咨询与建议

限定检索结果

文献类型

  • 4,653 篇 会议
  • 939 篇 期刊文献
  • 8 篇 学位论文
  • 3 册 图书

馆藏范围

  • 5,603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,667 篇 工学
    • 1,212 篇 电气工程
    • 973 篇 计算机科学与技术...
    • 516 篇 信息与通信工程
    • 181 篇 软件工程
    • 100 篇 电子科学与技术(可...
    • 66 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 17 篇 交通运输工程
    • 10 篇 机械工程
    • 8 篇 测绘科学与技术
    • 6 篇 光学工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 航空宇航科学与技...
    • 2 篇 石油与天然气工程
  • 349 篇 理学
    • 260 篇 数学
    • 57 篇 物理学
    • 21 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 地球物理学
  • 271 篇 文学
    • 271 篇 新闻传播学
  • 114 篇 医学
    • 111 篇 临床医学
    • 9 篇 特种医学
  • 59 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 5,603 篇 source coding
  • 1,266 篇 decoding
  • 662 篇 codes
  • 603 篇 channel coding
  • 415 篇 rate-distortion
  • 379 篇 entropy
  • 342 篇 random variables
  • 291 篇 image coding
  • 270 篇 data compression
  • 252 篇 software
  • 235 篇 training
  • 226 篇 computational mo...
  • 218 篇 semantics
  • 205 篇 video coding
  • 198 篇 encoding
  • 190 篇 quantization
  • 188 篇 distortion
  • 184 篇 redundancy
  • 183 篇 feature extracti...
  • 182 篇 information theo...

机构

  • 28 篇 department of el...
  • 25 篇 department of el...
  • 24 篇 department of el...
  • 20 篇 school of electr...
  • 19 篇 technion israel ...
  • 19 篇 stanford univ de...
  • 18 篇 univ calif berke...
  • 17 篇 school of electr...
  • 15 篇 princeton univ d...
  • 15 篇 univ calif san d...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 queens univ dept...
  • 15 篇 univ michigan de...
  • 14 篇 georgia inst tec...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 12 篇 ibm thomas j. wa...
  • 12 篇 university of ca...

作者

  • 46 篇 zixiang xiong
  • 31 篇 k. ramchandran
  • 26 篇 yang yang
  • 25 篇 mikael skoglund
  • 24 篇 en-hui yang
  • 24 篇 m. effros
  • 23 篇 s. sandeep pradh...
  • 20 篇 tsachy weissman
  • 19 篇 chang wen chen
  • 19 篇 michelle effros
  • 18 篇 k. rose
  • 18 篇 jun chen
  • 17 篇 yasutada oohama
  • 16 篇 skoglund mikael
  • 15 篇 chao tian
  • 14 篇 k. zeger
  • 14 篇 b. girod
  • 13 篇 s.s. pradhan
  • 13 篇 xiaolin wu
  • 13 篇 pradhan s. sande...

语言

  • 5,549 篇 英文
  • 45 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"主题词=Source coding"
5603 条 记 录,以下是261-270 订阅
排序:
DB-CBIL: A DistilBert-Based Transformer Hybrid Model Using CNN and BiLSTM for Software Vulnerability Detection
收藏 引用
IEEE ACCESS 2024年 12卷 64446-64460页
作者: Bahaa, Ahmed Kamal, Aya El-Rahman Fahmy, Hanan Ghoneim, Amr S. Helwan Univ Fac Comp & Artificial Intelligence Dept Informat Syst Helwan 11795 Egypt Beni Suef Univ Fac Comp & Artificial Intelligence Dept Informat Syst Bani Suwayf 62521 Egypt Helwan Univ Fac Comp & Artificial Intelligence Dept Comp Sci Helwan 11795 Egypt
Software vulnerabilities are among the significant causes of security breaches. Vulnerabilities can severely compromise software security if exploited by malicious attacks and may result in catastrophic losses. Hence,... 详细信息
来源: 评论
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第12期50卷 3290-3306页
作者: Yang, Zhou Zhao, Zhipeng Wang, Chenyu Shi, Jieke Kim, Dongsun Han, Donggyun Lo, David Singapore Management Univ Sch Comp & Informat Syst Singapore 188065 Singapore Univ Copenhagen DK-1165 Copenhagen Denmark Korea Univ Seoul 02841 South Korea Royal Holloway Univ London Egham TW20 0EX England
Leveraging large-scale datasets from open-source projects and advances in large language models, recent progress has led to sophisticated code models for key software engineering tasks, such as program repair and code... 详细信息
来源: 评论
Generalized Universal coding of Integers
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2024年 第8期72卷 4538-4550页
作者: Yan, Wei Han, Yunghsiang S. Natl Univ Def Technol Coll Elect Engn Hefei 230037 Peoples R China Anhui Prov Key Lab Cyberspace Secur Situat Awaren Hefei 230037 Peoples R China Univ Elect Sci & Technol China Shenzhen Inst Adv Study Shenzhen Peoples R China
Universal coding of integers (UCI) is a class of variable-length code such that the ratio of the expected codeword length to max{1, H(P)} is bounded by a constant factor, where H(P) is the Shannon entropy of the decre... 详细信息
来源: 评论
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第1期12卷 30-44页
作者: Xu, Lijuan An, Baolong Li, Xin Zhao, Dawei Peng, Haipeng Song, Weizhao Tong, Fenghua Han, Xiaohui Qilu Univ Technol Shandong Acad Sci Shandong Comp Sci Ctr Natl Supercomp Ctr JinanKey Lab Comp Power Networ Jinan 250014 Peoples R China Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
Current vulnerability detection methods encounter challenges, such as inadequate feature representation, constrained feature extraction capabilities, and coarse-grained detection. To address these issues, we propose a... 详细信息
来源: 评论
Programmer Visual Attention During Context-Aware Code Summarization
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第5期51卷 1524-1537页
作者: Wallace, Robert Bansal, Aakash Karas, Zachary Tang, Ningzhi Huang, Yu Jia-Jun Li, Toby McMillan, Collin Univ Notre Dame Dept Comp Sci & Engn Notre Dame IN 46556 USA Vanderbilt Univ Dept Comp Sci Nashville TN 37235 USA
Programmer attention represents the visual focus of programmers on parts of the source code in pursuit of programming tasks. The focus of current research in modeling this programmer attention has been on using mouse ... 详细信息
来源: 评论
Development of a Framework-Independent Code Generator From State Machine Diagrams
收藏 引用
IEEE ACCESS 2024年 12卷 125108-125124页
作者: Jung, Seungmo Lee, Woojin Kyungpook Natl Univ Sch Comp Sci & Engn Daegu 41566 South Korea
State machine diagrams offer the advantage of expressing the system clearly and easily to understand because they express the operation of the system in highly readable graphics. In addition, codes can be automaticall... 详细信息
来源: 评论
Properties of k-Bit Delay Decodable Codes
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2024年 第3期E107A卷 417-447页
作者: Hashimoto, Kengo Iwata, Ken-Ichi Univ Fukui Fukui 9108507 Japan
The class of k -bit delay decodable codes, source codes allowing decoding delay of at most k bits for k >= 0, can attain a shorter average codeword length than Huffman codes. This paper discusses the general proper... 详细信息
来源: 评论
A Holistic Approach to Design Understanding Through Concept Explanation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第2期51卷 449-465页
作者: Fang, Hongzhou Cai, Yuanfang Tempero, Ewan Kazman, Rick Tu, Yu-Cheng Lefever, Jason Pisch, Ernst Drexel Univ Dept Comp Sci Philadelphia PA 19104 USA Univ Auckland Sch Comp Sci Auckland 1142 New Zealand Univ Hawaii Shidler Coll Business Honolulu HI 96822 USA
Complex software systems consist of multiple overlapping design structures, such as abstractions, features, crosscutting concerns, or patterns. This is similar to how a human body has multiple interacting subsystems, ... 详细信息
来源: 评论
Successive Refinement of Shannon Cipher System Under Maximal Leakage
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2025年 第3期71卷 1487-1503页
作者: Wu, Zhuangfei Bai, Lin Zhou, Lin Beihang Univ Sch Cyber Sci & Technol Beijing 100191 Peoples R China Zhongguancun Lab Beijing 100191 Peoples R China
We study the successive refinement setting of Shannon cipher system (SCS) under the maximal leakage secrecy metric for discrete memoryless sources under bounded distortion measures. Specifically, we generalize the thr... 详细信息
来源: 评论
"Paper, Meet Code": A Deep Learning Approach to Linking Scholarly Articles With GitHub Repositories
收藏 引用
IEEE ACCESS 2024年 12卷 68410-68426页
作者: Puangjaktha, Prahyat Choetkiertikul, Morakot Tuarob, Suppawong Mahidol Univ Fac Informat & Commun Technol Salaya 73170 Thailand
Computer scientists often publish their source code accompanying their publications, prominently using code repositories across various domains. Despite the concurrent existence of scholarly articles and their associa... 详细信息
来源: 评论