咨询与建议

限定检索结果

文献类型

  • 4,646 篇 会议
  • 924 篇 期刊文献
  • 8 篇 学位论文
  • 3 册 图书

馆藏范围

  • 5,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,654 篇 工学
    • 1,198 篇 电气工程
    • 965 篇 计算机科学与技术...
    • 513 篇 信息与通信工程
    • 173 篇 软件工程
    • 100 篇 电子科学与技术(可...
    • 68 篇 控制科学与工程
    • 41 篇 仪器科学与技术
    • 17 篇 交通运输工程
    • 10 篇 机械工程
    • 8 篇 测绘科学与技术
    • 6 篇 光学工程
    • 5 篇 网络空间安全
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
    • 3 篇 航空宇航科学与技...
    • 2 篇 石油与天然气工程
  • 345 篇 理学
    • 256 篇 数学
    • 57 篇 物理学
    • 21 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 地球物理学
  • 271 篇 文学
    • 271 篇 新闻传播学
  • 114 篇 医学
    • 111 篇 临床医学
    • 9 篇 特种医学
  • 59 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 9 篇 军事学
    • 9 篇 军队指挥学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 5,581 篇 source coding
  • 1,261 篇 decoding
  • 652 篇 codes
  • 600 篇 channel coding
  • 415 篇 rate-distortion
  • 382 篇 entropy
  • 340 篇 random variables
  • 290 篇 image coding
  • 271 篇 data compression
  • 248 篇 software
  • 234 篇 training
  • 224 篇 computational mo...
  • 216 篇 semantics
  • 205 篇 video coding
  • 196 篇 encoding
  • 191 篇 quantization
  • 185 篇 distortion
  • 184 篇 redundancy
  • 182 篇 information theo...
  • 181 篇 parity check cod...

机构

  • 28 篇 department of el...
  • 25 篇 department of el...
  • 24 篇 department of el...
  • 20 篇 school of electr...
  • 19 篇 technion israel ...
  • 19 篇 stanford univ de...
  • 18 篇 univ calif berke...
  • 17 篇 school of electr...
  • 15 篇 princeton univ d...
  • 15 篇 univ calif san d...
  • 15 篇 department of el...
  • 15 篇 department of el...
  • 15 篇 queens univ dept...
  • 15 篇 univ michigan de...
  • 14 篇 georgia inst tec...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 12 篇 ibm thomas j. wa...
  • 12 篇 university of ca...

作者

  • 46 篇 zixiang xiong
  • 31 篇 k. ramchandran
  • 26 篇 yang yang
  • 25 篇 mikael skoglund
  • 24 篇 en-hui yang
  • 24 篇 m. effros
  • 23 篇 s. sandeep pradh...
  • 20 篇 tsachy weissman
  • 19 篇 chang wen chen
  • 19 篇 michelle effros
  • 18 篇 k. rose
  • 18 篇 jun chen
  • 17 篇 yasutada oohama
  • 16 篇 skoglund mikael
  • 15 篇 chao tian
  • 14 篇 k. zeger
  • 14 篇 b. girod
  • 13 篇 s.s. pradhan
  • 13 篇 xiaolin wu
  • 13 篇 pradhan s. sande...

语言

  • 5,528 篇 英文
  • 44 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"主题词=Source coding"
5581 条 记 录,以下是4771-4780 订阅
排序:
Vulnerability Detection by Sequential Learning of Program Semantics via Graph Attention Networks
Vulnerability Detection by Sequential Learning of Program Se...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Li Li Qihong Han Zhanqi Cui School of Computer Science Beijing Information Science and Technology University Beijing China
Vulnerability detection is a crucial aspect of protecting software systems from cyber attacks. However, some types of vulnerabilities are difficult to detect and require analyzing the source code from multi-views. To ... 详细信息
来源: 评论
Robust Decision-Making for Off-Ramp in Intention-Based Deep Reinforcement Learning
Robust Decision-Making for Off-Ramp in Intention-Based Deep ...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Huazhen Fang Li Liu Qing Gu Xiaofeng Xiao Yu Meng School of Mechanical Engineering University of Science and Technology Beijing Beijing China
Deep reinforcement learning has demonstrated its effectiveness in autonomous driving decision-making. The real-world vehicle decision-making process is complex and involves many types of information. Limitations in st... 详细信息
来源: 评论
Multi bearer channel resource allocation for optimised transmission of video objects
Multi bearer channel resource allocation for optimised trans...
收藏 引用
IEEE International Conference on Image Processing
作者: S. Nasir S. Worrall M. Mrak A.M. Kondoz Centre for Communication Systems Research University of Surrey Guildford Surrey UK
This paper presents a novel channel optimisation scheme that enhances the quality of object based video, transmitted over a fixed bandwidth channel. The optimisation methodology is based on an accurate modelling of vi... 详细信息
来源: 评论
OpenThermalPose: An Open-source Annotated Thermal Human Pose Dataset and Initial YOLOv8-Pose Baselines
OpenThermalPose: An Open-Source Annotated Thermal Human Pose...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Askat Kuzdeuov Darya Taratynova Alim Tleuliyev Huseyin Atakan Varol Institute of Smart Systems and Artificial Intelligence Nazarbayev University Astana Kazakhstan
Human pose estimation has a variety of applications in action recognition, human-robot interaction, motion capture, augmented reality, sports analytics, and healthcare. There is a substantial stream of datasets and de... 详细信息
来源: 评论
An outer bound for the vector Gaussian CEO problem
An outer bound for the vector Gaussian CEO problem
收藏 引用
IEEE International Symposium on Information Theory
作者: Ersen Ekrem Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park MD USA
We study the vector Gaussian CEO problem, and provide an outer bound for its rate-distortion region. We obtain our outer bound by evaluating an outer bound for the multiterminal source coding problem by means of a tec... 详细信息
来源: 评论
Efficient codebook allocation for an arbitrary set of vector quantizers
Efficient codebook allocation for an arbitrary set of vector...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Y. Shoham A. Cersho Department of Electrical & Computer Engineering University of California Santa Barbara CA USA
Traditional solutions to the bit allocation problem assume nicely behaved quantizers whose distortion versus rate characteristic is a standard exponentially decreasing function. This model is often inadequate and lead... 详细信息
来源: 评论
Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach
Identifying Patterns of Vulnerability Incidence in Foundatio...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Agrim Sachdeva Ben Lazarine Ruchik Dama Sagar Samtani Hongyi Zhu Kelley School of Business Indiana University Bloomington Indiana USA Alvarez College of Business University of Texas San Antonio Texas USA
The rapid pace of the development of artificial intelligence (AI) solutions is enabled by leveraging foundational tools and frameworks that allow AI developers to focus on application logic and rapid prototyping. Howe... 详细信息
来源: 评论
Clustering and quantization of binary vectors with stochastic complexity
Clustering and quantization of binary vectors with stochasti...
收藏 引用
IEEE International Symposium on Information Theory
作者: M. Gyllenberg T. Koski M. Verlaan Department of Appl. Math. University of Turku Turku Finland Department of Math. Luleå University of Technology Lulea Sweden Department of Techn. Math. and Comp. Science Delft University of Technnology Delft Netherlands
Stochastic complexity (SC) is used for determining both the codebook and its size in a vector quantizer for binary strings given a training sequence.
来源: 评论
Classifying source Code: How Far Can Compressor-based Classifiers Go?
Classifying Source Code: How Far Can Compressor-based Classi...
收藏 引用
International Conference on Software Engineering - Companion, ICSE, Companion
作者: Zhou Yang Singapore Management University Singapore
Pre-trained language models of code, which are built upon large-scale datasets, millions of trainable parameters, and high computational resources cost, have achieved phenomenal success. Recently, researchers have pro... 详细信息
来源: 评论
Improving Plasticity in Online Continual Learning via Collaborative Learning
Improving Plasticity in Online Continual Learning via Collab...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Maorong Wang Nicolas Michel Ling Xiao Toshihiko Yamasaki The University of Tokyo Univ Gustave Eiffel CNRS LIGM
Online Continual Learning (CL) solves the problem of learning the ever-emerging new classification tasks from a continuous data stream. Unlike its offline counterpart, in online CL, the training data can only be seen ... 详细信息
来源: 评论