咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是141-150 订阅
排序:
SENSA: Sensitivity analysis for Quantitative Change-impact Prediction  14
SENSA: Sensitivity Analysis for Quantitative Change-impact P...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Cai, Haipeng Jiang, Siyuan Santelices, Raul Zhang, Ying-jie Zhang, Yiji Univ Notre Dame Notre Dame IN 46556 USA Tsinghua Univ Beijing 100084 Peoples R China
Sensitivity analysis determines how a system responds to stimuli variations, which can benefit important software-engineering tasks such as change-impact analysis. We present SENSA, a novel dynamic-analysis technique ... 详细信息
来源: 评论
Behave Nicely! Automatic Generation of code for Behaviour Driven Development Test Suites  19
Behave Nicely! Automatic Generation of Code for Behaviour Dr...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Bob, Ruxandra Storer, Tim Univ Glasgow Sch Comp Sci Glasgow Lanark Scotland
Behaviour driven development (BDD) has gained widespread use in the software industry. System specifications can be expressed as test scenarios, describing the circumstances, actions and expected outcomes. These scena... 详细信息
来源: 评论
On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic code Clone Validation Tools  18
On the Use of Machine Learning Techniques Towards the Design...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Mostaeen, Golam Svajlenko, Jeffrey Roy, Banani Roy, Chanchal K. Schneider, Kevin Univ Saskatchewan Dept Comp Sci Saskatoon SK Canada
A code clone is a pair of code fragments, within or between software systems that are similar. Since code clones often negatively impact the maintainability of a software system, a great many numbers of code clone det... 详细信息
来源: 评论
A Tool for Optimizing Java 8 Stream Software via Automated Refactoring  18
A Tool for Optimizing Java 8 Stream Software via Automated R...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Khatchadourian, Raffi Tang, Yiming Bagherzadeh, Mehdi Ahmed, Syed CUNY New York NY 10021 USA Oakland Univ Rochester MI 48063 USA
Streaming APIs are pervasive in mainstream Object-Oriented languages. For example, the Java 8 Stream API allows for functional-like, MapReduce-style operations in processing both finite and infinite data structures. H... 详细信息
来源: 评论
Does code review really remove coding convention violations?  20
Does code review really remove coding convention violations?
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Han, DongGyun Ragkhitwetsagul, Chaiyong Krinke, Jens Paixao, Matheus Rosa, Giovanni Amazon Munich Germany Mahidol Univ SERU Fac ICT Bangkok Thailand UCL London England Univ Fortaleza Fortaleza Ceara Brazil Univ Molise Campobasso CB Italy
Many software developers perceive technical debt as the biggest problems in their projects. They also perceive code reviews as the most important process to increase code quality. As inconsistent coding style is one s... 详细信息
来源: 评论
Don't DIY: Automatically transform legacy Python code to support structural pattern matching  22
Don't DIY: Automatically transform legacy Python code to sup...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Rozsa, Balazs Antal, Gabor Ferenc, Rudolf Univ Szeged Dept Software Engn Szeged Hungary
As data becomes more and more complex as technology evolves, the need to support more complex data types in programming languages has grown. However, without proper storage and manipulation capabilities, handling such... 详细信息
来源: 评论
Automatic Detection of sources and Sinks in Arbitrary Java Libraries  18
Automatic Detection of Sources and Sinks in Arbitrary Java L...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Sas, Darius Bessi, Marco Fontana, Francesca Arcelli Univ Milano Bicocca Dipartimento Informat Sistemist & Comunicaz Milan Italy CAST Software Italia Milan Italy
In the last decade, data security has become a primary concern for an increasing amount of companies around the world. Protecting the customer's privacy is now at the core of many businesses operating in any kind ... 详细信息
来源: 评论
QSES: Quasi-Static Executable Slices  21
QSES: Quasi-Static Executable Slices
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Stievenart, Quentin Binkley, David De Roover, Coen Vrije Univ Brussel Brussels Belgium Loyola Univ Baltimore Baltimore MD USA
Program slicing aims to reduce a program to a minimal form that produces the same output for a given slicing criterion. Program slicing approaches divide into static and dynamic approaches: whereas static approaches g... 详细信息
来源: 评论
Into the Woods: Experiences from Building a Dataflow analysis Framework for C/C plus  21
Into the Woods: Experiences from Building a Dataflow Analysi...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Schubert, Philipp Dominik Leer, Richard Hermann, Ben Bodden, Eric Paderborn Univ Paderborn Germany Tech Univ Dortmund Dortmund Germany Fraunhofer IEM Paderborn Germany
While traditional static analysis-albeit its complexity-is a topic that is well understood, we especially struggle when it comes to implementing its concepts. Designing and modeling software that implements static ana... 详细信息
来源: 评论
Analyzing the Evolution of Preprocessor-Based Variability: A Tale of a Thousand and One Scripts  18
Analyzing the Evolution of Preprocessor-Based Variability: A...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Schulze, Sandro Fenske, Wolfram Otto von Guericke Univ Fac Comp Sci Magdeburg Germany
Highly configurable software systems allow the efficient and reliable development of similar software variants based on a common code base. The C preprocessor CPP, which uses source code annotations that enable condit... 详细信息
来源: 评论