咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是111-120 订阅
排序:
A Metric Extraction Framework Based on a High-Level Description Language
A Metric Extraction Framework Based on a High-Level Descript...
收藏 引用
9th ieee International working conference on source code analysis and manipulation (SCAM 2009)
作者: Alikacem, El Hachemi Sahraoui, Houari A. Ctr Rech Informat Montreal Montreal PQ H3T 1P1 Canada Univ Montreal Dept Informat rech operationelle Montreal PQ H3C 3J7 Canada
Nowadays, many tools are available for metric extraction. However, extending these tools with new metrics or modifying the calculation of existing ones is often difficult, sometimes impossible. Indeed, many of them ar... 详细信息
来源: 评论
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities
Security Testing of Web Applications: a Search Based Approac...
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Avancini, Andrea Ceccato, Mariano FBK irst Trento Trento Italy
More and more web applications suffer the presence of cross-site scripting vulnerabilities that could be exploited by attackers to access sensitive information (such as credentials or credit card numbers). Hence prope... 详细信息
来源: 评论
A Translation Validation Framework for Symbolic Value Propagation Based Equivalence Checking of FSMDAs  15
A Translation Validation Framework for Symbolic Value Propag...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Banerjee, Kunal Mandal, Chittaranjan Sarkar, Dipankar Indian Inst Technol Kharagpur Dept Comp Sci & Engn Kharagpur 721302 W Bengal India
A compiler is a computer program which translates a source code into a target code, often with an objective to reduce the execution time and/or save critical resources. However, an error in the design or in the implem... 详细信息
来源: 评论
A Precise Framework for source-Level Control-Flow analysis  21
A Precise Framework for Source-Level Control-Flow Analysis
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Riouak, Idriss Reichenbach, Christoph Hedin, Gorel Fors, Niklas Lund Univ Dept Comp Sci Lund Sweden
This paper presents INTRACFG, a declarative and language-independent framework for constructing precise intraprocedural control-flow graphs (CFGs) based on the reference attribute grammar system JastAdd. Unlike most o... 详细信息
来源: 评论
Fix-it: An Extensible code Auto-Fix Component in Review Bot
Fix-it: An Extensible Code Auto-Fix Component in Review Bot
收藏 引用
13th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Balachandran, Vipin VMware Bangalore Karnataka India
Coding standard violations, defect patterns and non-conformance to best practices are abundant in checked-in source code. This often leads to unmaintainable code and potential bugs in later stages of software life cyc... 详细信息
来源: 评论
Detecting Security Vulnerabilities in Object-Oriented PHP Programs  17
Detecting Security Vulnerabilities in Object-Oriented PHP Pr...
收藏 引用
ieee 17th International working conference on source code analysis and manipulation (SCAM)
作者: Nashaat, Mona Ali, Karim Miller, James Univ Alberta Edmonton AB Canada
PHP is one of the most popular web development tools in use today. A major concern though is the improper and insecure uses of the language by application developers, motivating the development of various static analy... 详细信息
来源: 评论
Scalable Security Verification of Software at Compile Time  14
Scalable Security Verification of Software at Compile Time
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Tlili, Syrine Fernandez, Jose M. Belghith, Abdelfettah Dridi, Bilel Hidouri, Soufien Univ Manouba Hana Res Lab Tunis Tunisia Ecole Polytech Montreal PQ H3C 3A7 Canada Univ Carthage Tunis Tunisia
Automated verification tools are required to detect coding errors that may lead to severe software vulnerabilities. However, the usage of these tools is still not well integrated into software development life cycle. ... 详细信息
来源: 评论
Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT  22
Deep Multimodal Architecture for Detection of Long Parameter...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Bhave, Anushka Sinha, Roopak Savitribai Phule Pune Univ Vishwakarma Inst Technol Comp Engn Pune Maharashtra India Auckland Univ Technol IT & Software Engn Auckland New Zealand
code smell detection and refactoring are crucial to sustain quality, reduce complexity and increase the efficiency of a software application. code smells are observable patterns in the source code of a program that in... 详细信息
来源: 评论
SootFX: A Static code Feature Extraction Tool for Java and Android  21
SootFX: A Static Code Feature Extraction Tool for Java and A...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Karakaya, Kadiray Bodden, Eric Paderborn Univ Heinz Nixdorf Inst Paderborn Germany Fraunhofer IEM Paderborn Germany
Static code features are necessary components when using machine learning-based techniques to reason about a program of interest. To extract static code features, researchers develop their own feature extractors speci... 详细信息
来源: 评论
Linkage of Similar code Snippets Assessed in the Micro Benchmark Service jsPerf  21
Linkage of Similar Code Snippets Assessed in the Micro Bench...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Saiki, Kazuya Ihara, Akinori Wakayama Univ Social Software Engn Lab SocSEL Wakayama Japan
A benchmark is an action to assess performance (e.g., program execution time) by developers preparing and running several test cases over a long period. To reasonably assess the performance of method-level code snippe... 详细信息
来源: 评论