咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是211-220 订阅
排序:
BoostNSift: A Query Boosting and code Sifting Technique for Method Level Bug Localization  21
BoostNSift: A Query Boosting and Code Sifting Technique for ...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Razzaq, Abdul Buckley, Jim Patten, James Vincent Chochlov, Muslim Sai, Ashish Rajendra Univ Limerick Limerick Ireland
Locating bugs is an important, but effort-intensive and time-consuming task, when dealing with large-scale systems. To address this, Information Retrieval (IR) techniques are increasingly being used to suggest potenti... 详细信息
来源: 评论
A Parallel On-Demand Algorithm for Computing Interprocedural Dominators  14
A Parallel On-Demand Algorithm for Computing Interprocedural...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Abadi, Aharon Feldman, Yishai A. Tel Aviv Univ Blavatnik Sch Comp Sci Haifa Israel IBM Res Corp Haifa Israel
We present a new algorithm for computing interprocedural dominators. The algorithm identifies a set of special nodes, which are the only ones that can have interprocedural dominance edges, and extends the intraprocedu... 详细信息
来源: 评论
An Approach for the Identification of Information Leakage in Automotive Infotainment systems  20
An Approach for the Identification of Information Leakage in...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Moiz, Abdul Alalfi, Manar H. Ryerson Univ Dept Comp Sci Toronto ON Canada
The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infot... 详细信息
来源: 评论
The Case for Adaptive Change Recommendation  18
The Case for Adaptive Change Recommendation
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Pugh, Sydney Binkley, David Moonen, Leon Loyola Univ Maryland 4501 N Charles St Baltimore MD 21210 USA Simula Res Lab Oslo Norway
As the complexity of a software system grows, it becomes increasingly difficult for developers to be aware of all the dependencies that exist between artifacts (e.g., files or methods) of the system. Change impact ana... 详细信息
来源: 评论
On the Relationships between Stability and Bug-proneness of code Clones: An Empirical Study  17
On the Relationships between Stability and Bug-proneness of ...
收藏 引用
ieee 17th International working conference on source code analysis and manipulation (SCAM)
作者: Rahman, Md Saidur Roy, Chanchal K. Univ Saskatchewan Saskatoon SK Canada
Exact or similar copies of code fragments in a code base are known as code clones. code clones are considered as one of the serious code smells. Stability is a widely investigated perspective of assessing the impacts ... 详细信息
来源: 评论
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned code  14
A Comparative Study of Bug Patterns in Java Cloned and Non-c...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Sajnani, Hitesh Saini, Vaibhav Lopes, Cristina V. Univ Calif Irvine Bren Sch Informat & Comp Sci Irvine CA 92697 USA
code cloning via copy-and-paste is a common practice in software engineering. Traditionally, this practice has been considered harmful, and a symptom that some important design abstraction is being ignored. As such, m... 详细信息
来源: 评论
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C plus  20
The Role of Implicit Conversions in Erroneous Function Argum...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Szalay, Richard Sinkovics, Abel Porkolab, Zoltan Eotvos Lorand Univ Fac Informat Dept Programming Languages & Compilers Budapest Hungary
Argument selection defects, in which the programmer has chosen the wrong argument to a function call is a widely investigated problem. The compiler can detect such misuse of arguments based on the argument and paramet... 详细信息
来源: 评论
Incremental Flow analysis through Computational Dependency Reification  20
Incremental Flow Analysis through Computational Dependency R...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Van der Plas, Jens Stievenart, Quentin Van Es, Noah De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
Static analyses are used to gain more confidence in changes made by developers. To be of most use, such analyses must deliver feedback fast. Therefore, incremental static analyses update previous results rather than e... 详细信息
来源: 评论
Efficient utilization of secondary storage for scalable dynamic slicing  14
Efficient utilization of secondary storage for scalable dyna...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Kargen, Ulf Shahmehri, Nahid Linkoping Univ Dept Comp & Informat Sci SE-58183 Linkoping Sweden
Dynamic program slicing is widely recognized as a powerful aid for e.g. program comprehension during debugging. However, its widespread use has been impeded in part by scalability issues that occur when constructing t... 详细信息
来源: 评论
A source Level Empirical Study of Features and Their Interactions in Variable Software  16
A Source Level Empirical Study of Features and Their Interac...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Fischer, Stefan Linsbauer, Lukas Egyed, Alexander Lopez-Herrejon, Roberto E. Johannes Kepler Univ Linz Inst Software Syst Engn Linz Austria Ecole Technol Super Dept Software Engn & IT Montreal PQ Canada
Robust and effective support for the detection and management of features and their interactions is crucial for many software development tasks but has proven to be an elusive goal despite the extensive research and p... 详细信息
来源: 评论