咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是151-160 订阅
排序:
Steiner triple systems of order 15 and their codes
收藏 引用
JOURNAL OF STATISTICAL PLANNING AND INFERENCE 1997年 第1期58卷 207-216页
作者: Tonchev, VD Weishaar, RS MICHIGAN TECHNOL UNIV DEPT MATH SCIHOUGHTONMI 49931 OHIO STATE UNIV DEPT MATHCOLUMBUSOH 43210
The binary linear codes generated by incidence matrices of the 80 Steiner triple systems on 15 points (STS(15)) are studied. The 80 codes of length 35 spanned by incidence vectors of the points are all non-isomorphic.... 详细信息
来源: 评论
A High Frequency Resolution Successive-Band Shifted Filters Architecture for a 15-bit IFM Receiver
收藏 引用
IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES 2019年 第5期67卷 2028-2035页
作者: Rahimpour, Hamid Masoumi, Nasser Keshani, Shamim Safavi-Naeini, Safieddin Univ Tehran Coll Engn Sch ECE CST LABDept Elect Tehran *** Iran Univ Waterloo Dept ECE CIARS Waterloo ON N2L 3G1 Canada
A novel structure of microstrip-based instantaneous frequency measurement (IFM) receiver is presented in this paper. The proposed structure employs open-ended resonators as the core part of the receiver. Compact frequ... 详细信息
来源: 评论
On the minimum weights of binary linear complementary dual codes
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 2020年 第2期12卷 285-300页
作者: Araya, Makoto Harada, Masaaki Shizuoka Univ Dept Comp Sci Hamamatsu Shizuoka 4328011 Japan Tohoku Univ Grad Sch Informat Sci Res Ctr Pure & Appl Math Sendai Miyagi 9808579 Japan
Linear complementary dual codes (or codes with complementary duals) are codes whose intersections with their dual codes are trivial. We study the largest minimum weights d(n,k) among all binary linear complementary du... 详细信息
来源: 评论
binary encoding method to encrypt Fourier-transformed information of digital images
收藏 引用
OPTICS COMMUNICATIONS 2009年 第4期282卷 527-534页
作者: Lin, Kuang Tsan [a]Department of Mechanical and Computer Aided Engineering St. John’s University Taipei County 25132 Taiwan
An encoding method is used to encrypt the Fourier-transformed information of a hidden (covert) digital image in an overt image, while the Fourier-transformed information must be encoded with binary codes. All of the p... 详细信息
来源: 评论
Secure codes With List Decoding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2024年 第4期70卷 2430-2442页
作者: Gu, Yujie Vorobyev, Ilya Miao, Ying Kyushu Univ Fac Informat Sci & Elect Engn Fukuoka 8190395 Japan Tech Univ Munich Inst Commun Engn D-80333 Munich Germany Univ Tsukuba Fac Engn Informat & Syst Tsukuba Ibaraki 3058573 Japan
In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resista... 详细信息
来源: 评论
Scalable Supervised Asymmetric Hashing With Semantic and Latent Factor Embedding
收藏 引用
IEEE TRANSACTIONS ON IMAGE PROCESSING 2019年 第10期28卷 4803-4818页
作者: Zhang, Zheng Lai, Zhihui Huang, Zi Wong, Wai Keung Xie, Guo-Sen Liu, Li Shao, Ling Harbin Inst Technol Biocomp Res Ctr Shenzhen Peoples R China Univ Queensland Brisbane Qld 4072 Australia Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen 518060 Peoples R China Hong Kong Polytech Univ Hong Kong Peoples R China Univ Queensland Sch Informat Technol & Elect Engn Brisbane Qld 4072 Australia Inception Inst Artificial Intelligence Abu Dhabi U Arab Emirates
Compact hash code learning has been widely applied to fast similarity search owing to its significantly reduced storage and highly efficient query speed. However, it is still a challenging task to learn discriminative... 详细信息
来源: 评论
Path Sensitive Fuzzing for Native Applications
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2022年 第3期19卷 1544-1561页
作者: Gan, Shuitao Zhang, Chao Qin, Xiaojun Tu, Xuwen Li, Kang Pei, Zhongyu Chen, Zuoning State Key Lab Math Engn & Adv Comp Wuxi Jiangsu Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing 100084 Peoples R China Beijing Natl Res Ctr Informat Sci & Technol Beijing 100084 Peoples R China Anonymous Univ Beijing Peoples R China
Coverage-guided fuzzing is a widely used and effective solution to find software vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to coverage-guided fuzzers. However, tracking full... 详细信息
来源: 评论
Optimal sensor placement for spatial lattice structure based on genetic algorithms
收藏 引用
JOURNAL OF SOUND AND VIBRATION 2008年 第1-2期317卷 175-189页
作者: Liu, Wei Gao, Wei-cheng Sun, Yi Xu, Min-jian Harbin Inst Technol Dept Astronaut Sci & Mech Harbin 150001 Peoples R China
Optimal sensor placement technique plays a key role in structural health monitoring of spatial lattice structures. This paper considers the problem of locating sensors oil a spatial lattice structure with the aim of m... 详细信息
来源: 评论
On a Traveling Salesman Problem for Points in the Unit Cube
收藏 引用
ALGORITHMICA 2024年 第9期86卷 3054-3078页
作者: Balogh, Jozsef Clemen, Felix Christian Dumitrescu, Adrian Univ Illinois Dept Math Urbana IL 61801 USA Karlsruhe Inst Technol Dept Math D-76131 Karlsruhe Germany Algoresearch LLC Milwaukee WI 53217 USA
Let X be an n-element point set in the k-dimensional unit cube [0,1]k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{m... 详细信息
来源: 评论
A class of binary cyclic codes with optimal parameters
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 2022年 第3期14卷 663-675页
作者: Liu, Kaiqiang Wang, Qi Yan, Haode Southwest Jiaotong Univ Sch Math Chengdu 610031 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Southern Univ Sci & Technol Natl Ctr Appl Math Shenzhen Dept Comp Sci & Engn Shenzhen 518055 Peoples R China
For positive integers k >= 2 and t, let m = 2kt and alpha be a primitive element of the finite field F-2m. In this paper, we study the parameters of a class of cyclic codes C-(1,C-v) which has two zeros alpha and a... 详细信息
来源: 评论