咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是181-190 订阅
排序:
BinCFP: Efficient Multi-threaded Binary code Control Flow Profiling  16
BinCFP: Efficient Multi-threaded Binary Code Control Flow Pr...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Ming, Jiang Wu, Dinghao Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA
In many tasks of reverse engineering and binary code analysis (e.g., hybrid disassembly, resolving indirect jump, and decoupled taint analysis), the knowledge of detailed dynamic control flow can be of great value. Ho... 详细信息
来源: 评论
An End-to-End Framework for Repairing Potentially Vulnerable source code  22
An End-to-End Framework for Repairing Potentially Vulnerable...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Jasz, Judit Hegedus, Peter Milankovich, Akos Ferenc, Rudolf Univ Szeged FrontEndART Ltd Szeged Hungary SEARCH LAB Ltd Budapest Hungary
Nowadays, program development is getting easier and easier as the various IDE tools provide advice on what to write in the program. But it is not enough to implement a solution to a problem;it is also important that t... 详细信息
来源: 评论
Assessing the Impact of Execution Environment on Observation-Based Slicing  22
Assessing the Impact of Execution Environment on Observation...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Binkley, David Moonen, Leon Loyola Univ Maryland Baltimore MD 21210 USA Simula Res Lab Oslo Norway
Program slicing reduces a program to a smaller version that retains a chosen computation, referred to as a slicing criterion. One recent multi-lingual slicing approach, observation-based slicing (ORBS), speculatively ... 详细信息
来源: 评论
Formal Definition and Automatic Generation of Semantic Metrics: An Empirical Study on Bug Prediction  21
Formal Definition and Automatic Generation of Semantic Metri...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Hu, Ting Mo, Ran Xiong, Pu Li, Zengyang Feng, Qiong Cent China Normal Univ Sch Comp Wuhan Peoples R China Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing Peoples R China
Bug prediction is helpful for facilitating bug fixes and improving the efficiency in software development and maintenance. In the past decades, researchers have proposed numerous studies on bug prediction by using cod... 详细信息
来源: 评论
Is Cloned code more stable than Non-Cloned code?
Is Cloned Code more stable than Non-Cloned Code?
收藏 引用
8th ieee International working conference on source code analysis and manipulation
作者: Krinke, Jens Fernuniv Hagen Germany
This paper presents a study on the stability of cloned code. The results from an analysis of 200 weeks of evolution of five software system show that the stability as measured by changes to the system is dominated by ... 详细信息
来源: 评论
On the Comprehension of code Clone Visualizations: A Controlled Study using Eye Tracking  15
On the Comprehension of Code Clone Visualizations: A Control...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Uddin, Md Sami Gaur, Varun Gutwin, Carl Roy, Chanchal K. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 0W0 Canada
code clone visualizations (CCVs) are graphical representations of clone detection results provided by various state-of-the-art command line and graphical analysis tools. In order to properly analyze and manipulate cod... 详细信息
来源: 评论
Exploring the Effects of History Length and Age on Mining Software Change Impact  16
Exploring the Effects of History Length and Age on Mining So...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Moonen, Leon Di Alesio, Stefano Rolfsnes, Thomas Binkley, Dave W. Simula Res Lab Oslo Norway Loyola Univ Maryland Baltimore MD USA
The goal of Software Change Impact analysis is to identify artifacts (typically source-code files) potentially affected by a change. Recently, there is an increased interest in mining software change impact based on e... 详细信息
来源: 评论
Permission Issues in Open-source Android Apps: An Exploratory Study  19
Permission Issues in Open-source Android Apps: An Explorator...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Scoccia, Gian Luca Peruma, Anthony Pujols, Virginia Malavolta, Ivano Krutz, Daniel E. Gran Sasso Sci Inst Laquila Italy Rochester Inst Technol Rochester NY 14623 USA Vrije Univ Amsterdam Netherlands
Permissions are one of the most fundamental components for protecting an Android user's privacy and security. Unfortunately, developers frequently misuse permissions by requiring too many or too few permissions, o... 详细信息
来源: 评论
Periodic Developer Metrics in Software Defect Prediction  18
Periodic Developer Metrics in Software Defect Prediction
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Kini, Seldag Ozcan Tosun, Ayse Istanbul Tech Univ Fac Comp & Informat Engn Istanbul Turkey
Defect prediction studies have proposed several data-driven approaches, and recently, this field has put more emphasis on whether the people factor is associated software defects. Developer metrics can capture experie... 详细信息
来源: 评论
The EKEKO/X Program Transformation Tool  14
The EKEKO/X Program Transformation Tool
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: De Roover, Coen Inoue, Katsuro Osaka Univ Software Engn Lab Osaka Japan Vrije Univ Brussel Software Languages Lab Brussels Belgium
Developers often need to perform repetitive changes to source code. For instance, to repair several instances of a bug or to update all clients of a library to a newer version. Manually performing such changes is labo... 详细信息
来源: 评论