咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是291-300 订阅
排序:
[Engineering] ENYPD-Entry Points Detector Jakarta Server Faces Use Case
[Engineering] ENYPD-Entry Points Detector Jakarta Server Fac...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Nguempnang, Rodrigue Wete Berger, Bernhard J. Sohr, Karsten Univ Bremen Bremen Germany
Which parts of a software system can be accessed by an attacker is a common question in software security. The answer to this question defines where to look for input validation vulnerabilities, which parts of a syste... 详细信息
来源: 评论
Identification and analysis of attributes and base measures within ISO 9126
收藏 引用
SOFTWARE QUALITY JOURNAL 2011年 第2期19卷 447-460页
作者: Desharnais, Jean-Marc Abran, Alain Suryn, Witold TAM Project Istanbul Turkey Univ Quebec Ecole Technol Super Montreal PQ H3C 1K3 Canada Bogazici Univ Istanbul Turkey
The ISO 9126 quality model is a 4-part suite of documents presenting 10 characteristics of the quality of software products, 27 subcharacteristics, and an inventory of more than 250 derived measures proposed to quanti... 详细信息
来源: 评论
C/C++ thread safety analysis  14
C/C++ thread safety analysis
收藏 引用
14th ieee International working conference on source code analysis and manipulation, SCAM 2014
作者: Hutchins, Delesley Ballman, Aaron Sutherland, Dean Google Inc. United States CERT/SEI United States
Writing multithreaded programs is hard. Static analysis tools can help developers by allowing threading policies to be formally specified and mechanically checked. They essentially provide a static type system for thr... 详细信息
来源: 评论
Change impact graphs: Determining the impact of prior code changes
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2009年 第10期51卷 1394-1408页
作者: German, Daniel M. Hassan, Ahmed E. Robles, Gregorio Univ Victoria Dept Comp Sci Victoria BC V8W 2Y2 Canada Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
The source code of a software system is in constant change. The impact of these changes spreads out across the software system and may lead to the sudden manifestation of failures in unchanged parts. To help developer... 详细信息
来源: 评论
GitHub, Technical Debt, code Formatting, and More
收藏 引用
ieee SOFTWARE 2017年 第2期34卷 105-107页
作者: Carver, Jeffrey C. Cabot, Jordi Capilla, Rafael Muccini, Henry Univ Alabama Dept Comp Sci Tuscaloosa AL 35487 USA ICREA Catalan Inst Res & Adv Studies Interdisciplinary Internet Inst Barcelona Spain Rey Juan Carlos Univ Comp Sci Madrid Spain Univ Aquila Software Engn Informat Engn & Comp Sci & Math Dept Laquila Italy
This issue's column reports on papers from the 19th International conference on Model Driven Engineering Languages and Systems, the 2016 ACM SIGPLAN International conference on Software Language Engineering, the 1... 详细信息
来源: 评论
Modular Decompilation of Low-Level code by Partial Evaluation
Modular Decompilation of Low-Level Code by Partial Evaluatio...
收藏 引用
8th ieee International working conference on source code analysis and manipulation
作者: Gomez-Zamalloa, Miguel Albert, Elvira Puebla, German Univ Complutense Madrid DSIC E-28040 Madrid Spain Tech Univ Madrid CLIP Madrid Spain
Decompiling low-level code to a high-level intermediate representation facilitates the development of analyzers, model checkers, etc. which reason about properties of the low-level code (e.g., bytecode, NET). Interpre... 详细信息
来源: 评论
Improved static resolution of dynamic class loading in Java
Improved static resolution of dynamic class loading in Java
收藏 引用
7th ieee International working conference on source code analysis and manipulation
作者: Sawin, Jason Rountev, Atanas Ohio State Univ Columbus OH 43210 USA
Modern applications are becoming increasingly more dynamic and flexible. In Java software, one important flexibility mechanism is dynamic class loading. Unfortunately, the vast majority of static analyses for Java han... 详细信息
来源: 评论
Leveraging User-Defined Identifiers for Counterfactual Data Generation in source code Vulnerability Detection  23
Leveraging User-Defined Identifiers for Counterfactual Data ...
收藏 引用
23rd ieee International working conference on source code analysis and manipulation, SCAM 2023
作者: Kuang, Hongyu Yang, Feng Zhang, Long Tang, Gaigai Yang, Lin Natl. Key Lab. of Sci. and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China
Software vulnerability detection is a critical aspect of ensuring the security and reliability of software systems. However, traditional vulnerability detection approaches often have limitations due to the scarcity an... 详细信息
来源: 评论
On temporal path conditions in dependence graphs
On temporal path conditions in dependence graphs
收藏 引用
7th ieee International working conference on source code analysis and manipulation
作者: Lochbihler, Andreas Snelting, Gregor Univ Karlsruhe TH Lehrstuhl Programmierparadigmen Karlsruhe Germany
Program dependence graphs are a well-established device to represent possible information flow in a program. Path conditions in dependence graphs have been proposed to express more detailed circumstances of a particul... 详细信息
来源: 评论
Collections frameworks for points-to analysis
Collections frameworks for points-to analysis
收藏 引用
2012 ieee 12th International working conference on source code analysis and manipulation, SCAM 2012
作者: Gutzmann, Tobias Lundberg, Jonas Löwe, Welf School of Computer Science Physics and Mathematics Linnaeus University Växjö Sweden
Points-to information is the basis for many analyses and transformations, e.g., for program understanding and optimization. Collections frameworks are part of most modern programming languages' infrastructures and... 详细信息
来源: 评论