咨询与建议

限定检索结果

文献类型

  • 130 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 84 篇 软件工程
    • 58 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 信息与通信工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 12 篇 理学
    • 8 篇 数学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 生物学
    • 1 篇 系统科学
  • 6 篇 管理学
    • 4 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 11 篇 open source soft...
  • 10 篇 static analysis
  • 8 篇 visualization
  • 7 篇 tools
  • 7 篇 java
  • 6 篇 computer science
  • 6 篇 conferences
  • 6 篇 data mining
  • 6 篇 software
  • 5 篇 xml
  • 5 篇 algorithm design...
  • 5 篇 testing
  • 5 篇 data visualizati...
  • 5 篇 source coding
  • 4 篇 software systems
  • 4 篇 libraries
  • 4 篇 software enginee...
  • 4 篇 computer languag...
  • 4 篇 cloning
  • 4 篇 computer program...

机构

  • 3 篇 free univ amster...
  • 3 篇 queens univ sch ...
  • 2 篇 loyola college b...
  • 2 篇 univ london impe...
  • 2 篇 victoria univ we...
  • 2 篇 loyola coll balt...
  • 2 篇 univ glasgow sch...
  • 2 篇 univ tecn lisboa...
  • 2 篇 brunel univ uxbr...
  • 2 篇 brunel universit...
  • 2 篇 software improve...
  • 2 篇 université du qu...
  • 2 篇 telsey telecommu...
  • 2 篇 concordia univ d...
  • 2 篇 univ sannio res ...
  • 2 篇 vrije universite...
  • 2 篇 kyoto univ disas...
  • 1 篇 ltci telecom par...
  • 1 篇 indian inst tech...
  • 1 篇 dept. of softwar...

作者

  • 6 篇 harman mark
  • 4 篇 harman m
  • 3 篇 masone g
  • 3 篇 hu l
  • 3 篇 di penta m
  • 3 篇 antoniol g
  • 3 篇 pearce dj
  • 3 篇 hankin c
  • 3 篇 verhoef c
  • 3 篇 villano u
  • 3 篇 kelly phj
  • 2 篇 richárd szalay
  • 2 篇 zoltán porkoláb
  • 2 篇 zhang xy
  • 2 篇 dean tr
  • 2 篇 rilling juergen
  • 2 篇 takemi tetsuya
  • 2 篇 cordy james r.
  • 2 篇 rilling j
  • 2 篇 hierons robert m...

语言

  • 138 篇 英文
检索条件"任意字段=3rd IEEE International Workshop on Source Code Analysis and Manipulation"
138 条 记 录,以下是1-10 订阅
排序:
Proceedings - 3rd ieee international workshop on source code analysis and manipulation, SCAM 2003
Proceedings - 3rd IEEE International Workshop on Source Code...
收藏 引用
3rd ieee international workshop on source code analysis and manipulation, SCAM 2003
The proceedings contain 21 papers. The topics discussed include: online cycle detection and difference propagation for pointer analysis;improving the static analysis of loops by dynamic partitioning techniques;applyin... 详细信息
来源: 评论
Detection of redundant code using R2D2  3
Detection of redundant code using R<SUP>2</SUP>D<SUP>2</SUP>
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Leitao, AM Univ Tecn Lisboa INESC ID P-1000029 Lisbon Portugal
We present the (rd2)-D-2 redundancy detector. (rd2)-D-2 identifies redundant code fragments in large software systems written in Lisp. For each pair of code fragments, (rd2)-D-2 uses a combination of techniques rangin... 详细信息
来源: 评论
Barrier slicing and chopping  3
Barrier slicing and chopping
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Krinke, J Univ Passau D-8390 Passau Germany
One of the critiques on program slicing is that slices presented to the user are hard to understand. This is partly due to bad user interfaces, but mainly related to the problem that slicing &#39;dumps&#39; the result... 详细信息
来源: 评论
Managing multi-billion dollar IT budgets using source code analysis  3
Managing multi-billion dollar IT budgets using source code a...
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Verhoef, C Free Univ Amsterdam Dept Comp Sci Amsterdam Netherlands
We present a quantitative approach for IT portfolio management. This is an approach that CMM level I organizations can use to obtain a corporate wide impression of the state of their total IT portfolio, how IT costs s... 详细信息
来源: 评论
Online cycle detection and difference propagation for pointer analysis  3
Online cycle detection and difference propagation for pointe...
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Pearce, DJ Kelly, PHJ Hankin, C Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2BZ England
This paper presents and evaluates a number of techniques to improve the execution time of interprocedural pointer analysis in the context of large C programs. The analysis is formulated as a graph of set constraints a... 详细信息
来源: 评论
Static slicing of reactive programs  3
Static slicing of reactive programs
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Kulkarni, AR Ramesh, S Indian Inst Technol KR Sch Informat Technol Bombay 400076 Maharashtra India
This paper extends the well-known technique of program slicing to synchronous reactive programs like Esterel. Reactive programs are event-oriented and maintain continuous interaction with the environment. The traditio... 详细信息
来源: 评论
Unique renaming of Java using source transformation  3
Unique renaming of Java using source transformation
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Guo, XP Cordy, JR Dean, TR Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
This paper presents a method for unique renaming declarations and references in Java programs using source transformation to XML markup. Each entity declaration and reference in the Java program is assigned a globally... 详细信息
来源: 评论
Detection of redundant code using R2D2
收藏 引用
SOFTWARE QUALITY JOURNAL 2004年 第4期12卷 361-382页
作者: Leitao, AM Univ Tecn Lisboa INESC ID P-1000029 Lisbon Portugal
We present the (rd2)-D-2 redundancy detector. (rd2)-D-2 identifies redundant code fragments in large software systems written in Lisp. For each pair of code fragments, (rd2)-D-2 uses a combination of techniques rangin...
来源: 评论
XOgastan: XML-oriented gcc AST analysis and transformations  3
XOgastan: XML-oriented gcc AST analysis and transformations
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Antoniol, G Di Penta, M Masone, G Villano, U Univ Sannio Dept Engn RCOST I-82100 Benevento Italy
Software maintenance, program analysis and transformation tools almost always rely on static source code analysis as the first and fundamental step to gather information. In the past, two different strategies have bee... 详细信息
来源: 评论
Improving the static analysis of loops by dynamic partitioning techniques  3
Improving the static analysis of loops by dynamic partitioni...
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Martel, M CEA LIST DTSI SLA F-91191 Gif Sur Yvette France
Many static analyses aim at assigning to each control point of a program an invariant property that characterizes any state of a trace corresponding to this point. The choice of the set of control points determines th... 详细信息
来源: 评论