咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是291-300 订阅
排序:
Towards Detecting Inconsistent Comments in Java source code Automatically
Towards Detecting Inconsistent Comments in Java Source Code ...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Nataliia Stulova Arianna Blasi Alessandra Gorla Oscar Nierstrasz Software Composition Group University of Bern Switzerland Faculty of Informatics USI Università della Svizzera italiana Lugano Switzerland IMDEA Software Institute Madrid Spain
A number of tools are available to software developers to check consistency of source code during software evolution. However, none of these tools checks for consistency of the documentation accompanying the code. As ... 详细信息
来源: 评论
Why Did your PR Get Rejected?: Defining Guidelines for Avoiding PR Rejection in Open source Projects  42
Why Did your PR Get Rejected?: Defining Guidelines for Avoid...
收藏 引用
42nd ieee/ACM International conference on Software Engineering Workshops, ICSEW 2020
作者: Papadakis, Nick Patel, Ayan Gottigundala, Tanay Garro, Alexandra Graham, Xavier Da Silva, Bruno California Polytechnic State Univ. San Luis ObispoCA United States
Pull requests are a commonly used method of collaboration for software developers working on open source projects. In this paper, we analyze the most common reasons, sentiment polarity, and interaction length for pull... 详细信息
来源: 评论
Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments
Out of Sight, Out of Place: Detecting and Assessing Swapped ...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Roger Scott Joseph Ranieri Lucja Kot Vineeth Kashyap GrammaTech Inc.
Programmers often add meaningful information about program semantics when naming program entities such as variables, functions, and macros. However, static analysis tools typically discount this information when they ... 详细信息
来源: 评论
analysis of Logic Errors Utilizing a Large Amount of File History During Programming Learning
Analysis of Logic Errors Utilizing a Large Amount of File Hi...
收藏 引用
ieee International conference on Teaching, Assessment, and Learning for Engineering (ieee TALE)
作者: Umezawa, Katsuyuki Nakazawa, Makoto Kobayashi, Manabu Ishii, Yutaka Nakano, Michiko Hirasawa, Shigeichi Shonan Inst Technol Dept Informat Sci Fujisawa Kanagawa Japan Jr Coll Aizu Dept Ind Informat Sci Fukushima Japan Waseda Univ Ctr Data Sci Tokyo Japan Chiba Univ Fac Educ Chiba Japan Waseda Univ Fac Educ & Integrated Arts & Sci Tokyo Japan Waseda Univ Res Inst Sci & Engn Tokyo Japan
We proposed an editing record visualization system that can confirm learner modification of programs by storing a learning log. This system was utilized for an actual flipped classroom and stored an enormous volume of... 详细信息
来源: 评论
Optimizing Away JavaScript Obfuscation
Optimizing Away JavaScript Obfuscation
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Adrian Herrera Defence Science and Technology Group
JavaScript is a popular attack vector for releasing malicious payloads on unsuspecting Internet users. Authors of this malicious JavaScript often employ numerous obfuscation techniques in order to prevent the automati... 详细信息
来源: 评论
Cost Volume Pyramid Based Depth Inference for Multi-View Stereo
Cost Volume Pyramid Based Depth Inference for Multi-View Ste...
收藏 引用
ieee/CVF conference on Computer Vision and Pattern Recognition (CVPR)
作者: Yang, Jiayu Mao, Wei Alvarez, Jose M. Liu, Miaomiao Australian Natl Univ Canberra ACT Australia NVIDIA Santa Clara CA USA Australian Ctr Robot Vis Canberra ACT Australia
We propose a cost volume-based neural network for depth inference from multi-view images. We demonstrate that building a cost volume pyramid in a coarse-to-fine manner instead of constructing a cost volume at a fixed ... 详细信息
来源: 评论
Database and Benchmark for Early-stage Malicious Activity Detection in 3D Printing  20
Database and Benchmark for Early-stage Malicious Activity De...
收藏 引用
25th Asia and South Pacific Design Automation conference (ASP-DAC)
作者: Ma, Xiaolong Li, Zhe Li, Hongjia An, Qiyuan Qiu, Qinru Xu, Wenyao Wang, Yanzhi Northeastern Univ Boston MA 02115 USA Syracuse Univ Syracuse NY 13244 USA SUNY Buffalo Buffalo NY USA
Increasing malicious users have sought practices to leverage 3D printing technology to produce unlawful tools in criminal activities. It is of vital importance to enable 3D printers to identify the objects to be print... 详细信息
来源: 评论
Does code review really remove coding convention violations?
Does code review really remove coding convention violations?
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: DongGyun Han Chaiyong Ragkhitwetsagul Jens Krinke Matheus Paixao Giovanni Rosa Amazon Germany SERU Faculty of ICT Mahidol University Thailand University College London UK University of Fortaleza Brazil University of Molise Italy
Many software developers perceive technical debt as the biggest problems in their projects. They also perceive code reviews as the most important process to increase code quality. As inconsistent coding style is one s... 详细信息
来源: 评论
MAF: A Framework for Modular Static analysis of Higher-Order Languages
MAF: A Framework for Modular Static Analysis of Higher-Order...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Noah Van Es Jens Van der Plas Quentin Stiévenart Coen De Roover Software Languages Lab Vrije Universiteit Brussel Belgium
A modular static analysis decomposes a program's analysis into analyses of its parts, or components. An intercomponent analysis instructs an intra-component analysis to analyse each component independently of the ... 详细信息
来源: 评论
Who Does What? Work Division and Allocation Strategies of Computer Science Student Teams
Who Does What? Work Division and Allocation Strategies of Co...
收藏 引用
Software Engineering: Software Engineering Education and Training (ICSE-SEET), ieee/ACM International conference on
作者: Anna van der Meulen Efthimia Aivaloglou University of Leiden Leiden Netherlands Leiden Institute of Advanced Computer Science University of Leiden The Netherlands Open University of The Netherlands
Collaboration skills are important for future software engineers. In computer science education, these skills are of-ten practiced through group assignments, where students develop software collaboratively. The approa... 详细信息
来源: 评论