Showing 101 - 120 results of 3,139 for search 'general code', query time: 0.11s Refine Results
  1. 101

    L’historien, le code et l’ordonnance by Hélène Fernandez

    Published 2012-08-01
    “…The Ordonnance was indeed immediately ridiculed by libels, to the point that it is now generally known under the derisive nickname “Code Michau”. …”
    Get full text
    Article
  2. 102
  3. 103

    Source Quantization and Coding over Noisy Channel Analysis by Runfeng Wang, Dan Song, Jinkai Ren, Lin Wang, Zhiping Xu

    Published 2024-11-01
    “…Recently, lossy source coding based on linear block code has been designed using the duality principle, i.e., the channel decoding algorithm is employed to realize the lossy source coding. …”
    Get full text
    Article
  4. 104

    Program semantic analysis model for code reuse detection by GUO Xi, WANG Pan

    Published 2024-12-01
    “…Program similarity analysis had a wide range of applications in areas such as code plagiarism and property protection, but it generally suffered from problems such as excessive computational overhead, a code similarity analysis method based on fuzzy matching and statistical inference was proposed. …”
    Get full text
    Article
  5. 105

    Automation of reversible steganographic coding with nonlinear discrete optimisation by Ching-Chun Chang

    Published 2022-12-01
    “…Another core element is reversible steganographic coding. Contemporary coding is based primarily on heuristics, which offers a shortcut towards sufficient, but not necessarily optimal, capacity–distortion performance. …”
    Get full text
    Article
  6. 106

    Analysing Quality Metrics and Automated Scoring of Code Reviews by Owen Sortwell, David Cutting, Christine McConnellogue

    Published 2024-11-01
    “…While it is generally agreed that code reviews are beneficial and result in higher-quality software, there has been little work investigating best practices and approaches, exploring which factors impact code review quality. …”
    Get full text
    Article
  7. 107
  8. 108
  9. 109

    An Alternative Approach to Future Diagnosis: Can Generalized Anxiety Disorder Be Distinguished From Major Depressive Disorder, Healthy People by Differentially Expressed lncRNAs in... by Kong L, Zhang L

    Published 2025-04-01
    “…It is also beneficial for personalized treatment of GAD.Keywords: long non-coding RNAs, differential diagnosis, peripheral blood mononuclear cell, biomarker, receiver operating characteristic…”
    Get full text
    Article
  10. 110
  11. 111

    Cross-code comparison of the edge codes SOLPS-ITER, SOLEDGE2D and UEDGE in modelling a high-power neon-seeded scenario in the DTT by M. Moscheni, M. Wigram, H. Wu, C. Meineri, C. Carati, E. De Marchi, M. Greenwald, P. Innocente, B. LaBombard, F. Subba, R. Zanino

    Published 2025-01-01
    “…This higher-power scenario is generally characterised by substantial disagreement between the three codes, up to 78%–178% in peak heat fluxes. …”
    Get full text
    Article
  12. 112
  13. 113
  14. 114
  15. 115

    Machine learning message-passing for the scalable decoding of QLDPC codes by Arshpreet Singh Maan, Alexandru Paler

    Published 2025-05-01
    “…Extrapolated Astra achieves better LER than BPOSD for BB codes. Astra(+OSD) achieves orders of magnitude lower logical error rates for BB codes compared to BP(+OSD).…”
    Get full text
    Article
  16. 116

    Research on malicious code variants detection based on texture fingerprint by Xiao-guang HAN, UWu Q, AOXuan-xia Y, UOChang-you G, Fang ZHOU

    Published 2014-08-01
    “…Afterwards, the index structure for fingerprint texture is built on the statistical analy-sis of general texture fingerprints of malicious code samples. …”
    Get full text
    Article
  17. 117

    Assessment of Prediction Capabilities of COCOSYS and CFX Code for Simplified Containment by Jia Zhu, Xiaohui Zhang, Xu Cheng

    Published 2016-01-01
    “…For this purpose, the actual capability of CFX tool and COCOSYS code is assessed in prototypical geometries for simplified physical process-plume (due to a heat source) under adiabatic and convection boundary condition, respectively. …”
    Get full text
    Article
  18. 118

    On the Construction of Self-Complementary Codes and their Application in the Problem of Information Hiding by Yury V. Kosolapov, Fedor S. Pevnev, Margarita V. Yagubyants

    Published 2022-09-01
    “…The development of an efficient method for obtaining a lower estimate close to d(k, n) is an urgent task, since finding the values of d(k, n) in the general case is a difficult task. The paper proposes four methods for finding lower bounds: based on cyclic codes, based on residual codes, based on the (u-u+v)-construction, and based on the tensor product of codes. …”
    Get full text
    Article
  19. 119

    Prevalence of transcription promoters within archaeal operons and coding sequences by Tie Koide, David J Reiss, J Christopher Bare, Wyming Lee Pang, Marc T Facciotti, Amy K Schmid, Min Pan, Bruz Marzolf, Phu T Van, Fang‐Yin Lo, Abhishek Pratap, Eric W Deutsch, Amelia Peterson, Dan Martin, Nitin S Baliga

    Published 2009-06-01
    “…Using experimental validation, we illustrate the prevalence of overlapping genomic signals in archaeal transcription, casting doubt on the general perception of rigid boundaries between coding sequences and regulatory elements.…”
    Get full text
    Article
  20. 120

    Mapping of UK Biobank clinical codes: Challenges and possible solutions. by Oleg Stroganov, Alena Fedarovich, Emily Wong, Yulia Skovpen, Elena Pakhomova, Ivan Grishagin, Dzmitry Fedarovich, Tania Khasanova, David Merberg, Sándor Szalma, Julie Bryant

    Published 2022-01-01
    “…We also report challenges identified in mapping Read codes from UK Biobank GP tables to ICD and SNOMED CT.…”
    Get full text
    Article