咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是11-20 订阅
排序:
A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2019年 100卷 1044-1052页
作者: Jeong, Junho Lim, Joong Yeon Son, Yunsik Dongguk Univ Dept Comp Sci & Engn 30 Pildong Ro 1 Gil Seoul 04620 South Korea Dongguk Univ Dept Mech Robot & Energy Engn 30 Pildong Ro 1 Gil Seoul 04620 South Korea
As software is used in various areas today, software security has become a crucial issue. Third-party libraries, which play a major role in software development, pose difficulties in analyzing and testing software sec... 详细信息
来源: 评论
Pavement Marking Incorporated With binary code for Accurate Localization of Autonomous Vehicles
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2022年 第11期23卷 22290-22300页
作者: Wang, Yuhao Wang, Yuhong Ho, Ivan Wang-Hei Sheng, Wei Chen, Ling Hong Kong Polytech Univ Dept Elect & Informat Engn Hong Kong Peoples R China Hong Kong Polytech Univ Dept Civil & Environm Engn Hong Kong Peoples R China Xidian Univ Acad Adv Interdisciplinary Res Xian 710071 Peoples R China
Accurate localization is a critically important issue for autonomous vehicles as it is closely related to the safety and efficiency of autonomous driving. However, current technologies for autonomous vehicle localizat... 详细信息
来源: 评论
binary code Similarity Detection  36
Binary Code Similarity Detection
收藏 引用
36th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Liu, Zian Swinburne Univ Technol Dept Comp Sci & Software Engn Data61 CSIRO Melbourne Vic Australia
binary code similarity detection is to detect the similarity of code at binary (assembly) level without source code. Existing work still has their limitation when dealing with mutated binary code with different compil... 详细信息
来源: 评论
A new algorithm of links labelling for the isomorphism detection of various kinematic chains using binary code
收藏 引用
MECHANISM AND MACHINE THEORY 2019年 131卷 1-32页
作者: Rai, Rajneesh Kumar Punjabi, Sunil Ujjain Engn Coll Dept Mech Engn Ujjain 456010 Madhya Pradesh India
Isomorphism of kinematic chains (KCs) has always been a critical issue for the researchers dealing with structural synthesis. Consequently, many researchers of repute presented various methods during the last eight de... 详细信息
来源: 评论
A NEW binary code OF LENGTH 10 AND COVERING RADIUS-1
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 1991年 第1期37卷 179-180页
作者: OSTERGARD, PRJ Digital Systems Laboratory Helsinki University of Technology Espoo Finland
A mixed code of covering radius 1 that has 60 codewords is constructed. This code is then used to show that K(10,1)>or=120.
来源: 评论
binary code Vulnerability Location Identification with Fine-grained Slicing  3
Binary Code Vulnerability Location Identification with Fine-...
收藏 引用
3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)
作者: Cui, Ningning Chen, Liwei Shi, Gang Univ Chinese Acad Sci Inst Informat Engn Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Precise binary code vulnerability detection is an important research topic in software security. Currently, most software is released in binary form, which requires corresponding binary code vulnerability detection me... 详细信息
来源: 评论
On the dual distance and the gap of a binary code
收藏 引用
DISCRETE MATHEMATICS 1998年 第1-3期192卷 333-336页
作者: Sole, P Tillich, JP ESSI CNRS I3S Lab Informat 650 F-06903 Sophia Antipolis France Univ Caen Dept Informat F-14032 Caen France
The coset graph of a nondegenerate cyclic code is orbital regular. This yields a lower bound on its average distance, a parameter which measures the average distortion of a code used in data compression. Using results... 详细信息
来源: 评论
CcNav: Understanding Compiler Optimizations in binary code
收藏 引用
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2021年 第2期27卷 667-677页
作者: Devkota, Sabin Aschwanden, Pascal Kunen, Adam Legendre, Matthew Isaacs, Katherine E. Univ Arizona Tucson AZ 85721 USA LLNI Belfast Antrim North Ireland
Program developers spend significant time on optimizing and tuning programs. During this iterative process, they apply optimizations, analyze the resulting code, and modify the compilation until they are satisfied. Un... 详细信息
来源: 评论
Phase offset of binary code and its application to the CDMA mobile communications
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 1998年 第6期E81A卷 1145-1151页
作者: Han, YY Song, YJ Hanyang Univ Dept Elect Commun Engn Digital Commun Lab Sungdong Gu Seoul 133791 South Korea
It is important to know phase offsets of a binary code in the field of mobile communications because different phase offsets of the same code are used to distinguish signals received at a mobile station from those of ... 详细信息
来源: 评论
A new binary code of length 16 and minimum distance 3
收藏 引用
INFORMATION PROCESSING LETTERS 2015年 第12期115卷 975-976页
作者: Milshtein, Moshe Hudson New Hampshire United States
We describe a binary (16, 2816,3) code and therefore show A(16, 3) >= 2816. This improves on the previously known bound A(16,3) >= 2720. (C) 2015 Elsevier B.V. All rights reserved.
来源: 评论