咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是201-210 订阅
排序:
Reconstruction of composite types for Decompilation
Reconstruction of composite types for Decompilation
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Troshina, K. Derevenets, Y. Chernov, A. Russian Acad Sci Inst Syst Programming 25 A Solzhenitsyn St Moscow Russia Moscow MV Lomonosov State Univ Computat Math & Cybernet Dept Moscow Russia
Decompilation is reconstruction of a program in a high-level language from a program in a low-level language. This paper presents a method for automatic reconstruction of composite types (structures, arrays and combin... 详细信息
来源: 评论
On Automatically Generating Commit Messages via Summarization of source code Changes  14
On Automatically Generating Commit Messages via Summarizatio...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Fernando Cortes-Coy, Luis Linares-Vasquez, Mario Aponte, Jairo Poshyvanyk, Denys Univ Nacl Colombia Bogota Colombia Coll William & Mary Williamsburg VA USA
Although version control systems allow developers to describe and explain the rationale behind code changes in commit messages, the state of practice indicates that most of the time such commit messages are either ver... 详细信息
来源: 评论
Techniques for Efficient Automated Elimination of False Positives  20
Techniques for Efficient Automated Elimination of False Posi...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Muske, Tukaram Serebrenik, Alexander Tata Consultancy Serv Tata Res Dev & Design Ctr Pune Maharashtra India Eindhoven Univ Technol Eindhoven Netherlands
Static analysis tools are useful to detect common programming errors. However, they generate a large number of false positives. Postprocessing of these alarms using a model checker has been proposed to automatically e... 详细信息
来源: 评论
Discovering Likely Mappings between APIs using Text Mining  15
Discovering Likely Mappings between APIs using Text Mining
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Pandita, Rahul Jetley, Raoul Praful Sudarsan, Sithu D. Williams, Laurie N Carolina State Univ Raleigh NC 27695 USA ABB Corp Res New Delhi India
Developers often release different versions of their applications to support various platform/programming-language application programming interfaces (APIs). To migrate an application written using one API (source) to... 详细信息
来源: 评论
A Parallel On-Demand Algorithm for Computing Interprocedural Dominators  14
A Parallel On-Demand Algorithm for Computing Interprocedural...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Abadi, Aharon Feldman, Yishai A. Tel Aviv Univ Blavatnik Sch Comp Sci Haifa Israel IBM Res Corp Haifa Israel
We present a new algorithm for computing interprocedural dominators. The algorithm identifies a set of special nodes, which are the only ones that can have interprocedural dominance edges, and extends the intraprocedu... 详细信息
来源: 评论
An Approach for the Identification of Information Leakage in Automotive Infotainment systems  20
An Approach for the Identification of Information Leakage in...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Moiz, Abdul Alalfi, Manar H. Ryerson Univ Dept Comp Sci Toronto ON Canada
The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infot... 详细信息
来源: 评论
The Case for Adaptive Change Recommendation  18
The Case for Adaptive Change Recommendation
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Pugh, Sydney Binkley, David Moonen, Leon Loyola Univ Maryland 4501 N Charles St Baltimore MD 21210 USA Simula Res Lab Oslo Norway
As the complexity of a software system grows, it becomes increasingly difficult for developers to be aware of all the dependencies that exist between artifacts (e.g., files or methods) of the system. Change impact ana... 详细信息
来源: 评论
On the Relationships between Stability and Bug-proneness of code Clones: An Empirical Study  17
On the Relationships between Stability and Bug-proneness of ...
收藏 引用
ieee 17th International working conference on source code analysis and manipulation (SCAM)
作者: Rahman, Md Saidur Roy, Chanchal K. Univ Saskatchewan Saskatoon SK Canada
Exact or similar copies of code fragments in a code base are known as code clones. code clones are considered as one of the serious code smells. Stability is a widely investigated perspective of assessing the impacts ... 详细信息
来源: 评论
Incremental Flow analysis through Computational Dependency Reification  20
Incremental Flow Analysis through Computational Dependency R...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Van der Plas, Jens Stievenart, Quentin Van Es, Noah De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
Static analyses are used to gain more confidence in changes made by developers. To be of most use, such analyses must deliver feedback fast. Therefore, incremental static analyses update previous results rather than e... 详细信息
来源: 评论
Efficient utilization of secondary storage for scalable dynamic slicing  14
Efficient utilization of secondary storage for scalable dyna...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Kargen, Ulf Shahmehri, Nahid Linkoping Univ Dept Comp & Informat Sci SE-58183 Linkoping Sweden
Dynamic program slicing is widely recognized as a powerful aid for e.g. program comprehension during debugging. However, its widespread use has been impeded in part by scalability issues that occur when constructing t... 详细信息
来源: 评论