咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是121-130 订阅
排序:
Language-Independent Clone Detection Applied to Plagiarism Detection
Language-Independent Clone Detection Applied to Plagiarism D...
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Brixtel, Romain Fontaine, Mathieu Lesner, Boris Bazin, Cyril Robbes, Romain Univ Caen Basse Normandie GREYC CNRS UMR 6072 F-14000 Caen France Univ Chile DCC Santiago 8370459 Chile
Clone detection is usually applied in the context of detecting small-to medium scale fragments of duplicated code in large software systems. In this paper, we address the problem of clone detection applied to plagiari... 详细信息
来源: 评论
From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow  15
From Preprocessor-Constrained Parse Graphs to Preprocessor-C...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Luedemann, Dierk Koschke, Rainer Univ Bremen D-28359 Bremen Germany
Preprocessor-aware static analysis tools are needed for C code to gain sound knowledge about the interference among all conditionally compiled program parts. We provide formal descriptions and algorithms to construct ... 详细信息
来源: 评论
PtrTracker: Pragmatic Pointer analysis
PtrTracker: Pragmatic Pointer Analysis
收藏 引用
13th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Biallas, Sebastian Olesen, Mads Chr. Cassez, Franck Huuck, Ralf Rhein Westfal TH Aachen Aachen Germany Aalborg Univ Aalborg Denmark NICTA Sydney NSW Australia UNSW Sydney NSW Australia
Static program analysis for bug detection in industrial C/C++ code has many challenges. One of them is to analyze pointer and pointer structures efficiently. While there has been much research into various aspects of ... 详细信息
来源: 评论
SATT: Tailoring code Metric Thresholds for Different Software Architectures  16
SATT: Tailoring Code Metric Thresholds for Different Softwar...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Aniche, Mauricio Treude, Christoph Zaidman, Andy van Deursen, Arie Gerosa, Marco Aurelio Delft Univ Technol NL-2600 AA Delft Netherlands Univ Adelaide Adelaide SA 5005 Australia Univ Sao Paulo BR-05508 Sao Paulo Brazil
code metric analysis is a well-known approach for assessing the quality of a software system. However, current tools and techniques do not take the system architecture (e.g., MVC, Android) into account. This means tha... 详细信息
来源: 评论
Automatically Generating Fix Suggestions in Response to Static code analysis Warnings  19
Automatically Generating Fix Suggestions in Response to Stat...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Marcilio, Diego Furia, Carlo A. Bonifacio, Rodrigo Pinto, Gustavo Univ Brasilia Brasilia DF Brazil USI Univ Svizzera Italiana Lugano Switzerland Fed Univ Para Belem Para Brazil
Static code analysis tools such as FindBugs and SonarQube are widely used on open-source and industrial projects to detect a variety of issues that may negatively affect the quality of software. Despite these tools... 详细信息
来源: 评论
Review Efforts Reduction by Partitioning of Static analysis Warnings
Review Efforts Reduction by Partitioning of Static Analysis ...
收藏 引用
13th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Muske, Tukaram B. Baid, Ankit Sanas, Tushar TRDDC Pune 411013 MH India
Static analysis has been successfully employed in software verification, however the number of generated warnings and cost incurred in their manual review is a major concern. In this paper we present a novel idea to r... 详细信息
来源: 评论
An Empirical Study of code Smells in Transformer-based code Generation Techniques  22
An Empirical Study of Code Smells in Transformer-based Code ...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Siddiq, Mohammed Latif Majumder, Shafayat H. Mim, Maisha R. Jajodia, Sourov Santos, Joanna C. S. Univ Notre Dame Dept Comp Sci & Engn Notre Dame IN 46556 USA Bangladesh Univ Engn & Technol Dept Comp Sci Dhaka Bangladesh
Prior works have developed transformer-based language learning models to automatically generate source code for a task without compilation errors. The datasets used to train these techniques include samples from open ... 详细信息
来源: 评论
Removing Redundant Statements in Amplified Test Cases  21
Removing Redundant Statements in Amplified Test Cases
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Oosterbroek, Wessel Brandt, Carolin Zaidman, Andy Delft Univ Technol Delft Netherlands
Test amplification generates new tests by modifying existing, manually written tests. Up until now, this process preserves statements that were relevant for the original test case but are no longer needed for the beha... 详细信息
来源: 评论
A preliminary evaluation on the relationship among architectural and test smells  22
A preliminary evaluation on the relationship among architect...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: De Stefano, Manuel Pecorelli, Fabiano Di Nucci, Dario De Lucia, Andrea Univ Salerno SeSa Lab Fisciano Italy Tampere Univ Tampere Finland
Software maintenance is the software life cycle's longest and most challenging phase. Bad architectural decisions or sub-optimal solutions might lead to architectural erosion, i.e., the process that causes the sys... 详细信息
来源: 评论
Survey of Approaches for Handling Static analysis Alarms  16
Survey of Approaches for Handling Static Analysis Alarms
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Muske, Tukaram Serebrenik, Alexander Tata Consultancy Serv Tata Res Dev & Design Ctr Pune Maharashtra India Eindhoven Univ Technol Eindhoven Netherlands
Static analysis tools have showcased their importance and usefulness in automated detection of code anomalies and defects. However, the large number of alarms reported and cost incurred in their manual inspections hav... 详细信息
来源: 评论