咨询与建议

限定检索结果

文献类型

  • 4,653 篇 会议
  • 939 篇 期刊文献
  • 8 篇 学位论文
  • 3 册 图书

馆藏范围

  • 5,603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,667 篇 工学
    • 1,212 篇 电气工程
    • 973 篇 计算机科学与技术...
    • 516 篇 信息与通信工程
    • 181 篇 软件工程
    • 100 篇 电子科学与技术(可...
    • 66 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 17 篇 交通运输工程
    • 10 篇 机械工程
    • 8 篇 测绘科学与技术
    • 6 篇 光学工程
    • 6 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 航空宇航科学与技...
    • 2 篇 石油与天然气工程
  • 349 篇 理学
    • 260 篇 数学
    • 57 篇 物理学
    • 21 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 地球物理学
  • 271 篇 文学
    • 271 篇 新闻传播学
  • 114 篇 医学
    • 111 篇 临床医学
    • 9 篇 特种医学
  • 59 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 5,603 篇 source coding
  • 1,266 篇 decoding
  • 662 篇 codes
  • 603 篇 channel coding
  • 415 篇 rate-distortion
  • 379 篇 entropy
  • 342 篇 random variables
  • 291 篇 image coding
  • 270 篇 data compression
  • 252 篇 software
  • 235 篇 training
  • 226 篇 computational mo...
  • 218 篇 semantics
  • 205 篇 video coding
  • 198 篇 encoding
  • 190 篇 quantization
  • 188 篇 distortion
  • 184 篇 redundancy
  • 183 篇 feature extracti...
  • 182 篇 information theo...

机构

  • 28 篇 department of el...
  • 25 篇 department of el...
  • 24 篇 department of el...
  • 20 篇 school of electr...
  • 19 篇 technion israel ...
  • 19 篇 stanford univ de...
  • 18 篇 univ calif berke...
  • 17 篇 school of electr...
  • 15 篇 princeton univ d...
  • 15 篇 univ calif san d...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 queens univ dept...
  • 15 篇 univ michigan de...
  • 14 篇 georgia inst tec...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 12 篇 ibm thomas j. wa...
  • 12 篇 university of ca...

作者

  • 46 篇 zixiang xiong
  • 31 篇 k. ramchandran
  • 26 篇 yang yang
  • 25 篇 mikael skoglund
  • 24 篇 en-hui yang
  • 24 篇 m. effros
  • 23 篇 s. sandeep pradh...
  • 20 篇 tsachy weissman
  • 19 篇 chang wen chen
  • 19 篇 michelle effros
  • 18 篇 k. rose
  • 18 篇 jun chen
  • 17 篇 yasutada oohama
  • 16 篇 skoglund mikael
  • 15 篇 chao tian
  • 14 篇 k. zeger
  • 14 篇 b. girod
  • 13 篇 s.s. pradhan
  • 13 篇 xiaolin wu
  • 13 篇 pradhan s. sande...

语言

  • 5,549 篇 英文
  • 45 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"主题词=Source coding"
5603 条 记 录,以下是321-330 订阅
Randomize the Running Function When It Is Disclosed
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2024年 第6期73卷 1516-1530页
作者: Li, Yonggang Bao, Yu Chung, Yeh-Ching China Univ Min & Technol Wudaokou 100083 Haidian Peoples R China Chinese Univ Hong Kong Shenzhen Shenzhen 518172 Peoples R China
Address space layout randomization (ASLR) can hide code addresses, which has been widely adopted by security solutions. However, code probes can bypass it. In real attack scenarios, a single code probe can only obtain... 详细信息
来源: 评论
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2024年 第3期21卷 1173-1178页
作者: Pandith, Omais Shafi Indian Inst Technol Dept Comp Sci & Engn Delhi 110016 India
Trusted Execution Environments (TEEs) such as Intel SGX are becoming a commonplace for the security in server processors. Intel SGX provides the guarantees of confidentiality, integrity and replay attack protection fo... 详细信息
来源: 评论
APTracker: A Comprehensive and Analytical Malware Dataset Based on Attribution to APT Groups
收藏 引用
IEEE ACCESS 2024年 12卷 145148-145158页
作者: Erfan Mazaheri, Mohamad Shameli-Sendi, Alireza Shahid Beheshti Univ SBU Fac Comp Sci & Engn Tehran *** Iran
Malware poses a significant threat to organizations, necessitating robust countermeasures. One such measure involves attributing malware to its respective Advanced Persistent Threat (APT) group, which serves several p... 详细信息
来源: 评论
CollectiveHLS: Ultrafast Knowledge-Based HLS Design Optimization
收藏 引用
IEEE EMBEDDED SYSTEMS LETTERS 2024年 第2期16卷 235-238页
作者: Ferikoglou, Aggelos Kakolyris, Andreas Kypriotis, Vasilis Masouros, Dimosthenis Soudris, Dimitrios Xydis, Sotirios Natl Tech Univ Athens Sch Elect & Comp Engn Zografos 15780 Greece
High-level synthesis (HLS) has democratized field programmable gate arrays (FPGAs) by enabling high-level device programmability and rapid microarchitecture customization through the use of directives. Nevertheless, t... 详细信息
来源: 评论
Methodology for Code Synthesis Evaluation of LLMs Presented by a Case Study of ChatGPT and Copilot
收藏 引用
IEEE ACCESS 2024年 12卷 72303-72316页
作者: Sagodi, Zoltan Siket, Istvan Ferenc, Rudolf Univ Szeged Dept Software Engn H-6720 Szeged Hungary FrontEndART Software Ltd H-6721 Szeged Hungary
Large Language Models (LLMs) have grown in popularity in recent years and are now employed in a variety of software engineering domains thanks to their Natural Language Processing (NLP) capabilities, which include sou... 详细信息
来源: 评论
RLocator: Reinforcement Learning for Bug Localization
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第10期50卷 2695-2708页
作者: Chakraborty, Partha Alfadel, Mahmoud Nagappan, Meiyappan Univ Waterloo David R Cheriton Sch Comp Sci Waterloo ON N2L 3G1 Canada Univ Calgary Dept Comp Sci Calgary AB T2N 1N4 Canada
Software developers spend a significant portion of time fixing bugs in their projects. To streamline this process, bug localization approaches have been proposed to identify the source code files that are likely respo... 详细信息
来源: 评论
Research and Implementation of Open source Component Library Detection for Binary Programs
收藏 引用
IEEE ACCESS 2024年 12卷 111846-111857页
作者: Zhang, Yanan Ma, Chao Ning, Yuqiao Wu, Qingyang Guo, Zhen Automot Data China Tianjin Co Ltd Tianjin 300393 Peoples R China CATARC Intelligent & Connected Technol Co LTd Tianjin 300162 Peoples R China
Open source component libraries are widely used in software development. However, vulnerabilities of these components can threaten software security as they spread. Therefore, the industry commonly uses Software Compo... 详细信息
来源: 评论
LogTransformer: Transforming IT System Logs Into Events Using Tree-Based Approach
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2024年 第4期21卷 3904-3918页
作者: Fu, Yuanyuan Xu, Jian Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing 210094 Jiangsu Peoples R China
As an important outcome of complex IT systems in operation, logs provide valuable information for system operation and maintenance. Log event (or template) extraction plays a vital role in log analysis, as its accurac... 详细信息
来源: 评论
Analyzing Cryptography in the Wild A Retrospective
收藏 引用
IEEE SECURITY & PRIVACY 2024年 第6期22卷 12-18页
作者: Albrecht, Martin R. Paterson, Kenneth G. Kings Coll London London England Swiss Fed Inst Technol Zurich Switzerland
We reflect on our experiences analyzing cryptography deployed "in the wild" and give recommendations to fellow researchers about this process.
来源: 评论
Selecting the Best Compiler Optimization by Adopting Natural Language Processing
收藏 引用
IEEE ACCESS 2024年 12卷 121700-121711页
作者: Ahmed, Hameeza Fahim Ul Haque, Muhammad Raza Khan, Hashim Nadeem, Ghalib Arshad, Kamran Assaleh, Khaled Cesar Santos, Paulo NED Univ Engn & Technol Dept Comp & Informat Syst Engn Karachi 75270 Pakistan NED Univ Engn & Technol Dept Telecommun Engn Karachi 75270 Pakistan Iqra Univ Dept Engn Sci & Technol Karachi 75500 Pakistan NED Univ Engn & Technol Natl Ctr Artificial Intelligence Neurocomputat Lab Karachi 75270 Pakistan Ajman Univ Coll Engn & Informat Technol Dept Elect & Comp Engn Ajman U Arab Emirates Ajman Univ Artificial Intelligence Res Ctr Ajman U Arab Emirates Univ Fed Rio Grande do Sul Inst Informat BR-91509900 Porto Alegre Brazil
Compiler is a tool that converts the high-level language into assembly code after enabling relevant optimizations. The automatic selection of suitable optimizations from an ample optimization space is a non-trivial ta... 详细信息
来源: 评论