咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 57 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32 篇 工学
    • 32 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 26 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 安全科学与工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 12 篇 java
  • 11 篇 software
  • 9 篇 semantics
  • 9 篇 abstracts
  • 8 篇 measurement
  • 7 篇 cloning
  • 7 篇 algorithm design...
  • 7 篇 software mainten...
  • 6 篇 educational inst...
  • 6 篇 java programming...
  • 6 篇 encoding
  • 5 篇 software systems
  • 5 篇 libraries
  • 5 篇 history
  • 5 篇 static analysis
  • 5 篇 syntactics
  • 5 篇 context
  • 5 篇 concrete
  • 5 篇 testing
  • 5 篇 open source soft...

机构

  • 3 篇 univ saskatchewa...
  • 3 篇 vrije univ bruss...
  • 2 篇 univ notre dame ...
  • 2 篇 university of ut...
  • 2 篇 department of co...
  • 2 篇 univ utah salt l...
  • 1 篇 osaka daigaku su...
  • 1 篇 department of so...
  • 1 篇 blavatnik school...
  • 1 篇 swat-mcis poly t...
  • 1 篇 cert/sei
  • 1 篇 software behavio...
  • 1 篇 univ nacl colomb...
  • 1 篇 federal universi...
  • 1 篇 def res & dev ca...
  • 1 篇 univ manouba han...
  • 1 篇 sri internationa...
  • 1 篇 ecole polytech m...
  • 1 篇 software languag...
  • 1 篇 univ arizona dep...

作者

  • 3 篇 roy chanchal k.
  • 3 篇 de roover coen
  • 2 篇 liang shuying
  • 2 篇 might matthew
  • 2 篇 chanchal k. roy
  • 2 篇 inoue katsuro
  • 2 篇 haipeng cai
  • 2 篇 sun weibin
  • 2 篇 santelices raul
  • 2 篇 gyimothy tibor
  • 2 篇 raul santelices
  • 2 篇 matthew might
  • 2 篇 coen de roover
  • 2 篇 jiang siyuan
  • 2 篇 siyuan jiang
  • 2 篇 tibor gyimóthy
  • 2 篇 shuying liang
  • 2 篇 cai haipeng
  • 2 篇 weibin sun
  • 1 篇 sumukhi chandras...

语言

  • 57 篇 英文
检索条件"任意字段=14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014"
57 条 记 录,以下是1-10 订阅
排序:
Proceedings - 2014 14th ieee international working conference on source code analysis and manipulation, scam 2014
Proceedings - 2014 14th IEEE International Working Conferenc...
收藏 引用
14th ieee international working conference on source code analysis and manipulation, scam 2014
the proceedings contain 35 papers. the topics discussed include: effect of clone information on the performance of developers fixing cloned bugs;a comparative study of bug patterns in java cloned and non-cloned code;a...
来源: 评论
sourceMeter SonarQube plug-in  14
SourceMeter SonarQube plug-in
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Ferenc, Rudolf Lango, Laszlo Siket, Istvan Gyimothy, Tibor Bakota, Tibor Univ Szeged Dept Software Engn H-6720 Szeged Hungary FrontEndART Software Ltd H-6722 Szeged Hungary
the sourceMeter SonarQube plug-in is an extension of SonarQube, an open-source platform for managing code quality made by Sonarsource S.A, Switzerland. the plug-in extends the built-in Java code analysis engine of Son... 详细信息
来源: 评论
On the Use of Context in Recommending Exception Handling code Examples  14
On the Use of Context in Recommending Exception Handling Cod...
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Rahman, Mohammad Masudur Roy, Chanchal K. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 0W0 Canada
Studies show that software developers often either misuse exception handling features or use them inefficiently, and such a practice may lead an undergoing software project to a fragile, insecure and non-robust applic... 详细信息
来源: 评论
Scalable Security Verification of Software at Compile Time  14
Scalable Security Verification of Software at Compile Time
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Tlili, Syrine Fernandez, Jose M. Belghith, Abdelfettah Dridi, Bilel Hidouri, Soufien Univ Manouba Hana Res Lab Tunis Tunisia Ecole Polytech Montreal PQ H3C 3A7 Canada Univ Carthage Tunis Tunisia
Automated verification tools are required to detect coding errors that may lead to severe software vulnerabilities. However, the usage of these tools is still not well integrated into software development life cycle. ... 详细信息
来源: 评论
Bit-Level Taint analysis  14
Bit-Level Taint Analysis
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Yadegari, Babak Debray, Saumya Univ Arizona Dept Comp Sci Tucson AZ 85721 USA
Taint analysis has a wide variety of applications in software analysis, making the precision of taint analysis an important consideration. Current taint analysis algorithms, including previous work on bit-precise tain... 详细信息
来源: 评论
SENSA: Sensitivity analysis for Quantitative Change-impact Prediction  14
SENSA: Sensitivity Analysis for Quantitative Change-impact P...
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Cai, Haipeng Jiang, Siyuan Santelices, Raul Zhang, Ying-jie Zhang, Yiji Univ Notre Dame Notre Dame IN 46556 USA Tsinghua Univ Beijing 100084 Peoples R China
Sensitivity analysis determines how a system responds to stimuli variations, which can benefit important software-engineering tasks such as change-impact analysis. We present SENSA, a novel dynamic-analysis technique ... 详细信息
来源: 评论
Toolset and Program Repository for code Coverage-Based Test Suite analysis and manipulation  14
Toolset and Program Repository for Code Coverage-Based Test ...
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Tengeri, David Beszedes, Arpad Havas, David Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary
code coverage is often used in academic and industrial practice of white-box software testing. Various test optimization methods, e.g. test selection and prioritization, rely on code coverage information, but other re... 详细信息
来源: 评论
Pruning, Pushdown Exception-Flow analysis  14
Pruning, Pushdown Exception-Flow Analysis
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Liang, Shuying Sun, Weibin Might, Matthew Keep, Andy Van Horn, David Univ Utah Salt Lake City UT 84112 USA Univ Maryland College Pk MD 20742 USA
Statically reasoning in the presence of exceptions and about the effects of exceptions is challenging: exception-flows are mutually determined by traditional control-flow and points-to analyses. We tackle the challeng... 详细信息
来源: 评论
Studying Fine-Grained Co-Evolution Patterns of Production and Test code  14
Studying Fine-Grained Co-Evolution Patterns of Production an...
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Marsavina, Cosmin Romano, Daniele Zaidman, Andy Delft Univ Technol NL-2600 AA Delft Netherlands
Numerous software development practices suggest updating the test code whenever the production code is changed. However, previous studies have shown that co-evolving test and production code is generally a difficult t... 详细信息
来源: 评论
Fast Flow analysis with Godel Hashes  14
Fast Flow Analysis with Godel Hashes
收藏 引用
14th ieee international working conference on source code analysis and manipulation (scam)
作者: Liang, Shuying Sun, Weibin Might, Matthew Univ Utah Salt Lake City UT 84112 USA
Flow analysis, such as control-flow, data-flow, and exception-flow analysis, usually depends on relational operations on flow sets. Unfortunately, set related operations, such as inclusion and equality, are usually ve... 详细信息
来源: 评论