咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是221-230 订阅
排序:
90% Perspiration: Engineering Static analysis Techniques for Industrial Applications
90% Perspiration: Engineering Static Analysis Techniques for...
收藏 引用
8th ieee International working conference on source code analysis and manipulation
作者: Anderson, Paul GrammaTech Inc Ithaca NY 14850 USA
This article describes some of the engineering approaches that were taken during the development of GrammaTech's static-analysis technology that have taken it from a prototype system with poor performance and scal... 详细信息
来源: 评论
Static Extraction of Enforced Authorization Policies SEEAUTHZ  20
Static Extraction of Enforced Authorization Policies SEEAUTH...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Berger, Bernhard J. Nguempnang, Rodrigue Wete Sohr, Karsten Koschke, Rainer Univ Bremen Software Engn Grp Bremen Germany Univ Bremen Technol Zentrum Informat & Informat Tech Bremen Germany
Authorization is an intrinsic part of a software's security. Determining whether a user is allowed to access a resource or not is crucial, not only in safety-critical applications but also in everyday applications... 详细信息
来源: 评论
Multi-Modal code Summarization with Retrieved Summary  22
Multi-Modal Code Summarization with Retrieved Summary
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Lin, Lile Huang, Zhiqiu Yu, Yaoshen Liu, Yapeng Nanjing Univ Aeronaut & Astronaut Nanjing Peoples R China
A high-quality code summary describes the functionality and purpose of a code snippet concisely, which is key to program comprehension. Automatic code summarization aims to generate natural language summaries from cod... 详细信息
来源: 评论
Statically-informed Dynamic analysis Tools to Detect Algorithmic Complexity Vulnerabilities  16
Statically-informed Dynamic Analysis Tools to Detect Algorit...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Holland, Benjamin Santhanam, Ganesh Ram Awadhutkar, Payas Kothari, Suresh Iowa State Univ Dept Elect & Comp Engn Ames IA 50011 USA
Algorithmic Complexity (AC) vulnerabilities can be exploited to cause a denial of service attack. Specifically, an adversary can design an input to trigger excessive (space/time) resource consumption. It is not possib... 详细信息
来源: 评论
POI: Skew-Aware Parallel Race Detection  18
POI: Skew-Aware Parallel Race Detection
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Sakurai, Yoshitaka Arahori, Yoshitaka Gondow, Katsuhiko Tokyo Inst Technol Tokyo Japan
Multithreaded programs are prone to dataraces. Dataraces are known to be hard to detect and reproduce by manual effort, although they often have detrimental effects on program reliability. Automated techniques are thu... 详细信息
来源: 评论
Recovering the Memory Behavior of Executable Programs
Recovering the Memory Behavior of Executable Programs
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Ketterlin, Alain Clauss, Philippe INRIA CAMUS Team Rocquencourt France Univ Strasbourg Strasbourg France
This paper deals with the binary analysis of executable programs, with the goal of understanding how they access memory. It explains how to statically build a formal model of all memory accesses. Starting with a contr... 详细信息
来源: 评论
New Conceptual Coupling and Cohesion Metrics for Object-Oriented Systems
New Conceptual Coupling and Cohesion Metrics for Object-Orie...
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Ujhazi, Bela Ferenc, Rudolf Poshyvanyk, Denys Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary Coll William & Mary Dept Comp Sci Williamsburg VA 23187 USA
The paper presents two novel conceptual metrics for measuring coupling and cohesion in software systems. Our first metric, Conceptual Coupling between Object classes (CCBO), is based on the well-known CBO coupling met... 详细信息
来源: 评论
An Experimental analysis of Graph-Distance Algorithms for Comparing API Usages  21
An Experimental Analysis of Graph-Distance Algorithms for Co...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Nielebock, Sebastian Blockhaus, Paul Kruger, Jacob Ortmeier, Frank Otto Von Guericke Univ Magdeburg Germany Ruhr Univ Bochum Bochum Germany
Modern software development heavily relies on the reuse of functionalities through Application Programming Interfaces (APIs). However, client developers can have issues identifying the correct usage of a certain API, ... 详细信息
来源: 评论
Summary-Based Compositional analysis for Soft Contract Verification  22
Summary-Based Compositional Analysis for Soft Contract Verif...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: Vandenbogaerde, Bram Stievenart, Quentin De Roover, Coen Vrije Univ Brussel Brussels Belgium
Design-by-contract is a development best practice that requires the interactions between software components to be governed by precise specifications, called contracts. Contracts often take the form of pre- and post-c... 详细信息
来源: 评论
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C plus  20
The Role of Implicit Conversions in Erroneous Function Argum...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Szalay, Richard Sinkovics, Abel Porkolab, Zoltan Eotvos Lorand Univ Fac Informat Dept Programming Languages & Compilers Budapest Hungary
Argument selection defects, in which the programmer has chosen the wrong argument to a function call is a widely investigated problem. The compiler can detect such misuse of arguments based on the argument and paramet... 详细信息
来源: 评论