咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是131-140 订阅
排序:
Are the clients of flawed classes (also) defect prone?
Are the clients of flawed classes (also) defect prone?
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Marinescu, Radu Marinescu, Cristina Politehn Univ Timisoara LOOSE Res Grp Timisoara Romania
Design flaws are those characteristics of design entities (e.g., methods, classes) which make them harder to maintain. Existing studies show that classes revealing particular design flaws are more change and defect pr... 详细信息
来源: 评论
Bit-Level Taint analysis  14
Bit-Level Taint Analysis
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Yadegari, Babak Debray, Saumya Univ Arizona Dept Comp Sci Tucson AZ 85721 USA
Taint analysis has a wide variety of applications in software analysis, making the precision of taint analysis an important consideration. Current taint analysis algorithms, including previous work on bit-precise tain... 详细信息
来源: 评论
Checking Refactoring Detection Results Using code Changes Encoding for Improved Accuracy  22
Checking Refactoring Detection Results Using Code Changes En...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Tan, Liang Bockisch, Christoph Philipps Univ Marburg Marburg Germany
For example during software maintenance, it is often important to know the reason for a code change and therefore tools are researched to automatically detect changes due to refactorings. The tool RefDiff can achieve ... 详细信息
来源: 评论
Detecting Function Purity in JavaScript  15
Detecting Function Purity in JavaScript
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Nicolay, Jens Noguera, Carlos De Roover, Coen De Meuter, Wolfgang Vrije Univ Brussel Software Languages Lab Brussels Belgium
We present an approach to detect function purity in JavaScript. A function is pure if none of its applications cause observable side-effects. The approach is based on a pushdown flow analysis that besides traditional ... 详细信息
来源: 评论
First Steps towards a Methodology for Unified Graph's Discrepancy analysis  22
First Steps towards a Methodology for Unified Graph's Discre...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Balogh, Gergo Barath, Istvan Univ Szeged Dept Software Engn Dugon Ter 13 Szeged Hungary
Researchers and IT professionals frequently use dataset comparison during software analysis. Additionally, they commonly make judgments based on discrepancies between two representations of the same item's set. To... 详细信息
来源: 评论
Validating the Use of Topic Models for Software Evolution
Validating the Use of Topic Models for Software Evolution
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Thomas, Stephen W. Adams, Bram Hassan, Ahmed E. Blostein, Dorothea Queens Univ Sch Comp SAIL Kingston ON Canada
Topics are collections of words that co-occur frequently in a text corpus. Topics have been found to be effective tools for describing the major themes spanning a corpus. Using such topics to describe the evolution of... 详细信息
来源: 评论
SimNav: Simulink Navigation of Model Clone Classes  15
SimNav: Simulink Navigation of Model Clone Classes
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Rapos, Eric J. Stevenson, Andrew Alalfi, Manar H. Cordy, James R. Queens Univ Sch Comp Kingston ON Canada
SimNav is a graphical user interface designed for displaying and navigating clone classes of Simulink models detected by the model clone detector Simone. As an embedded Simulink interface tool, SimNav allows model dev... 详细信息
来源: 评论
Studying Fine-Grained Co-Evolution Patterns of Production and Test code  14
Studying Fine-Grained Co-Evolution Patterns of Production an...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Marsavina, Cosmin Romano, Daniele Zaidman, Andy Delft Univ Technol NL-2600 AA Delft Netherlands
Numerous software development practices suggest updating the test code whenever the production code is changed. However, previous studies have shown that co-evolving test and production code is generally a difficult t... 详细信息
来源: 评论
Rebasing in code Review Considered Harmful: A Large-scale Empirical Investigation  19
Rebasing in Code Review Considered Harmful: A Large-scale Em...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Paixao, Matheus Maia, Paulo Henrique Univ Estadual Ceara Distributed Software Engn Res Grp Fortaleza Ceara Brazil
code review has been widely acknowledged as a key quality assurance process in both open-source and industrial software development. Due to the asynchronicity of the code review process, the system's codebase tend... 详细信息
来源: 评论
Untangling Composite Commits Using Program Slicing  18
Untangling Composite Commits Using Program Slicing
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Muylaert, Ward De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
Composite commits are a common mistake in the use of version control software. A composite commit groups many unrelated tasks, rendering the commit difficult for developers to understand, revert, or integrate and for ... 详细信息
来源: 评论