咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 29 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 59 篇 工学
    • 36 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 12 篇 电气工程
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 8 篇 医学
    • 5 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 口腔医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学

主题

  • 83 篇 program code
  • 8 篇 program
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 7 篇 computer softwar...
  • 6 篇 conducted emissi...
  • 6 篇 reverse engineer...
  • 6 篇 codes
  • 4 篇 computer program...
  • 4 篇 analysis program...
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 algorithms
  • 3 篇 key
  • 3 篇 java
  • 3 篇 specifications
  • 3 篇 press
  • 3 篇 spyware
  • 3 篇 legal executions

机构

  • 5 篇 silesian tech un...
  • 2 篇 va greater los a...
  • 1 篇 univ vienna fac ...
  • 1 篇 fdn bruno kessle...
  • 1 篇 ryukoku univ dep...
  • 1 篇 princeton univ d...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 natl acad sci be...
  • 1 篇 jesse brown va m...
  • 1 篇 mt sinai st luke...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 univ calif los a...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 2 篇 ko clifford y.
  • 1 篇 roman popp
  • 1 篇 zingmond david s...
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 galoyan a. s.
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 seidel kristy
  • 1 篇 engels g
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 mccormick suzann...
  • 1 篇 gibbons melinda ...
  • 1 篇 maeda tsuyoshi

语言

  • 80 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Program code"
83 条 记 录,以下是61-70 订阅
排序:
Mit :: Ai :: Aim :: Aim-967
收藏 引用
2016年
Mit :: Ai :: Aim :: Aim-967 by published by
来源: 评论
Friden :: 1155 :: Friden 1155 Reference Manual Sep72
收藏 引用
2016年
[Auto Generated] Page 1 INTRODUCTION 1-1 Modes 1-2 Registers 1-3 program Memory 1-3 program codes 1-4 Error Messages 1-4 2 KEYBOARD OPERATIONS 2-1 Keyboard Mode Keys 2-1 Input/Output 2-1 Binary Operation Keys 2-11 Fun... 详细信息
来源: 评论
Bstj 59: 9. Nov 1980: a Memory Implementation of a Fully programmable Digital Controller. (Kartalopoulos, S.V.)
收藏 引用
2016年
Bstj 59: 9. Nov 1980: a Memory Implementation of a Fully programmable Digital Controller. (Kartalopoulos, S.V.) by published by
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-137
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-137 by published by
来源: 评论
Technical Perspective Large-Scale Sound and Precise program Analysis
收藏 引用
COMMUNICATIONS OF THE ACM 2010年 第8期53卷 114-114页
作者: Henglein, Fritz Univ Copenhagen DIKU Dept Comp Sci Algorithms & Programming Languages Grp Copenhagen Denmark
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of it dead code? Can I replace that code fragment with a more efficient one? Which exceptions can... 详细信息
来源: 评论
Computer aided data acquisition tool for high-throughput phenotyping of plant populations
收藏 引用
PLANT METHODS 2009年 第1期5卷 18-18页
作者: Vankadavath, Raju Naik Hussain, Appibhai Jakir Bodanapu, Reddaiah Kharshiing, Eros Basha, Pinjari Osman Gupta, Soni Sreelakshmi, Yellamaraju Sharma, Rameshwar Univ Hyderabad Sch Life Sci Hyderabad 500046 Andhra Pradesh India JK AgriGenet Hyderabad 500016 Andhra Pradesh India St Edmunds Coll Dept Bot Shillong 793003 Meghalaya India Yogi Vemana Univ Dept Genet & Genom Kadapa 516003 India
Background: The data generated during a course of a biological experiment/study can be sometimes be massive and its management becomes quite critical for the success of the investigation undertaken. The accumulation a... 详细信息
来源: 评论
Development and Application of Remote Laboratory for Embedded Systems Design
收藏 引用
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING 2015年 第3期11卷 27-31页
作者: Parkhomenko, Anzhelika Gladkova, Olga Ivanov, Eugene Sokolyanskii, Aleksandr Kurson, Sergey Zaporizhzhya Natl Tech Univ Software Tools Dept UA-69063 Zaporizhzhya Ukraine
This paper presents Embedded Systems' Hardware-Software codesign and is an overview of the approach based on using ready platforms. Comparable analysis of well-known platforms from different vendors is given. Appl... 详细信息
来源: 评论
Predicting Execution Time of Computer programs Using Sparse Polynomial Regression  10
Predicting Execution Time of Computer Programs Using Sparse ...
收藏 引用
Annual Conference on Neural Information Processing Systems
作者: Ling Huang Byung-Gon Chun Jinzhu Jia Petros Maniatis Bin Yu Mayur Naik Intel Labs Berkeley UC Berkeley
Predicting the execution time of computer programs is an important but challenging problem in the community of computer systems. Existing methods require experts to perform detailed analysis of program code in order t... 详细信息
来源: 评论
An alternative for PID control: Predictive Functional Control - a tutorial
An alternative for PID control: Predictive Functional Contro...
收藏 引用
American Control Conference
作者: R. Haber J.A. Rossiter K. Zabet Laboratory of Process Control Institute of Process Engineering and Plant Design Faculty of Process Engineering Energy and Mechanical Systems Cologne University of Applied Science D-50679 Koln Germany Dept. of Automatic Control and Systems Eng. University of Sheffield S1 3JD UK
PFC (Predictive Function Control) can be considered as a bridge between PI(D) and complex MPC. PI(D) control can have problems handling dead time and constraints. PFC handles these cases and is often better than using... 详细信息
来源: 评论
Automating Uncompressing and Static Analysis of Conficker Worm
Automating Uncompressing and Static Analysis of Conficker Wo...
收藏 引用
IEEE Malaysia International Conference on Communications
作者: Lee Ling Chuan Chan Lee Yee Mahamod Ismail Kasmiran Jumari Faculty of Engineering & Built Environment Universiti Kebangsaan Malaysia
The infamous computer worm, Conficker, which targeting the Microsoft Windows operating system, was literally over the media. This malicious worm used modern malware technique, where it hide its malicious portion of th... 详细信息
来源: 评论