咨询与建议

限定检索结果

文献类型

  • 1,220 篇 会议
  • 40 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,261 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 724 篇 工学
    • 634 篇 软件工程
    • 477 篇 计算机科学与技术...
    • 137 篇 电气工程
    • 22 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 12 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 仪器科学与技术
    • 5 篇 机械工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
    • 2 篇 核科学与技术
    • 2 篇 生物医学工程(可授...
  • 63 篇 理学
    • 31 篇 数学
    • 13 篇 生物学
    • 12 篇 物理学
    • 8 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 化学
  • 47 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 2 篇 特种医学
  • 6 篇 法学
    • 5 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 1 篇 艺术学

主题

  • 152 篇 java
  • 127 篇 software
  • 124 篇 static analysis
  • 87 篇 software systems
  • 80 篇 open source soft...
  • 78 篇 source coding
  • 69 篇 visualization
  • 67 篇 codes
  • 67 篇 software mainten...
  • 64 篇 conferences
  • 63 篇 algorithm design...
  • 59 篇 tools
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 52 篇 performance anal...
  • 50 篇 task analysis
  • 50 篇 data mining
  • 50 篇 testing
  • 48 篇 information anal...
  • 47 篇 measurement

机构

  • 11 篇 vrije univ bruss...
  • 9 篇 delft university...
  • 8 篇 department of so...
  • 8 篇 univ szeged dept...
  • 6 篇 fraunhofer iem p...
  • 6 篇 queens univ sch ...
  • 6 篇 kent state univ ...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 delft univ techn...
  • 5 篇 queens univ sch ...
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 software improve...
  • 5 篇 vrije universite...
  • 4 篇 ohio state univ ...
  • 4 篇 ucl england
  • 4 篇 delft university...
  • 4 篇 vrije univ bruss...

作者

  • 16 篇 de roover coen
  • 14 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 10 篇 binkley david
  • 9 篇 jonathan i. male...
  • 8 篇 ferenc rudolf
  • 8 篇 michael l. colla...
  • 7 篇 moonen leon
  • 7 篇 mark harman
  • 7 篇 krinke jens
  • 6 篇 di penta m
  • 6 篇 chanchal k. roy
  • 6 篇 david binkley
  • 6 篇 antoniol g
  • 6 篇 árpád beszédes
  • 6 篇 bodden eric
  • 6 篇 denys poshyvanyk
  • 6 篇 gyimothy tibor
  • 6 篇 robles gregorio

语言

  • 1,255 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE International Workshop on Source Code Analysis and Manipulation"
1261 条 记 录,以下是71-80 订阅
排序:
Fine-grained analysis of change couplings
Fine-grained analysis of change couplings
收藏 引用
5th ieee international workshop on source code analysis and manipulation
作者: Fluri, B Gall, HC Pinzger, M Univ Zurich Dept Informat Seal Zurich Switzerland
In software evolution analysis, many approaches analyze release history data available through versioning systems. The recent investigations of CVS data have shown that commonly committed files highlight their change ... 详细信息
来源: 评论
Online cycle detection and difference propagation for pointer analysis  3
Online cycle detection and difference propagation for pointe...
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Pearce, DJ Kelly, PHJ Hankin, C Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2BZ England
This paper presents and evaluates a number of techniques to improve the execution time of interprocedural pointer analysis in the context of large C programs. The analysis is formulated as a graph of set constraints a... 详细信息
来源: 评论
Implementation and verification of implicit-invocation systems using source transformation
Implementation and verification of implicit-invocation syste...
收藏 引用
5th ieee international workshop on source code analysis and manipulation
作者: Zhang, HY Bradbury, JS Cordy, JR Dingel, J Queens Univ Sch Comp Kingston ON Canada
In this paper we present a source transformation-based framework to support uniform testing and model checking of implicit-invocation software systems. The framework includes a new domain-specific programming language... 详细信息
来源: 评论
Barrier slicing and chopping  3
Barrier slicing and chopping
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Krinke, J Univ Passau D-8390 Passau Germany
One of the critiques on program slicing is that slices presented to the user are hard to understand. This is partly due to bad user interfaces, but mainly related to the problem that slicing 'dumps' the result... 详细信息
来源: 评论
Knitting Music and Programming Reflections on the Frontiers of source code analysis
Knitting Music and Programming Reflections on the Frontiers ...
收藏 引用
11th ieee international Working Conference on source code analysis and manipulation/ieee international Conference on Software Maintenance/ieee international Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Gold, Nicolas UCL Dept Comp Sci CREST London England
source code analysis and manipulation (SCAM) underpins virtually every operational software system. Despite the impact and ubiquity of SCAM principles and techniques in software engineering, there are still frontiers ... 详细信息
来源: 评论
A case study in detecting software security vulnerabilities using constraint optimization  1
A case study in detecting software security vulnerabilities ...
收藏 引用
1st ieee international workshop on source code analysis and manipulation
作者: Weber, M Shah, V Ren, C Cigital Inc Dulles VA 20166 USA
In this paper we present a case study in static analysis, with a focus on static methods for detecting buffer overflow vulnerabilities in software. We describe in detail a tool called Mjolnir that we have developed Wh... 详细信息
来源: 评论
XOgastan: XML-oriented gcc AST analysis and transformations  3
XOgastan: XML-oriented gcc AST analysis and transformations
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Antoniol, G Di Penta, M Masone, G Villano, U Univ Sannio Dept Engn RCOST I-82100 Benevento Italy
Software maintenance, program analysis and transformation tools almost always rely on static source code analysis as the first and fundamental step to gather information. In the past, two different strategies have bee... 详细信息
来源: 评论
Unique renaming of Java using source transformation  3
Unique renaming of Java using source transformation
收藏 引用
3rd ieee international workshop on source code analysis and manipulation
作者: Guo, XP Cordy, JR Dean, TR Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
This paper presents a method for unique renaming declarations and references in Java programs using source transformation to XML markup. Each entity declaration and reference in the Java program is assigned a globally... 详细信息
来源: 评论
Guest Editorial for the Special Issue on source code analysis and manipulation, SCAM 2008
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2009年 第10期51卷 1377-1378页
作者: Cordy, James R. Zhang, Lu Queens Univ Sch Comp Kingston ON K7L 3N6 Canada Peking Univ Inst Software Sch Elect Engn & Comp Sci Beijing 100871 Peoples R China
This issue of Information and Software Technology concentrates on the bottom line in computer software engineering - the source code itself. The seven papers in this issue were selected and extended from the best pape... 详细信息
来源: 评论
Software engineering by source transformation - Experience with TXL  1
Software engineering by source transformation - Experience w...
收藏 引用
1st ieee international workshop on source code analysis and manipulation
作者: Cordy, JR Dean, TR Malton, AJ Schneider, KA Queens Univ Dept Comp & Informat Sci Kingston ON K7L 3N6 Canada
Many tasks in software engineering can be characterized as source to source transformations. Design recovery, software restructuring, forward engineering, language translation, platform migration and code reuse can al... 详细信息
来源: 评论