咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是21-30 订阅
排序:
Numerical algorithm for phase offsets of binary codes in the code division multiple access system
收藏 引用
ETRI JOURNAL 2006年 第2期28卷 227-230页
作者: Park, HG Hanyang Univ Dept Math Seoul South Korea
There has been a growing need for increased capacity in cellular systems. This has resulted in the adoption of the code division multiple access (CDMA) system as a multiple channel access method. Thus, it is important... 详细信息
来源: 评论
Buffer Overflow Detection on binary code
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 224-229页
作者: 郑燕飞 李晖 陈克非 School of Information Security Eng. Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... 详细信息
来源: 评论
Blurred binary code for the Sustainable Development of Functional Systems
收藏 引用
SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE 2018年 第4期35卷 386-398页
作者: Appignanesi, Laura Univ Politecn Marche Ancona Italy
Luhmann's general systems theory is based on the concept of autopoietic closed systems. However, social changes, globalization and digitization currently constitute factors of change that require a critical review... 详细信息
来源: 评论
BUGGRAPH: Differentiating Source-binary code Similarity with Graph Triplet-Loss Network  21
BUGGRAPH: Differentiating Source-Binary Code Similarity with...
收藏 引用
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS)
作者: Ji, Yuede Cui, Lei Huang, H. Howie George Washington Univ Graph Comp Lab Washington DC 20052 USA
binary code similarity detection, which answers whether two pieces of binary code are similar, has been used in a number of applications, such as vulnerability detection and automatic patching. Existing approaches fac... 详细信息
来源: 评论
Application of static analyses for state-space reduction to the microcontroller binary code
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2011年 第2期76卷 100-118页
作者: Schlich, Bastian Brauer, Joerg Kowalewski, Stefan Rhein Westfal TH Aachen Embedded Software Lab D-52074 Aachen Germany
This paper describes the application of two abstraction techniques, namely dead variable reduction and path reduction, to the microcontroller binary code in order to tackle the state-explosion problem in model checkin... 详细信息
来源: 评论
Malware behavior analysis using binary code Tracking  4
Malware behavior analysis using Binary code Tracking
收藏 引用
4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
作者: Kim, Jihun Youn, Jonghee M. Yeungnam Univ Dept Comp Engn Gyongsan 38541 Gyeongbuk South Korea
The rapidly increasing malware goes beyond personal security threats and has a negative effect on criminal society. To prevent these security threats, many anti-virus vendors and analysts are starving to more efficien... 详细信息
来源: 评论
VESTIGE: Identifying binary code Provenance for Vulnerability Detection  19th
VESTIGE: Identifying Binary Code Provenance for Vulnerabilit...
收藏 引用
19th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Ji, Yuede Cui, Lei Huang, H. Howie George Washington Univ Graph Comp Lab Washington DC 20037 USA
Identifying the compilation provenance of a binary code helps to pinpoint the specific compilation tools and configurations that were used to produce the executable. Unfortunately, existing techniques are not able to ... 详细信息
来源: 评论
Fine-Grained Obfuscation Scheme Recognition on binary code  1
收藏 引用
12th edition of the European Alliance for Innovation (EAI) International Conference on Digital Forensics and Cyber Crime (ICDF2C)
作者: Tian, Zhenzhou Mao, Hengchao Huang, Yaqian Tian, Jie Li, Jinrui Xian Univ Posts & Telecommun Sch Comp Sci & Technol Xian 710121 Peoples R China Shaanxi Key Lab Network Data Anal & Intelligent P Xian Peoples R China
code obfuscation is to change program characteristics through code transformation, so as to avoid detection by virus scanners or prevent security analysts from performing reverse analysis. This paper proposes a new me... 详细信息
来源: 评论
Cross-Modality binary code Learning via Fusion Similarity Hashing  30
Cross-Modality Binary Code Learning via Fusion Similarity Ha...
收藏 引用
30th IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Liu, Hong Ji, Rongrong Wu, Yongjian Huang, Feiyue Zhang, Baochang Xiamen Univ Xiamen Peoples R China Tencent Technol Shanghai Co Ltd Shanghai Peoples R China Beihang Univ Beijing Peoples R China
binary code learning has recently been emerging topic in large-scale cross-modality retrieval. It aims to map features from multiple modalities into a common Hamming space, where the cross-modality similarity can be a... 详细信息
来源: 评论
Dynamic Re-Vectorization of binary code  15
Dynamic Re-Vectorization of Binary Code
收藏 引用
International Conference on Embedded Computer Systems Architectures Modeling and Simulation
作者: Hallou, Nabil Rohou, Erven Clauss, Philippe Ketterlin, Alain INRIA Rennes Team ALF Rennes France Univ Strasbourg CNRS Team CAMUS INRIAICube Lab Strasbourg France
In many cases, applications are not optimized for the hardware on which they run. Several reasons contribute to this unsatisfying situation, including legacy code, commercial code distributed in binary form, or deploy... 详细信息
来源: 评论