Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
- Fault location (Engineering) 1
-
61
Constructing meaningful code changes via graph transformer
Published 2023-04-01“…Abstract The rapid development of Open‐Source Software (OSS) has resulted in a significant demand for code changes to maintain OSS. Symptoms of poor design and implementation choices in code changes often occur, thus heavily hindering code reviewers to verify correctness and soundness of code changes. …”
Get full text
Article -
62
Reliable Quantum Communications Based on Asymmetry in Distillation and Coding
Published 2024-01-01“…It is shown that, in the proposed framework, the distillation protocol gives rise to asymmetries that can be exploited by asymmetric quantum error correcting code, which sets the basis for unique hybrid distillation and coding design. …”
Get full text
Article -
63
Russian translation of the International code of nomenclature for cultivated Plants
Published 2022-10-01“…The first edition of the Code was published in 1953. Currently, the ninth edition of the International Code of Nomenclature for Cultivated Plants is relevant (International Code…, 2016).The first translation of the Code into Russian was made on behalf of the All-Union Botanical Society by Professor Ya.I. …”
Get full text
Article -
64
Program semantic analysis model for code reuse detection
Published 2024-12-01“…Program similarity analysis had a wide range of applications in areas such as code plagiarism and property protection, but it generally suffered from problems such as excessive computational overhead, a code similarity analysis method based on fuzzy matching and statistical inference was proposed. …”
Get full text
Article -
65
Stable coding of aversive associations in medial prefrontal populations
Published 2023-12-01Subjects: Get full text
Article -
66
Multiantenna Analog Network Coding for Multihop Wireless Networks
Published 2010-01-01“…The proposed protocol extends upon the so-called analog network coding schemes in the literature in that it inherently exploits the multiple antennas at the relay station to reduce the noise enhancement typical of an AF protocol, and can also compensate for link imbalances between the relay and the sources and is agnostic to sources' modulation and coding schemes. …”
Get full text
Article -
67
-
68
A NOVEL APPROACH FOR SHIPPING CONTAINER CODE RECOGNITION
Published 2017-06-01“…This paper proposes a novel model for code recognition which can be applied for shipping containers widely used in logistics. …”
Get full text
Article -
69
New Bounds on 2-Frameproof Codes of Length 4
Published 2020-01-01“…Frameproof codes were first introduced by Boneh and Shaw in 1998 in the context of digital fingerprinting to protect copyrighted materials. …”
Get full text
Article -
70
Spatial Multiple Description Coding for Scalable Video Streams
Published 2014-01-01“…The need for adapting video stream delivery over heterogeneous and unreliable networks requires self-adaptive and error resilient coding. Network bandwidth fluctuations can be handled by means of a video coding scheme which adapts to the channel conditions. …”
Get full text
Article -
71
Neuromorphic Vision Data Coding: Classifying and Reviewing the Literature
Published 2025-01-01Subjects: “…neuromorphic vision data coding…”
Get full text
Article -
72
Les codes graphiques contemporains de l’occitan
Published 2019-12-01“…In this strong cultural context, the question of the graphic code took on a particular relief while referring for some of its features to the situation of Occitan in general.…”
Get full text
Article -
73
KING'S ENGLISH AND THE ARISTOCRATIC CODE OF COMMUNICATION IN MODERN BRITAIN
Published 2014-06-01Subjects: Get full text
Article -
74
Context-Aware and Locality-Constrained Coding for Image Categorization
Published 2014-01-01“…Improving the coding strategy for BOF (Bag-of-Features) based feature design has drawn increasing attention in recent image categorization works. …”
Get full text
Article -
75
Temporal Coding of Periodicity Pitch in the Auditory System: An Overview
Published 1999-01-01“…Neural pulse codes can be divided into channel-based codes, temporal-pattern codes, and time-of-arrival codes. …”
Get full text
Article -
76
Code development for the computational analysis of crack propagation in structures
Published 2020-07-01“…In this study, the main objective was the creation of a code, which gives the capability to a Finite Element Analysis Program with no built-in crack study tools, to study the propagation of a crack, in a cracked surface. …”
Get full text
Article -
77
The Significance of the 2014 Corporate Governance Code of the Bank of Russia
Published 2014-08-01Subjects: Get full text
Article -
78
More on Codes Over Finite Quotients of Polynomial Rings
Published 2025-01-01“…We complete the classification for the special case <inline-formula> <tex-math notation="LaTeX">$l=2$ </tex-math></inline-formula> and enumerate all the <inline-formula> <tex-math notation="LaTeX">$\mathbb {A}$ </tex-math></inline-formula>-codes of length 2. As an example, we list all binary index-2 quasi-cyclic codes of lengths 16 and 32, and all ternary index-2 quasi-cyclic codes of lengths 6 and 18, which are best-known codes.…”
Get full text
Article -
79
An architecture as a code framework to manage documentation of IT projects
Published 2025-01-01“…Design/methodology/approach – They provide a simple tool based on five complementary views, which should be detailed by the project team using a classic source code management platform. Findings – The proposed tool is open source and may be reused by any IT team in various project contexts and heterogeneous development methods. …”
Get full text
Article -
80
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article