Suchergebnisse - "binary code"
-
1
Autoren:
Quelle: International Journal on Software Tools for Technology Transfer. 25(2):167-184
Dateibeschreibung: electronic
-
2
Autoren: Yakimovich Alexander K.
Quelle: Художественная культура, Iss 3, Pp 70-89 (2025)
Schlagwörter: contemporary artists, сontent analysis, binary code of civilization, ‘humane writing’, Arts in general, NX1-820
Dateibeschreibung: electronic resource
-
3
Autoren:
Quelle: Advances in Mathematics of Communications. 19:1260-1276
Schlagwörter: BCH bound, cyclic code, linear code, Cyclic codes, binary code, Linear codes (general theory)
Dateibeschreibung: application/xml
-
4
Autoren:
Quelle: Algorithmica, 86 (9), 3054–3078
Schlagwörter: Computational Geometry (cs.CG), FOS: Computer and information sciences, Discrete Mathematics (cs.DM), 0211 other engineering and technologies, Minimum spanning tree, 0102 computer and information sciences, 02 engineering and technology, minimum spanning tree, binary code, 01 natural sciences, Traveling salesman problem, Binary code, FOS: Mathematics, Mathematics - Combinatorics, ddc:510, traveling salesman problem, Graph theory, Relaxed triangle inequality, relaxed triangle inequality, Computer Science - Computational Geometry, Combinatorics (math.CO), Algorithms in computer science, Mathematics, Computer Science - Discrete Mathematics
Dateibeschreibung: application/xml; application/pdf
-
5
Autoren: WEI Youyuan, SONG Jianhua, ZHANG Yan
Quelle: Jisuanji kexue, Vol 52, Iss 6, Pp 365-380 (2025)
Schlagwörter: binary code similarity detection, code representation, software security, malicious code identification, vulnerability search, Computer software, QA76.75-76.765, Technology (General), T1-995
Dateibeschreibung: electronic resource
-
6
Autoren: et al.
Weitere Verfasser: et al.
Quelle: https://hal.science/hal-04914773 ; 2026.
Schlagwörter: Black-box Adversarial Attack, Targeted Adversarial Attack, Query- free Adversarial Attack, Supply-Chain Attack, Function Binary Code Similarity, Reverse-Engineering, Machine Learning, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG]
-
7
Autoren:
Quelle: Discrete Mathematics. 349:114727
Schlagwörter: automorphism, finite abelian group, poset, automorphism orbit, Ordered sets, group action, Theory of error-correcting codes and error-detecting codes, Enumerative combinatorics, binary code, lattice
Dateibeschreibung: application/xml
-
8
Autoren: et al.
Quelle: IEEE Access, Vol 12, Pp 161247-161269 (2024)
Schlagwörter: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, binary code models, Adversarial attacks, binary similarity, TK1-9971, Machine Learning (cs.LG), greedy, Electrical engineering. Electronics. Nuclear engineering, binary analysis, black-box attacks, Cryptography and Security (cs.CR), Adversarial Attacks, Binary Analysis, Binary Code Models, Binary Similarity, Black-box Attacks, Greedy, White-box Attacks
Dateibeschreibung: application/pdf
-
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Proceedings of the 23rd International Conference on Software Engineering and Formal Methods ; 23rd International Conference on Software Engineering and Formal Methods ; https://hal.science/hal-05288783 ; 23rd International Conference on Software Engineering and Formal Methods, Nov 2025, Tolède, Spain
Schlagwörter: Binary Code Analysis, Finite Automata, Pushdown System with an Upper Stack, Reachability analysis, Reachability analysis Pushdown System with an Upper Stack Finite Automata Binary Code Analysis, [INFO]Computer Science [cs]
-
10
Autoren: et al.
Quelle: ACM Transactions on Software Engineering and Methodology. 33:1-31
-
11
Autoren:
Weitere Verfasser:
Quelle: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. :808-820
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, [INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE], 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, 02 engineering and technology, clone search, Cryptography and Security (cs.CR), spectral analysis, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: http://arxiv.org/abs/2210.13063
-
12
Autoren: et al.
Weitere Verfasser: et al.
Quelle: IEEE Transactions on Information Theory. 70:950-963
Schlagwörter: FOS: Computer and information sciences, Finite Field, Computer Science - Information Theory, Construction Method, Convolutional codes, 0102 computer and information sciences, 02 engineering and technology, Library and Information Sciences, 1710 Information Systems, Self, Coding Properties, Diagonal Matrix, 01 natural sciences, dual Codes, 510 Mathematics, Construction of Codes Codes, 1706 Computer Science Applications, 0202 electrical engineering, electronic engineering, information engineering, Submodule, Mathematics Convolutional Codes, Hermite Polynomials, Previous Lemma, Vector Space, Hamming Weight, Immediate Consequence, Polynomial Ring, Information Theory (cs.IT), Matrix Inequalities, Generator Matrix, Information Systems Convolutional Codes, Binary Code, Bilinear Form, Hamming weight, Computer Science Applications, Generators, Block codes, Binary Vector, Codecs, Coding Matrix, Parity, 10123 Institute of Mathematics, check Matrix, Classification of Codes, Code Construction, Monic Polynomial, Code Blocks, 3309 Library and Information Sciences, Linear Code, Dual Coding
Dateibeschreibung: 2208.04087.pdf - application/pdf; Self_Dual_Convolutional_Codes.pdf - application/pdf
-
13
Autoren:
Quelle: AIMS Mathematics, Vol 9, Iss 10, Pp 29333-29345 (2024)
Schlagwörter: generator matrix, quadric, dimension, conic, QA1-939, binary code, Mathematics
-
14
Autoren:
Quelle: Advances in Mathematics of Communications. 18:549-566
Schlagwörter: FOS: Computer and information sciences, maximum size, linear binary code, Computer Science - Information Theory, Information Theory (cs.IT), codes bound, Sidon set, sum-free set, Additive bases, including sumsets, Bounds on codes, FOS: Mathematics, 11B13, 94B05, 94B65, Mathematics - Combinatorics, Combinatorics (math.CO), Linear codes (general theory)
Dateibeschreibung: application/xml
-
15
Autoren: et al.
Quelle: Applied Sciences, Vol 15, Iss 18, p 10093 (2025)
Schlagwörter: IoT firmware, vulnerability detection, binary code similarity detection, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Dateibeschreibung: electronic resource
-
16
Quelle: Математичне моделювання; № 2(51) (2024); 41-49
Schlagwörter: фітнес-функція, n-dimensional hypercube, Diophantine equation, стохастичний оператор, binary code, код Грея, involutive operator, інволютивний оператор, stochastic operator, fitness function, n-вимірний гіперкуб, бінарний код, діофантове рівняння, Gray code
Dateibeschreibung: application/pdf
Zugangs-URL: http://matmod.dstu.dp.ua/article/view/317496
-
17
Autoren: et al.
Quelle: Kressel, J A, Callaghan, G, Gorgovan, C & Luján, M 2023, Evaluating the Impact of Optimizations for Dynamic Binary Modification on 64-bit RISC-V. in 2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). Proceedings-2023 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2023, IEEE, pp. 81-91. https://doi.org/10.1109/ISPASS57527.2023.00017
Schlagwörter: RISC-V, Dynamic Binary Instrumentation, Binary Code Profiling, Dynamic Binary Modification
Dateibeschreibung: application/pdf
Zugangs-URL: http://www.scopus.com/inward/record.url?scp=85164539620&partnerID=8YFLogxK
https://pure.manchester.ac.uk/ws/files/257071084/MAMBO_RISCV_ISPASS2023_PREPRINT.pdf
https://doi.org/10.1109/ISPASS57527.2023.00017
https://www.mendeley.com/catalogue/71ca2df4-a724-3e7e-8950-400329d94dbd/
https://research.manchester.ac.uk/en/publications/3f71f4aa-6628-440d-93ad-672da2d452d5 -
18
Autoren: et al.
Quelle: IEEE Access, Vol 11, Pp 29183-29198 (2023)
-
19
Autoren: et al.
Quelle: Applied Sciences, Vol 15, Iss 17, p 9458 (2025)
Schlagwörter: semantic context, graph attention, structural context, binary code similarity analysis, cross-architecture detection, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Dateibeschreibung: electronic resource
-
20
Autoren:
Quelle: Murmurations, Vol 8, Iss 1 (2025)
Schlagwörter: binary code, poetic expression, embracing complexity, systems thinking, Therapeutics. Psychotherapy, RC475-489
Dateibeschreibung: electronic resource
Full Text Finder
Nájsť tento článok vo Web of Science