咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是161-170 订阅
排序:
Identifying source code Reuse across Repositories using LCS-based source code Similarity  14
Identifying Source Code Reuse across Repositories using LCS-...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Kawamitsu, Naohiro Ishio, Takashi Kanda, Tetsuya Kula, Raula Gaikovina De Roover, Coen Inoue, Katsuro Osaka Univ Grad Sch Informat Sci & Technol Suita Osaka 5650871 Japan Vrije Univ Brussel Software Languages Lab B-1050 Brussels Belgium
Developers often reuse source files developed for another project. In order to update a reused file to a newer version released by the original project, developers have to track which revision of a file was reused and... 详细信息
来源: 评论
Effective Static analysis to Find Concurrency Bugs In Java
Effective Static Analysis to Find Concurrency Bugs In Java
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Da Luo, Zhi Hillis, Linda Das, Raja Qi, Yao IBM China Dev Lab Beijing Peoples R China IBM Software Grp Ottawa ON Canada IBM Software Grp Res Triangle Pk NC USA
Multithreading and concurrency are core features of the Java language. However, writing a correct concurrent program is notoriously difficult and error prone. Therefore, developing effective techniques to find concurr... 详细信息
来源: 评论
D-REX: Static Detection of Relevant Runtime Exceptions with Location Aware Transformer  21
D-REX: Static Detection of Relevant Runtime Exceptions with ...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Farmahinifarahani, Farima Lu, Yadong Saini, Vaibhav Baldi, Pierre Lopes, Cristina Univ Calif Irvine Irvine CA 92697 USA Microsoft Redmond WA USA
Runtime exceptions are inevitable parts of software systems. While developers often write exception handling code to avoid the severe outcomes of these exceptions, such code is most effective if accompanied by accurat... 详细信息
来源: 评论
Effect of clone information on the performance of developers fixing cloned bugs  14
Effect of clone information on the performance of developers...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Bazrafshan, Saman Koschke, Rainer Univ Bremen D-28359 Bremen Germany
Duplicated source code-clones-is known to occur frequently in software systems and bears the risk of inconsistent updates of the code. The impact of clones has been investigated mostly by retrospective analysis of sof... 详细信息
来源: 评论
LUDroid: A Large Scale analysis of Android - Web Hybridization  19
LUDroid: A Large Scale Analysis of Android - Web Hybridizati...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Tiwari, Abhishek Prakash, Jyoti Gross, Sascha Hammer, Christian Univ Potsdam Software Engn Grp Potsdam Germany
Many Android applications embed webpages via WebView components and execute JavaScript code within Android. Hybrid applications leverage dedicated APIs to load a resource and render it in WebView. Furthermore, Android... 详细信息
来源: 评论
Enabling the Continuous analysis of Security Vulnerabilities with VulData7  18
Enabling the Continuous Analysis of Security Vulnerabilities...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Jimenez, Matthieu Traon, Yves Le Papadakis, Mike Univ Luxembourg Snt Luxembourg Luxembourg
Studies on security vulnerabilities require the analysis, investigation and comprehension of real vulnerable code instances. However, collecting and experimenting with a sufficient number of such instances is challeng... 详细信息
来源: 评论
Which Method-Stereotype Changes are Indicators of code Smells?  18
Which Method-Stereotype Changes are Indicators of Code Smell...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Decker, Michael J. Newman, Christian D. Dragan, Natalia Collard, Michael L. Maletic, Jonathan I. Kraft, Nicholas A. Bowling Green State Univ Dept Comp Sci Bowling Green OH 43403 USA Rochester Inst Technol Dept Software Engn Rochester NY 14623 USA Kent State Univ Dept Management & Informat Syst Kent OH 44242 USA Univ Akron Dept Comp Sci Akron OH 44325 USA Kent State Univ Dept Comp Sci Kent OH 44242 USA ABB Corp Res Raleigh NC USA
A study of how method roles evolve during the lifetime of a software system is presented. Evolution is examined by analyzing when the stereotype of a method changes. Stereotypes provide a high-level categorization of ... 详细信息
来源: 评论
Navigating source code with Words  15
Navigating Source Code with Words
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Lawrie, Dawn Binkley, Dave Loyola Univ Maryland Baltimore MD USA
The hierarchical method of organizing information has proven beneficial in learning in part because it maps well onto the human brain's memory. Exploiting this organizational strategy may help engineers cope with ... 详细信息
来源: 评论
Towards constructing the SSA form using reaching definitions over dominance frontiers  19
Towards constructing the SSA form using reaching definitions...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Masud, Abu Naser Ciccozzi, Federico Malardalen Univ Sch Innovat Design & Engn Vasteras Sweden
The Static Single Assignment (SSA) form is an intermediate representation used for the analysis and optimization of programs in modern compilers. The f-function placement is the most computationally expensive part of ... 详细信息
来源: 评论
Evaluating code Clone Genealogies at Release Level: An Empirical Study
Evaluating Code Clone Genealogies at Release Level: An Empir...
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Saha, Ripon K. Asaduzzaman, Muhammad Zibran, Minhaz F. Roy, Chanchal K. Schneider, Kevin A. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 5C9 Canada
code clone genealogies show how clone groups evolve with the evolution of the associated software system, and thus could provide important insights on the maintenance implications of clones. In this paper, we provide ... 详细信息
来源: 评论