咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是211-220 订阅
排序:
Failure of One, Fall of Many: An Exploratory Study of Software Features for Defect Prediction  20
Failure of One, Fall of Many: An Exploratory Study of Softwa...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: dos Santos, Geanderson Esteves Figueiredo, Eduardo Fed Univ Minas Gerais UFMG Dept Comp Sci DCC Belo Horizonte MG Brazil
Software defect prediction represents an area of interest in both academia and the software industry. Thus, software defects are prevalent in software development and might generate numerous difficulties for users and... 详细信息
来源: 评论
Supporting Static Program analysis and Transformation of Quantum-Based Languages
Supporting Static Program Analysis and Transformation of Qua...
收藏 引用
Quantum Computing and Engineering (QCE), ieee International conference on
作者: Joshua A.C. Behler Ali F. Al-Ramadan Betis Baheri Qiang Guan Jonathan I. Maletic Computer Science Department Kent State University Kent Ohio USA
The work aims to enable the use of common software engineering techniques and tools for quantum programming languages (e.g., OpenQASM). With the increased interest in quantum computing, researchers are adopting the us... 详细信息
来源: 评论
An Approach for the Identification of Information Leakage in Automotive Infotainment systems  20
An Approach for the Identification of Information Leakage in...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Moiz, Abdul Alalfi, Manar H. Ryerson Univ Dept Comp Sci Toronto ON Canada
The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infot... 详细信息
来源: 评论
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C plus  20
The Role of Implicit Conversions in Erroneous Function Argum...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Szalay, Richard Sinkovics, Abel Porkolab, Zoltan Eotvos Lorand Univ Fac Informat Dept Programming Languages & Compilers Budapest Hungary
Argument selection defects, in which the programmer has chosen the wrong argument to a function call is a widely investigated problem. The compiler can detect such misuse of arguments based on the argument and paramet... 详细信息
来源: 评论
Incremental Flow analysis through Computational Dependency Reification  20
Incremental Flow Analysis through Computational Dependency R...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Van der Plas, Jens Stievenart, Quentin Van Es, Noah De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
Static analyses are used to gain more confidence in changes made by developers. To be of most use, such analyses must deliver feedback fast. Therefore, incremental static analyses update previous results rather than e... 详细信息
来源: 评论
Does Infrastructure as code Adhere to Semantic Versioning? An analysis of Ansible Role Evolution  20
Does Infrastructure as Code Adhere to Semantic Versioning? A...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Opdebeeck, Ruben Zerouali, Ahmed Velazquez-Rodriguez, Camilo De Roover, Coen Vrije Univ Brussel Brussels Belgium
Ansible, a popular Infrastructure-as-code platform, provides reusable collections of tasks called roles. Roles are often contributed by third parties, and like general-purpose libraries, they evolve. As such, new rele... 详细信息
来源: 评论
Enhancing Recommendations of Composite Refactorings based on the Practice
Enhancing Recommendations of Composite Refactorings based on...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Ana Carla Bibiano Daniel Coutinho Anderson Uchôa Wesley K. G. Assunção Alessandro Garcia Rafael de Mello Thelma E. Colanzi Daniel Tenório Audrey Vasconcelos Baldoino Fonseca Márcio Ribeiro Pontifical Catholic University of Rio de Janeiro Brazil Federal University of Ceará Brazil North Carolina State University USA Federal University of Rio de Janeiro Brazil State University of Maringá Brazil Federal University of Alagoas Brazil
Refactoring is a non-trivial maintenance activity. Developers spend time and effort refactoring code to remove structural problems, i.e., code smells. Recent studies indicated that developers often apply composite ref... 详细信息
来源: 评论
Static Extraction of Enforced Authorization Policies SEEAUTHZ  20
Static Extraction of Enforced Authorization Policies SEEAUTH...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Berger, Bernhard J. Nguempnang, Rodrigue Wete Sohr, Karsten Koschke, Rainer Univ Bremen Software Engn Grp Bremen Germany Univ Bremen Technol Zentrum Informat & Informat Tech Bremen Germany
Authorization is an intrinsic part of a software's security. Determining whether a user is allowed to access a resource or not is crucial, not only in safety-critical applications but also in everyday applications... 详细信息
来源: 评论
Visualizing source code as Comics Using Generative AI
Visualizing Source Code as Comics Using Generative AI
收藏 引用
ieee International Workshop on Visualizing Software for Understanding and analysis (VISSOFT)
作者: David Heidrich Andreas Schreiber Institute for Software Technology German Aerospace Center (DLR) Weβling Germany Institute for Software Technology German Aerospace Center (DLR) Köln Germany
The architecture and inner structure of software is often only implicitly available in the form of its source code and thus not tangible and intuitively easy to understand for non-programmers and laymen. Our goal is t...
来源: 评论
Lint-Based Warnings in Python code: Frequency, Awareness and Refactoring
Lint-Based Warnings in Python Code: Frequency, Awareness and...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Naelson Oliveira Márcio Ribeiro Rodrigo Bonifácio Rohit Gheyi Igor Wiese Baldoino Fonseca Federal University of Alagoas (UFAL) Maceió Alagoas Brasília University (UnB) Brasília Federal University of Campina Grande (UFCG) Campina Grande Paraíba Federal University of Technology – Paraná (UTFPR) Curitiba Paraná
Python is a popular programming language characterized by its simple syntax and easy learning curve. Like many languages, Python has a set of best practices that should be followed to avoid bugs and improve other qual... 详细信息
来源: 评论