咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 31 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 85 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 60 篇 工学
    • 37 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 12 篇 电气工程
    • 6 篇 信息与通信工程
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 9 篇 医学
    • 5 篇 临床医学
    • 2 篇 药学(可授医学、理...
    • 1 篇 基础医学(可授医学...
    • 1 篇 口腔医学
    • 1 篇 公共卫生与预防医...
  • 8 篇 理学
    • 3 篇 物理学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 系统科学
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
  • 2 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学

主题

  • 85 篇 program code
  • 8 篇 program
  • 8 篇 computer softwar...
  • 7 篇 microcontroller
  • 7 篇 electromagnetic ...
  • 6 篇 conducted emissi...
  • 6 篇 computer program...
  • 6 篇 reverse engineer...
  • 6 篇 codes
  • 4 篇 analysis program...
  • 4 篇 electromagnetic ...
  • 3 篇 programming
  • 3 篇 software enginee...
  • 3 篇 key
  • 3 篇 java
  • 3 篇 computer securit...
  • 3 篇 specifications
  • 3 篇 press
  • 3 篇 software
  • 3 篇 spyware

机构

  • 5 篇 silesian tech un...
  • 2 篇 va greater los a...
  • 1 篇 univ vienna fac ...
  • 1 篇 fdn bruno kessle...
  • 1 篇 princeton univ d...
  • 1 篇 technical univer...
  • 1 篇 univ aizu grad d...
  • 1 篇 odessa natl poly...
  • 1 篇 natl acad sci be...
  • 1 篇 jesse brown va m...
  • 1 篇 mt sinai st luke...
  • 1 篇 univ rijeka fac ...
  • 1 篇 natl res saratov...
  • 1 篇 univ novi sad fa...
  • 1 篇 univ calif los a...
  • 1 篇 department of in...
  • 1 篇 univ sheffield d...
  • 1 篇 univ ljubljani f...
  • 1 篇 st edmunds coll ...
  • 1 篇 eindhoven univer...

作者

  • 7 篇 mackowski michal
  • 5 篇 skoroniak krzysz...
  • 5 篇 kwiecien andrzej
  • 2 篇 ko clifford y.
  • 1 篇 roman popp
  • 1 篇 zingmond david s...
  • 1 篇 kroeger martin
  • 1 篇 lohmann m
  • 1 篇 galoyan a. s.
  • 1 篇 christoph nieder...
  • 1 篇 bera oskar j.
  • 1 篇 mocar pavel
  • 1 篇 amelin roman
  • 1 篇 seidel kristy
  • 1 篇 engels g
  • 1 篇 lee rb
  • 1 篇 hans eberle
  • 1 篇 mccormick suzann...
  • 1 篇 gibbons melinda ...
  • 1 篇 wegener joachim

语言

  • 82 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=program code"
85 条 记 录,以下是31-40 订阅
排序:
Runtime execution monitoring (REM) to detect and prevent malicious code execution
Runtime execution monitoring (REM) to detect and prevent mal...
收藏 引用
IEEE International Conference on Computer Design
作者: Fiskiran, AM Lee, RB Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in Denial of Service attacks are a few exam... 详细信息
来源: 评论
Instruction Prediction in Microprocessor Unit
Instruction Prediction in Microprocessor Unit
收藏 引用
18th Conference on Computer Networks (CN 2011)
作者: Kwiecien, Andrzej Mackowski, Michal Skoroniak, Krzysztof Silesian Tech Univ Inst Comp Sci PL-44100 Gliwice Poland
Protection of computer systems from an unauthorized access to the classified information is a very essential issue. The research deals with some aspect of this problem resulting from the fact, that for instance, an au... 详细信息
来源: 评论
A methodology and tool support for the development and application of frameworks
收藏 引用
Journal of Integrated Design and Process Science 1999年 第2期3卷 21-32页
作者: Ivanov, E. Philippow, I. Preissel, R. Technical University of Ilmenau Germany
This paper addresses reuse, which is one of the most important goals in software development. More specifically, the topic of high level reuse is in more interest. Frameworks are considered the highest level of reuse,... 详细信息
来源: 评论
Smart Contracts: Security Patterns in the Ethereum Ecosystem and Solidity  1
Smart Contracts: Security Patterns in the Ethereum Ecosystem...
收藏 引用
IEEE 1st International Workshop on Blockchain Oriented Software Engineering (IWBOSE)
作者: Woehrer, Maximilian Zdun, Uwe Univ Vienna Fac Comp Sci Wahringerstr 29 A-1090 Vienna Austria
Smart contracts that build up on blockchain technologies are receiving great attention in new business applications and the scientific community, because they allow untrusted parties to manifest contract terms in prog... 详细信息
来源: 评论
Acquisition of E5 Galileo signals in Matlab  3
Acquisition of E5 Galileo signals in Matlab
收藏 引用
3rd IAA-RACTs Conference on Scientific and Technological Experiments on Automatic Space Vehicles and Small Satellites (SPEXP)
作者: Stepanova, Ekaterina Kudryavtsev, Ilya Lohan, Elena Simona Samara State Aerosp Univ Moskovskoye Shosse 34 Samara 443086 Russia Tampere Univ Technol FI-33720 Tampere Finland
The deployment of Galileo constellation leads to the need of efficient algorithms for acquisition and tracking of Galileo signals. These signals are different from GPS signals and this difference should be taken into ... 详细信息
来源: 评论
Detecting Computer code Plagiarism in Higher Education
Detecting Computer Code Plagiarism in Higher Education
收藏 引用
31st International Conference on Information Technology Interfaces
作者: Konecki, Mario Orehovacki, Tihomir Lovrencic, Alen Fac Org & Informat Varazhdin 42000 Croatia
Rapid development of industry and economy requires quick and efficient education of large amount of theoretical knowledge and practical skills. In computer science, especially in programming, this trend is very notice... 详细信息
来源: 评论
Finding dispatcher gadgets for jump oriented programming code reuse attacks
Finding dispatcher gadgets for jump oriented programming cod...
收藏 引用
8th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)
作者: Erdodi, L. Obuda Univ Fac John von Neumann Budapest Hungary
One of the most dangerous forms of the memory manipulation based attacks is the code reuse based attack type. In this type of attack the malwares do not need to place own malicious code in the memory space, they use t... 详细信息
来源: 评论
Disposable Testing: Avoiding Maintenance of Generated Unit Tests by Throwing Them Away  17
Disposable Testing: Avoiding Maintenance of Generated Unit T...
收藏 引用
IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)
作者: Shamshiri, Sina Campos, Jose Fraser, Gordon McMinn, Phil Univ Sheffield Dept Comp Sci Sheffield S Yorkshire England
Developers write unit tests together with program code, and then maintain these tests as the program evolves. Since writing good tests can be difficult and tedious, unit tests can also be generated automatically. Howe... 详细信息
来源: 评论
Translating Java for Resource Constrained Embedded Systems
Translating Java for Resource Constrained Embedded Systems
收藏 引用
7th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC)
作者: Plumbridge, Gary Audsley, Neil Univ York Dept Comp Sci York YO10 5DD N Yorkshire England
This paper discusses a strategy for translating the Java programming language to a form that is suitable for execution on resource limited embedded systems such as softcore processors in FPGAs, Network-on-Chip nodes a... 详细信息
来源: 评论
Power Consumption Analysis of Microprocessor Unit Based on Software Realization  20
Power Consumption Analysis of Microprocessor Unit Based on S...
收藏 引用
20th International Conference on System Controls and Computer Science 2015
作者: Mackowski, Michal Niezabitowski, Michal Silesian Tech Univ Fac Automat Control Elect & Comp Sci 16 Akad St PL-44101 Gliwice Poland
With the advent of portable and high density microelectronic devices, the minimization of power consumption in CMOS VLSI circuits is becoming a critical concern. An embedded system is a combination of electronic hardw... 详细信息
来源: 评论