咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是191-200 订阅
排序:
MOAD: Modeling Observation-based Approximate Dependency  19
MOAD: Modeling Observation-based Approximate Dependency
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Lee, Seongmin Binkley, David Feldt, Robert Gold, Nicolas Yoo, Shin Korea Adv Inst Sci & Technol Daejeon South Korea Loyola Univ Baltimore MD USA Chalmers Univ Technol Gothenburg Sweden UCL London England
While dependency analysis is foundational to many applications of program analysis, the static nature of many existing techniques presents challenges such as limited scalability and inability to cope with multi-lingua... 详细信息
来源: 评论
An Exploratory Study on Automatic Architectural Change analysis Using Natural Language Processing Techniques  19
An Exploratory Study on Automatic Architectural Change Analy...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Mondal, Amit Kumar Roy, Banani Schneider, Kevin A. Univ Saskatchewan Saskatoon SK Canada
Continuous architecture is vital for developing large, complex software systems and supporting continuous delivery, integration, and testing practices. Researchers and practitioners investigate models and rules for ma... 详细信息
来源: 评论
Compositional Information Flow analysis for WebAssembly Programs  20
Compositional Information Flow Analysis for WebAssembly Prog...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Stievenart, Quentin De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
WebAssembly is a new W3C standard, providing a portable target for compilation for various languages. All major browsers can run WebAssembly programs, and its use extends beyond the web: there is interest in compiling... 详细信息
来源: 评论
Do Comments follow Commenting Conventions? A Case Study in Java and Python  21
Do Comments follow Commenting Conventions? A Case Study in J...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Rani, Pooja Abukar, Suada Stulova, Nataliia Bergel, Alexandre Nierstrasz, Oscar Univ Bern Software Composit Grp Bern Switzerland Univ Chile Dept Comp Sci DCC Santiago Chile
Assessing code comment quality is known to be a difficult problem. A number of coding style guidelines have been created with the aim to encourage writing of informative, readable, and consistent comments. However, it... 详细信息
来源: 评论
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java  17
Harvesting the Wisdom of the Crowd to Infer Method Nullness ...
收藏 引用
ieee 17th International working conference on source code analysis and manipulation (SCAM)
作者: Leuenberger, Manuel Osman, Haidar Ghafari, Mohammad Nierstrasz, Oscar Univ Bern Software Composit Grp Bern Switzerland
Null pointer exceptions are common bugs in Java projects. Previous research has shown that dereferencing the results of method calls is the main source of these bugs, as developers do not anticipate that some methods ... 详细信息
来源: 评论
The Impact of Cross-Distribution Bug Duplicates, Empirical Study on Debian and Ubuntu  15
The Impact of Cross-Distribution Bug Duplicates, Empirical S...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Boisselle, Vincent Adams, Bram Polytech Montreal MCIS Quebec City PQ Canada
Although open source distributions like Debian and Ubuntu are closely related, sometimes a bug reported in the Debian bug repository is reported independently in the Ubuntu repository as well, without the Ubuntu users... 详细信息
来源: 评论
Fix that Fix Commit: A real-world remediation analysis of JavaScript projects  20
Fix that Fix Commit: A real-world remediation analysis of Ja...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Bandara, Vinuri Rathnayake, Thisura Weerasekara, Nipuna Elvitigala, Charitha Thilakarathna, Kenneth Wijesekera, Primal Keppitiyagama, Chamath Bug Zero Springfield MO USA SCoRe Lab Colombo Sri Lanka Univ Colombo Sch Comp Colombo Sri Lanka Univ Calif Berkeley Berkeley CA 94720 USA
While there is a large body of work on understanding vulnerabilities in the wild, little has been done to understand the dynamics of the remediation phase of the development cycle. To this end, we have done a timeline... 详细信息
来源: 评论
Keynote address: QL for source code analysis
Keynote address: QL for source code analysis
收藏 引用
7th ieee International working conference on source code analysis and manipulation
作者: de Moor, Oege Verbaere, Mathieu Hajiyev, Elnar Avgustinov, Pavel Ekman, Torbjoern Ongkingco, Neil Sereni, Damien Tibble, Julian Semmle Ltd Magdalen Ctr Oxford OX4 4GA England
Many tasks in source code analysis can be viewed as evaluating queries over a relational representation of the code. Here we present an object-oriented query language, named QL, and demonstrate its use for general nav... 详细信息
来源: 评论
A Change-Type Based Empirical Study on the Stability of Cloned code  14
A Change-Type Based Empirical Study on the Stability of Clon...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Rahman, Md Saidur Roy, Chanchal K. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 0W0 Canada
Clones are the duplicate or similar code blocks in software systems. A large number of studies concerning the impacts of clones on software systems mainly focus on the frequency of changes to evaluate stability, consi... 详细信息
来源: 评论
JICER: Simplifying Cooperative Android App analysis Tasks  21
JICER: Simplifying Cooperative Android App Analysis Tasks
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Pauck, Felix Wehrheim, Heike Paderborn Univ Paderborn Germany Carl von Ossietzky Univ Oldenburg Oldenburg Germany
Slicing is an established technique for program inspection employed in use cases such as debugging, analysis, understanding and restructuring. Slicing techniques compute program parts which affect (or are affected by)... 详细信息
来源: 评论