Conference on Computer Networks (CN)
作者: Kwiecien, Andrzej Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
The essential feature of modern IT systems, related to a device reliability, is their immunity to electromagnetic disturbances. The paper deals with the software-based techniques used for detecting disturbances, which... 详细信息
来源: 评论
The Analysis of Microprocessor Instruction Cycle
The Analysis of Microprocessor Instruction Cycle
收藏 引用
18th Conference on Computer Networks (CN 2011)
作者: Kwiecien, Andrzej Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
Each microcontroller realizing the code saved in a program memory emits electromagnetic disturbances, both conducted that propagate through lines connected to the processor and radiated in the form of electromagnetic ... 详细信息
来源: 评论
Quantitatively Exploring Non-code Software Artifacts  14
Quantitatively Exploring Non-code Software Artifacts
收藏 引用
14th Annual International Conference on Quality Software (QSIC)
作者: Bigliardi, Luca Lanza, Michele Bacchelli, Alberto D'Ambros, Marco Mocci, Andrea Univ Lugano Fac Informat Lugano Switzerland Delft Univ Technol NL-2600 AA Delft Netherlands
Most software engineering research focuses its analyses on source code, because correct, well designed, and efficient program code is the desired end output of software development. Nevertheless, source code is not th... 详细信息
来源: 评论
Using Natural Version Redundancy of FPGA Projects in Area of Critical Applications  11
Using Natural Version Redundancy of FPGA Projects in Area of...
收藏 引用
IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) - IoT, Big Data and AI for a Safe & Secure World and Industry 4.0
作者: Drozd, Oleksandr Romankevich, Vitaliy Kuznietsov, Mykola Drozd, Myroslav Martynyuk, Oleksandr Odessa Natl Polytech Univ Dept Comp Intelligent Syst & Networks Odessa Ukraine Natl Tech Univ Ukraine Igor Sikorsky Kyiv Polytech Inst Syst Programming & Specialized Comp Syst Kiev Ukraine Odessa Natl Polytech Univ Odessa Dept Informat Syst Odessa Ukraine
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ... 详细信息
来源: 评论
Data Security in Microprocessor Units
收藏 引用
20th International Conference on Computer Networks (CN)
作者: Kwiecien, Andrzej Mackowski, Michal Sidzina, Marcin Silesian Tech Univ Inst Comp Sci Gliwice Poland Univ Bielsko Biala Dept Mech Engn Fundamentals Bielsko Biala Poland
Protection of computer systems from an unauthorized access to the classified information is a very essential issue. Security of IT systems can concern various aspects, such as software security, connected with ensurin... 详细信息
来源: 评论
Topology of gluing of virtual and real law in cases of on-line crimes
Topology of gluing of virtual and real law in cases of on-li...
收藏 引用
International Conference on Engineering Technologies and Computer Science (EnT) - Innovation and Application
作者: Baturin, Yuri M. Russian Acad Sci SI Vavilov Inst Hist Sci & Technol Moscow Russia
The article describes offenses within Massively Multiplayer Online Worlds (MM014). The use of criminal law in cases of crimes committed by the inhabitants of virtual worlds is also discussed. But what is considered a ... 详细信息
来源: 评论
Quality Model based on ISO/IEC 9126 for Internal Quality of MATLAB/Simulink/Stateflow Models  2012
Quality Model based on ISO/IEC 9126 for Internal Quality of ...
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Hu, Wei Loeffler, Tino Wegener, Joachim Berner & Mattner Syst Tech GmbH D-10587 Berlin Germany
In a model-based approach, models are considered as the prime artefacts for the software specification, design and implementation. Quality assurance for program codes has been discussed a lot, however equivalent metho... 详细信息
来源: 评论
Flow-Sensitive Pointer Analysis for Millions of Lines of code
Flow-Sensitive Pointer Analysis for Millions of Lines of Cod...
收藏 引用
9th Annual IEEE/ACM International Symposium on code Generation and Optimization (CGO)
作者: Hardekopf, Ben Lin, Calvin Univ Calif Santa Barbara Santa Barbara CA 93106 USA Univ Texas Austin Austin TX 78712 USA
Many program analyses benefit, both in precision and performance, from precise pointer analysis. An important dimension of pointer analysis precision is flow-sensitivity, which has been shown to be useful for applicat... 详细信息
来源: 评论