咨询与建议

限定检索结果

文献类型

  • 130 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 84 篇 软件工程
    • 58 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 信息与通信工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 12 篇 理学
    • 8 篇 数学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 生物学
    • 1 篇 系统科学
  • 6 篇 管理学
    • 4 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 11 篇 open source soft...
  • 10 篇 static analysis
  • 8 篇 visualization
  • 7 篇 tools
  • 7 篇 java
  • 6 篇 computer science
  • 6 篇 conferences
  • 6 篇 data mining
  • 6 篇 software
  • 5 篇 xml
  • 5 篇 algorithm design...
  • 5 篇 testing
  • 5 篇 data visualizati...
  • 5 篇 source coding
  • 4 篇 software systems
  • 4 篇 libraries
  • 4 篇 software enginee...
  • 4 篇 computer languag...
  • 4 篇 cloning
  • 4 篇 computer program...

机构

  • 3 篇 free univ amster...
  • 3 篇 queens univ sch ...
  • 2 篇 loyola college b...
  • 2 篇 univ london impe...
  • 2 篇 victoria univ we...
  • 2 篇 loyola coll balt...
  • 2 篇 univ glasgow sch...
  • 2 篇 univ tecn lisboa...
  • 2 篇 brunel univ uxbr...
  • 2 篇 brunel universit...
  • 2 篇 software improve...
  • 2 篇 université du qu...
  • 2 篇 telsey telecommu...
  • 2 篇 concordia univ d...
  • 2 篇 univ sannio res ...
  • 2 篇 vrije universite...
  • 2 篇 kyoto univ disas...
  • 1 篇 ltci telecom par...
  • 1 篇 indian inst tech...
  • 1 篇 dept. of softwar...

作者

  • 6 篇 harman mark
  • 4 篇 harman m
  • 3 篇 masone g
  • 3 篇 hu l
  • 3 篇 di penta m
  • 3 篇 antoniol g
  • 3 篇 pearce dj
  • 3 篇 hankin c
  • 3 篇 verhoef c
  • 3 篇 villano u
  • 3 篇 kelly phj
  • 2 篇 richárd szalay
  • 2 篇 zoltán porkoláb
  • 2 篇 zhang xy
  • 2 篇 dean tr
  • 2 篇 rilling juergen
  • 2 篇 takemi tetsuya
  • 2 篇 cordy james r.
  • 2 篇 rilling j
  • 2 篇 hierons robert m...

语言

  • 138 篇 英文
检索条件"任意字段=3rd IEEE International Workshop on Source Code Analysis and Manipulation"
138 条 记 录,以下是41-50 订阅
排序:
Proceedings of Correctness 2019: 3rd international workshop on Software Correctness for HPC Applications - Held in conjunction with SC 2019: The international Conference for High Performance Computing, Networking, Storage and analysis
Proceedings of Correctness 2019: 3rd International Workshop ...
收藏 引用
3rd ieee/ACM international workshop on Software Correctness for HPC Applications, Correctness 2019
The proceedings contain 6 papers. The topics discussed include: debugging and optimization of HPC programs with the verrou tool;exploring regression of data race detection tools using dataracebench;toward multi-precis...
来源: 评论
An interprocedural amorphous slicer for WSL  2
An interprocedural amorphous slicer for WSL
收藏 引用
2nd ieee international workshop on source code analysis and manipulation
作者: Harman, M Hu, L Munro, M Zhang, XY Danicic, S Daoudi, M Ouarbya, L Brunel Univ Uxbridge UB8 3PH Middx England
This paper presents a simple interprocedural algorithm for amorphous slicing and illustrates the way in which interprocedural amorphous slicing improves upon interprocedural syntax-preserving slicing. The paper also p... 详细信息
来源: 评论
AVal: an extensible Attribute-Oriented Programming validator for Java
AVal: an extensible Attribute-Oriented Programming validator...
收藏 引用
6th ieee international workshop on source code analysis and manipulation
作者: Noguera, Carlos Pawlak, Renaud INRIA Futurs Jacquard Project LIFL UMR 8022CNRSEquipe GOAL Batiment M3 F-59655 Villeneuve Dascq France
Attribute Oriented Programming (@OP) permits programmers to extend the semantics of a base program by annotating it with attributes that are related to a set of concerns. Examples of this are applications that rely on... 详细信息
来源: 评论
Detecting cache-timing vulnerabilities in post-quantum cryptography algorithms  3
Detecting cache-timing vulnerabilities in post-quantum crypt...
收藏 引用
3rd ieee international Verification and Security workshop (IVSW)
作者: Facon, Adrien Guilley, Sylvain Lec'Hvien, Matthieu Schaub, Alexander Souissi, Youssef Telecom ParisTech LTCI F-75013 Paris France Ecole Normale Super Dept Informat F-75005 Paris France Secure IC SAS F-35510 Cesson Sevigne France
When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as cache-timing attacks. Designing protected implementations must be done with knowledge an... 详细信息
来源: 评论
JMangler - A framework for load-time transformation of Java class files  1
JMangler - A framework for load-time transformation of Java ...
收藏 引用
1st ieee international workshop on source code analysis and manipulation
作者: Kniesel, G Costanza, P Austermann, M Univ Bonn Inst Comp Sci 3 D-53117 Bonn Germany
Current proposals for load-time transformation of Java classes are either dependent on the use of a specific class loader or dependent on a specific JVM implementation. This is not due to an inadequacy of the Java pla... 详细信息
来源: 评论
A hybrid program slicing framework  1
A hybrid program slicing framework
收藏 引用
1st ieee international workshop on source code analysis and manipulation
作者: Rilling, J Karanth, B Concordia Univ Dept Comp Sci Montreal PQ H3G 1M8 Canada
Program Slicing is a decomposition technique that transforms a large program into a smaller one that contains only statements relevant to the computation of a selected junction. Applications of program slicing can be ... 详细信息
来源: 评论
Stop-list slicing
Stop-list slicing
收藏 引用
6th ieee international workshop on source code analysis and manipulation
作者: Gallagher, Keith Binkley, David Harman, Mark Univ Durham South Rd Durham DH1 3LE England Loyola Coll Baltimore MD 21210 USA Kings Coll London London WC2R 2LS England
Traditional program slicing requires two Parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the slicing criterion: those variables th... 详细信息
来源: 评论
A Machine Learning Based Automatic Folding of Dynamically Typed Languages  3
A Machine Learning Based Automatic Folding of Dynamically Ty...
收藏 引用
3rd ACM SIGSOFT international workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE)
作者: Viuginov, Nickolay Filchenkov, Andrey ITMO Univ Fac Informat Technol & Programming St Petersburg Russia JetBrains St Petersburg Russia
The popularity of dynamically typed languages has been growing strongly lately. Elegant syntax of such languages like javascript, python, PHP and ruby pays back when it comes to finding bugs in large codebases. The an... 详细信息
来源: 评论
Predicate-based dynamic slicing of message passing programs  2
Predicate-based dynamic slicing of message passing programs
收藏 引用
2nd ieee international workshop on source code analysis and manipulation
作者: Rilling, J Li, HF Goswami, D Concordia Univ Dept Comp Sci Montreal PQ H3G 1M8 Canada
Program Slicing is a well-known decomposition technique that transforms a large program into a smaller one that contains only statements relevant to the computation of a selected function. In this paper, we present a ... 详细信息
来源: 评论
An empirical study of the evolution of PHP web application security
An empirical study of the evolution of PHP web application s...
收藏 引用
2011 3rd international workshop on Security Measurements and Metrics, Metrisec 2011
作者: Doyle, Maureen Walden, James Department of Computer Science Northern Kentucky University Highland Heights KY 41099 United States
Web applications are increasingly subject to mass attacks, with vulnerabilities found easily in both open source and commercial applications as evinced by the fact that approximately half of reported vulnerabilities a... 详细信息
来源: 评论