咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是231-240 订阅
排序:
RECKA and RPromF: two Frama-C Plug-ins for Optimizing Registers usage in CUDA, OpenACC and OpenMP Programs  18
RECKA and RPromF: two Frama-C Plug-ins for Optimizing Regist...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Diarra, Rokiatou Merigot, Alain Vincke, Bastien Univ Paris Saclay SATIE Univ Paris Sud F-94235 Cachan France
Pointer aliasing still hinders compiler optimizations. The ISO C standard 99 has added the restrict keyword that allows programmer to specify non-aliasing as an aid to the compiler's optimizer. The task of annotat... 详细信息
来源: 评论
ACUA: API Change and Usage Auditor  14
ACUA: API Change and Usage Auditor
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Wu, Wei Adams, Bram Gueheneuc, Yann-Gael Antoniol, Giuliano Ecole Polytech DGIGL Montreal PQ H3C 3A7 Canada
Modern software uses frameworks through their Application Programming Interfaces (APIs). Framework APIs may change while frameworks evolve. Client programs have to upgrade to new releases of frameworks if security vul... 详细信息
来源: 评论
TotalADS: Automated Software Anomaly Detection System  14
TotalADS: Automated Software Anomaly Detection System
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Murtaza, Syed Shariyar Hamou-Lhadj, Abdelwahab Khreich, Wael Couture, Mario Concordia Univ Software Behav Anal Res Lab ECE Montreal PQ Canada Def Res & Dev Canada Syst Protect & Countermeasures Valcartier PQ Canada
When a software system starts behaving abnormally during normal operations, system administrators resort to the use of logs, execution traces, and system scanners (e.g., anti-malwares, intrusion detectors, etc.) to di... 详细信息
来源: 评论
The Architectural Security Tool Suite - ARCHSEC  19
The Architectural Security Tool Suite - ARCHSEC
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Berger, Bernhard J. Sohr, Karsten Koschke, Rainer Univ Bremen Software Engn Grp Bremen Germany Technol Zentrum Informat & Informat Tech Bremen Germany
Architectural risk analysis is a risk management process for identifying security flaws at the level of software architectures and is used by large software vendors, to secure their products. We present our architectu... 详细信息
来源: 评论
On the Accuracy of Forward Dynamic Slicing and its Effects on Software Maintenance  14
On the Accuracy of Forward Dynamic Slicing and its Effects o...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Jiang, Siyuan Santelices, Raul Grechanik, Mark Cai, Haipeng Univ Notre Dame Notre Dame IN 46556 USA Univ Illinois Chicago IL USA
Dynamic slicing is a practical and popular analysis technique used in various software-engineering tasks. Dynamic slicing is known to be incomplete because it analyzes only a subset of all possible executions of a pro... 详细信息
来源: 评论
Static JavaScript Call Graphs: a Comparative Study  18
Static JavaScript Call Graphs: a Comparative Study
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Antal, Gabor Hegedus, Peter Toth, Zoltan Ferenc, Rudolf Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary MTA SZTE Res Grp Artificial Intelligence Szeged Hungary
The popularity and wide adoption of JavaScript both at the client and server side makes its code analysis more important than ever before. Most of the algorithms for vulnerability analysis, coding issue detection, or ... 详细信息
来源: 评论
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned code  14
A Comparative Study of Bug Patterns in Java Cloned and Non-c...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Sajnani, Hitesh Saini, Vaibhav Lopes, Cristina V. Univ Calif Irvine Bren Sch Informat & Comp Sci Irvine CA 92697 USA
code cloning via copy-and-paste is a common practice in software engineering. Traditionally, this practice has been considered harmful, and a symptom that some important design abstraction is being ignored. As such, m... 详细信息
来源: 评论
BoostNSift: A Query Boosting and code Sifting Technique for Method Level Bug Localization  21
BoostNSift: A Query Boosting and Code Sifting Technique for ...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Razzaq, Abdul Buckley, Jim Patten, James Vincent Chochlov, Muslim Sai, Ashish Rajendra Univ Limerick Limerick Ireland
Locating bugs is an important, but effort-intensive and time-consuming task, when dealing with large-scale systems. To address this, Information Retrieval (IR) techniques are increasingly being used to suggest potenti... 详细信息
来源: 评论
Failure of One, Fall of Many: An Exploratory Study of Software Features for Defect Prediction  20
Failure of One, Fall of Many: An Exploratory Study of Softwa...
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: dos Santos, Geanderson Esteves Figueiredo, Eduardo Fed Univ Minas Gerais UFMG Dept Comp Sci DCC Belo Horizonte MG Brazil
Software defect prediction represents an area of interest in both academia and the software industry. Thus, software defects are prevalent in software development and might generate numerous difficulties for users and... 详细信息
来源: 评论
The Evolution and Decay of Statically Detected source code Vulnerabilities
The Evolution and Decay of Statically Detected Source Code V...
收藏 引用
8th ieee International working conference on source code analysis and manipulation
作者: Di Penta, Massimiliano Cerulo, Luigi Aversano, Lerina Univ Sannio RCOST Dept Engn I-82100 Benevento Italy
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure high security and reliability To this a... 详细信息
来源: 评论