咨询与建议

限定检索结果

文献类型

  • 4,653 篇 会议
  • 939 篇 期刊文献
  • 8 篇 学位论文
  • 3 册 图书

馆藏范围

  • 5,603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,667 篇 工学
    • 1,212 篇 电气工程
    • 973 篇 计算机科学与技术...
    • 516 篇 信息与通信工程
    • 181 篇 软件工程
    • 100 篇 电子科学与技术(可...
    • 66 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 17 篇 交通运输工程
    • 10 篇 机械工程
    • 8 篇 测绘科学与技术
    • 6 篇 光学工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 航空宇航科学与技...
    • 2 篇 石油与天然气工程
  • 349 篇 理学
    • 260 篇 数学
    • 57 篇 物理学
    • 21 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 地球物理学
  • 271 篇 文学
    • 271 篇 新闻传播学
  • 114 篇 医学
    • 111 篇 临床医学
    • 9 篇 特种医学
  • 59 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 5,603 篇 source coding
  • 1,266 篇 decoding
  • 662 篇 codes
  • 603 篇 channel coding
  • 415 篇 rate-distortion
  • 379 篇 entropy
  • 342 篇 random variables
  • 291 篇 image coding
  • 270 篇 data compression
  • 252 篇 software
  • 235 篇 training
  • 226 篇 computational mo...
  • 218 篇 semantics
  • 205 篇 video coding
  • 198 篇 encoding
  • 190 篇 quantization
  • 188 篇 distortion
  • 184 篇 redundancy
  • 183 篇 feature extracti...
  • 182 篇 information theo...

机构

  • 28 篇 department of el...
  • 25 篇 department of el...
  • 24 篇 department of el...
  • 20 篇 school of electr...
  • 19 篇 technion israel ...
  • 19 篇 stanford univ de...
  • 18 篇 univ calif berke...
  • 17 篇 school of electr...
  • 15 篇 princeton univ d...
  • 15 篇 univ calif san d...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 queens univ dept...
  • 15 篇 univ michigan de...
  • 14 篇 georgia inst tec...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 12 篇 ibm thomas j. wa...
  • 12 篇 university of ca...

作者

  • 46 篇 zixiang xiong
  • 31 篇 k. ramchandran
  • 26 篇 yang yang
  • 25 篇 mikael skoglund
  • 24 篇 en-hui yang
  • 24 篇 m. effros
  • 23 篇 s. sandeep pradh...
  • 20 篇 tsachy weissman
  • 19 篇 chang wen chen
  • 19 篇 michelle effros
  • 18 篇 k. rose
  • 18 篇 jun chen
  • 17 篇 yasutada oohama
  • 16 篇 skoglund mikael
  • 15 篇 chao tian
  • 14 篇 k. zeger
  • 14 篇 b. girod
  • 13 篇 s.s. pradhan
  • 13 篇 xiaolin wu
  • 13 篇 pradhan s. sande...

语言

  • 5,549 篇 英文
  • 45 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"主题词=Source coding"
5603 条 记 录,以下是231-240 订阅
排序:
Refactoring-Aware Block Tracking in Commit History
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第12期50卷 3330-3350页
作者: Hasan, Mohammed Tayeeb Tsantalis, Nikolaos Alikhanifard, Pouria Concordia Univ Dept Comp Sci & Software Engn Montreal PQ H3G 1M8 Canada
Tracking the change history of statements in the commits of a project repository is in many cases useful for supporting various software maintenance, comprehension, and evolution tasks. A high level of accuracy can fa... 详细信息
来源: 评论
Outer Bounds on the CEO Problem With Privacy Constraints
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 1566-1581页
作者: Yachongka, Vamoua Yagi, Hideki Ochiai, Hideki Univ Texas Arlington Dept Comp Sci & Engn Arlington TX 76019 USA Univ Electrocommun Dept Comp & Network Engn Chofu Tokyo 1828585 Japan Osaka Univ Grad Sch Engn Suita Osaka 5650871 Japan
We investigate the rate-distortion-leakage region of the Chief Executive Officer (CEO) problem, considering the presence of a passive eavesdropper and privacy constraints. We start by examining the region where a gene... 详细信息
来源: 评论
A Retrospective of ChangeDistiller: Tree Differencing for Fine-Grained source Code Change Extraction
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第3期51卷 852-857页
作者: Fluri, Beat Wuersch, Michael Pinzger, Martin Gall, Harald Univ Zurich CH-8006 Zurich Switzerland Univ Klagenfurt A-9020 Klagenfurt Austria
In the early development of source code change analysis, methodologies primarily relied on simple textual differencing, which treated code as mere text and identified changes through lines that were added, modified, o... 详细信息
来源: 评论
UNA: Improving Automated PL-NL System by A Unified Neural Architecture
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2025年
作者: Yuan, Dawei Zhang, Tao Jiang, He Macau Univ Sci & Technol Sch Comp Sci & Engn Taipa 999078 Macao Peoples R China Dalian Univ Technol Sch Software Dalian 116024 Peoples R China
With the extensive application of artificial intelligence (AI) technologies, automated programming language-natural language (PL-NL) systems have gained significant attention, driving a series of related tasks served ... 详细信息
来源: 评论
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From source Code
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 1822-1835页
作者: Hu, Qihua Wang, Weiping Song, Hong Guo, Song Zhang, Jian Zhang, Shigeng Cent South Univ Sch Comp Sci & Engn Changsha 410083 Peoples R China Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Peoples R China
Machine learning-based Android malware detection has consistently demonstrated superior results. However, with the continual evolution of the Android framework, the efficacy of the deployed models declines markedly. E... 详细信息
来源: 评论
Leveraging Graph Analysis to Pinpoint Root Causes of Scalability Issues for Parallel Applications
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2025年 第2期36卷 308-325页
作者: Jin, Yuyang Wang, Haojie Tang, Xiongchao Guo, Zhenhua Zhao, Yaqian Hoefler, Torsten Liu, Tao Liu, Xu Zhai, Jidong Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China WATRIX AI Beijing 100084 Peoples R China Inspur Elect Informat Ind Co Ltd State Key Lab High End & Storage Technol Jinan 250013 Peoples R China Swiss Fed Inst Technol Dept Comp Sci Scalable Parallel Comp Lab SPCL CH-8092 Zurich Switzerland Qilu Univ Technol Shandong Acad Sci Jinan 250014 Shandong Peoples R China North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
It is challenging to scale parallel applications to modern supercomputers because of load imbalance, resource contention, and communications between processes. Profiling and tracing are two main performance analysis a... 详细信息
来源: 评论
Gamma rate theory for causal rate control in source coding and video coding
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION 2014年 第8期25卷 1886-1893页
作者: Xu, Jun Wu, Dapeng Univ Florida Dept Elect & Comp Engn Gainesville FL 32611 USA
The rate distortion function in information theory provides performance bounds for lossy source coding. However, it is not clear how to causally encode a Gaussian sequence under rate constraints while achieving R-D op... 详细信息
来源: 评论
Why Smart Contracts Reported as Vulnerable Were Not Exploited?
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第3期22卷 2579-2596页
作者: Hu, Tianyuan Li, Jingyue Li, Bixin Storhaug, Andre Southeast Univ Sch Comp Sci & Engn Nanjing 211189 Peoples R China Norwegian Univ Sci & Technol Dept Comp Sci N-7034 Trondheim Norway
Smart contract security is crucial for blockchain applications. While studies suggest that only a small fraction of reported vulnerabilities are exploited, no follow-up research has investigated the reasons behind thi... 详细信息
来源: 评论
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
收藏 引用
IEEE ACCESS 2025年 13卷 4368-4380页
作者: Rattanavipanon, Norrathep Suaboot, Jakapan Werapun, Warodom Prince Songkla Univ Coll Comp Phuket Campus Phuket 83120 Thailand
Quantum computing poses a significant global threat to modern security mechanisms. As such, security experts and public sectors have issued guidelines to help organizations transition their software to post-quantum cr... 详细信息
来源: 评论
A Universal and Efficient Multi-Modal Smart Contract Vulnerability Detection Framework for Big Data
收藏 引用
IEEE TRANSACTIONS ON BIG DATA 2025年 第1期11卷 190-207页
作者: Lian, Wenjuan Bao, Zikang Zhang, Xinze Jia, Bin Zhang, Yang Shandong Univ Sci & Technol Coll Comp Sci & Engn Qingdao 266590 Peoples R China
A vulnerability or error in a smart contract will lead to serious consequences including loss of assets and leakage of user privacy. Established smart contract vulnerability detection tools define vulnerabilities thro... 详细信息
来源: 评论