咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是121-130 订阅
排序:
Cyber Vulnerability Intelligence for Internet of Things binary
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2020年 第3期16卷 2154-2163页
作者: Liu, Shigang Dibaei, Mahdi Tai, Yonghang Chen, Chao Zhang, Jun Xiang, Yang Swinburne Univ Technol Sch Software & Elect Engn Hawthorn Vic 3122 Australia Macquarie Univ Dept Comp Sydney NSW 2109 Australia Yunnan Normal Univ Yunnan Key Lab Optoelect Informat Technol Kunming 650101 Yunnan Peoples R China
Internet of Things (IoT) integrates a variety of software (e.g., autonomous vehicles and military systems) in order to enable the advanced and intelligent services. These software increase the potential of cyber-attac... 详细信息
来源: 评论
Simple capacity-achieving coded modulation strategy
收藏 引用
ELECTRONICS LETTERS 2016年 第1期52卷 81-82页
作者: Cazarotto, M. Lopes, R. R. Univ Estadual Campinas DECOM FEEC Sao Paulo Brazil
A simple system that approaches the capacity of the additive white Gaussian noise channel (AWGN) is proposed. It is well known that this capacity is achieved by a Gaussian input, which is hard to obtain in practice. H... 详细信息
来源: 评论
Shortened and punctured codes and the MacWilliams identities
收藏 引用
LINEAR ALGEBRA AND ITS APPLICATIONS 1997年 第1-3期253卷 1-13页
作者: Goldwasser, JL Department of Mathematics West Virginia University P.O. Box 6310 Morgantown West Virginia 26506-6310 USA
We use shortened and punctured codes to give an elementary proof of a combinatorial identity of Brualdi, Pless, and Beissinger from which the MacWilliams identities follow as special cases. We also give a short, mostl... 详细信息
来源: 评论
Digital information encrypted in an image using binary encoding
收藏 引用
OPTICS COMMUNICATIONS 2008年 第13期281卷 3447-3453页
作者: Lin, Kuang Tsan St Johns Univ Dept Mech & Comp Aided Engn St Johns 25132 NF Taiwan
This paper proposes a new type of encoding methods to encrypt hidden (covert) information in host images. The encrypted information can be plot, fax, word, or network data, and it must be encoded with binary codes. Al... 详细信息
来源: 评论
Design and analysis of codes with distance 4 and 6 minimizing the probability of decoder error
收藏 引用
JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS 2016年 第12期61卷 1440-1455页
作者: Afanassiev, V. B. Davydov, A. A. Zigangirov, D. K. Russian Acad Sci Kharkevich Inst Informat Transmiss Problems Moscow 127051 Russia
The problem of minimization of the decoder error probability is considered for shortened codes of dimension 2 (m) with distance 4 and 6. We prove that shortened Panchenko codes with distance 4 achieve the minimal prob... 详细信息
来源: 评论
Deep Hashing for Compact binary codes Learning
Deep Hashing for Compact Binary Codes Learning
收藏 引用
IEEE Conference on Computer Vision and Pattern Recognition
作者: Venice Erin Liong Jiwen Lu Gang Wang Pierre Moulin Jie Zhou Advanced Digital Sciences Center School of Electrical and Electronic Engineering Nanyang Technological University Department of ECE University of Illinois at Urbana-Champaign Department of Automation Tsinghua University
In this paper, we propose a new deep hashing (DH) approach to learn compact binary codes for large scale visual search. Unlike most existing binary codes learning methods which seek a single linear projection to map e... 详细信息
来源: 评论
Learning Compact binary codes for Visual Tracking
Learning Compact Binary Codes for Visual Tracking
收藏 引用
IEEE Conference on Computer Vision and Pattern Recognition
作者: Xi Li Chunhua Shen Anthony Dick Anton van den Hengel Australian Centre for Visual Technologies The University of Adelaide
A key problem in visual tracking is to represent the appearance of an object in a way that is robust to visual changes. To attain this robustness, increasingly complex models are used to capture appearance variations.... 详细信息
来源: 评论
Sparse Projections for High-Dimensional binary codes
Sparse Projections for High-Dimensional Binary Codes
收藏 引用
IEEE Conference on Computer Vision and Pattern Recognition
作者: Yan Xia Kaiming He Pushmeet Kohli Jian Sun Univ. of Sci. & Technol. of China Hefei China
This paper addresses the problem of learning long binary codes from high-dimensional data. We observe that two key challenges arise while learning and using long binary codes: (1) lack of an effective regularizer for ... 详细信息
来源: 评论
On partitions of an n-cube into nonequivalent perfect codes
收藏 引用
PROBLEMS OF INFORMATION TRANSMISSION 2007年 第4期43卷 310-315页
作者: Avgustinovich, S. V. Solov'eva, F. I. Heden, O. Novosibirsk State Univ RAS Siberian Branch Sobolev Inst Math Novosibirsk 630090 Russia Royal Inst Technol Stockholm Sweden
We prove that for all n = 2(k)-1, k >= 5. there exists a partition of the set of all binary vectors of length n into pairwise nonequivalent perfect binary codes of length n with distance 3.
来源: 评论
Association schemes related to Kasami codes and Kerdock sets
收藏 引用
DESIGNS codeS AND CRYPTOGRAPHY 1999年 第1-3期18卷 89-102页
作者: de Caen, D van Dam, ER Queens Univ Dept Math & Stat Kingston ON K7L 3N6 Canada
Two new infinite series of imprimitive 5-class association schemes are constructed. The first series of schemes arises from forming, in a special manner, two edge-disjoint copies of the coset graph of a binary Kasami ... 详细信息
来源: 评论