咨询与建议

限定检索结果

文献类型

  • 4,653 篇 会议
  • 939 篇 期刊文献
  • 8 篇 学位论文
  • 3 册 图书

馆藏范围

  • 5,603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,667 篇 工学
    • 1,212 篇 电气工程
    • 973 篇 计算机科学与技术...
    • 516 篇 信息与通信工程
    • 181 篇 软件工程
    • 100 篇 电子科学与技术(可...
    • 66 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 17 篇 交通运输工程
    • 10 篇 机械工程
    • 8 篇 测绘科学与技术
    • 6 篇 光学工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 航空宇航科学与技...
    • 2 篇 石油与天然气工程
  • 349 篇 理学
    • 260 篇 数学
    • 57 篇 物理学
    • 21 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 地球物理学
  • 271 篇 文学
    • 271 篇 新闻传播学
  • 114 篇 医学
    • 111 篇 临床医学
    • 9 篇 特种医学
  • 59 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 5,603 篇 source coding
  • 1,266 篇 decoding
  • 662 篇 codes
  • 603 篇 channel coding
  • 415 篇 rate-distortion
  • 379 篇 entropy
  • 342 篇 random variables
  • 291 篇 image coding
  • 270 篇 data compression
  • 252 篇 software
  • 235 篇 training
  • 226 篇 computational mo...
  • 218 篇 semantics
  • 205 篇 video coding
  • 198 篇 encoding
  • 190 篇 quantization
  • 188 篇 distortion
  • 184 篇 redundancy
  • 183 篇 feature extracti...
  • 182 篇 information theo...

机构

  • 28 篇 department of el...
  • 25 篇 department of el...
  • 24 篇 department of el...
  • 20 篇 school of electr...
  • 19 篇 technion israel ...
  • 19 篇 stanford univ de...
  • 18 篇 univ calif berke...
  • 17 篇 school of electr...
  • 15 篇 princeton univ d...
  • 15 篇 univ calif san d...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 queens univ dept...
  • 15 篇 univ michigan de...
  • 14 篇 georgia inst tec...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 12 篇 ibm thomas j. wa...
  • 12 篇 university of ca...

作者

  • 46 篇 zixiang xiong
  • 31 篇 k. ramchandran
  • 26 篇 yang yang
  • 25 篇 mikael skoglund
  • 24 篇 en-hui yang
  • 24 篇 m. effros
  • 23 篇 s. sandeep pradh...
  • 20 篇 tsachy weissman
  • 19 篇 chang wen chen
  • 19 篇 michelle effros
  • 18 篇 k. rose
  • 18 篇 jun chen
  • 17 篇 yasutada oohama
  • 16 篇 skoglund mikael
  • 15 篇 chao tian
  • 14 篇 k. zeger
  • 14 篇 b. girod
  • 13 篇 s.s. pradhan
  • 13 篇 xiaolin wu
  • 13 篇 pradhan s. sande...

语言

  • 5,549 篇 英文
  • 45 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"主题词=Source coding"
5603 条 记 录,以下是301-310 订阅
排序:
The Effectiveness of Hidden Dependence Metrics in Bug Prediction
收藏 引用
IEEE ACCESS 2024年 12卷 77214-77225页
作者: Jasz, Judit Univ Szeged Dept Software Engn H-6720 Szeged Hungary
Finding and fixing bugs in programs is perhaps one of the most difficult, yet most important, tasks in software maintenance. This is why in the last decades, a lot of work has been done on this topic, most of which is... 详细信息
来源: 评论
New Proofs of Gaussian Extremal Inequalities With Applications
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2024年 第5期70卷 3082-3099页
作者: Xu, Yinfei Chen, Guojun Chen, Jun Jin, Shi Southeast Univ Sch Informat Sci & Engn Nanjing 210096 Peoples R China Southeast Univ Natl Mobile Commun Res Lab Nanjing 210096 Peoples R China McMaster Univ Dept Elect & Comp Engn Hamilton ON L8S 4K1 Canada
The conventional enhancement-and-perturbation approach to establishing Gaussian extremal inequalities is refined via a novel monotone path argument in the product probability space. This refined approach is illustrate... 详细信息
来源: 评论
Measuring and Characterizing (Mis)compliance of the Android Permission System
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第4期50卷 742-764页
作者: Barzolevskaia, Anna Branca, Enrico Stakhanova, Natalia Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 5C9 Canada
Within the Android mobile operating system, Android permissions act as a system of safeguards designed to restrict access to potentially sensitive data and privileged components. Multiple research studies indicate fla... 详细信息
来源: 评论
Free and Open source Software
收藏 引用
COMPUTER 2024年 第8期57卷 114-118页
作者: Riehle, Dirk Friedrich Alexander Univ Erlangen Nurnberg D-91054 Erlangen Germany
Free software is software that gives users the right to use the software, to modify the software, and to pass on the software, modified or not, all free of charge and without restrictions on what the software is used ... 详细信息
来源: 评论
A Retrospective on the source Code Control System
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第3期51卷 695-699页
作者: Rochkind, Marc J. Bell Labs PISCATAWAY NJ 08854 USA
The source Code Control System (SCCS) was first introduced in 1975 (Rochkind, 1975). It controlled computer program source code by tracking versions and recording who made changes, when, and why. The present retrospec... 详细信息
来源: 评论
MAGECODE: Machine-Generated Code Detection Method Using Large Language Models
收藏 引用
IEEE ACCESS 2024年 12卷 190186-190202页
作者: Pham, Hung Ha, Huyen Tong, Van Hoang, Dung Tran, Duc Le, Tuyen Ngoc Hanoi Univ Sci & Technol Sch Informat & Commun Technol Hanoi 100000 Vietnam Ming Chi Univ Technol Dept Elect Engn Taipei 24301 Taiwan Ming Chi Univ Technol Ctr Reliabil Engn Taipei 24301 Taiwan
The widespread use of virtual assistants (e.g., GPT4 and Gemini, etc.) by students in their academic assignments raises concerns about academic integrity. Consequently, various machine-generated text (MGT) detection m... 详细信息
来源: 评论
Supersonic: Learning to Generate source Code Optimizations in C/C plus
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第11期50卷 2849-2864页
作者: Chen, Zimin Fang, Sen Monperrus, Martin KTH Royal Inst Technol S-11428 Stockholm Sweden
Software optimization refines programs for resource efficiency while preserving functionality. Traditionally, it is a process done by developers and compilers. This paper introduces a third option, automated optimizat... 详细信息
来源: 评论
Innovating Industry With Research: eknows and Sysparency
收藏 引用
IEEE SOFTWARE 2024年 第3期41卷 41-48页
作者: Geist, Verena Moser, Michael Pichler, Josef Schnitzhofer, Florian Software Competence Ctr Hagenberg GmbH A-4232 Hagenberg Im Muhlkreis Austria Univ Appl Sci Upper Austria Programming & Project Dev Campus Hagenberg A-4232 Hagenberg Im Muhlkreis Austria Sysparency GmbH A-4040 Linz Austria
We present the multi-language software platform eknows for building reverse engineering tools and documentation generators as a concrete example of how to successfully translate research on software analysis into inno... 详细信息
来源: 评论
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第6期50卷 1534-1547页
作者: Lin, Zewei Chen, Jiachi Wu, Jiajing Zhang, Weizhe Wang, Yongjuan Zheng, Zibin Sun Yat Sen Univ Software Engn Zhuhai 519082 Peoples R China Peng Cheng Lab Shenzhen 518000 Peoples R China Sun Yat Sen Univ Sch Software Engn Zhuhai 519082 Peoples R China Harbin Inst Technol Sch Comp Sci & Technol Shenzhen 518055 Peoples R China Peng Cheng Lab Shenzhen 518000 Peoples R China Henan Key Lab Network Cryptog Technol Zhengzhou 450000 Peoples R China
In recent years, Decentralized Finance (DeFi) has grown rapidly due to the development of blockchain technology and smart contracts. As of March 2023, the estimated global cryptocurrency market cap has reached approxi... 详细信息
来源: 评论
HeVulD: A Static Vulnerability Detection Method Using Heterogeneous Graph Code Representation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 9129-9144页
作者: Huang, Yuanming He, Mingshu Wang, Xiaojuan Zhang, Jie Beijing Univ Posts & Telecommun Sch Integrated Circuits Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Sch Elect Engn Beijing 100876 Peoples R China
Vulnerability detection in source code has been a focal point of research in recent years. Traditional rule-based methods fail to identify complex and unknown vulnerabilities, leading to poor performance. While deep l... 详细信息
来源: 评论