咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是301-310 订阅
排序:
Collections frameworks for points-to analysis
Collections frameworks for points-to analysis
收藏 引用
2012 ieee 12th International working conference on source code analysis and manipulation, SCAM 2012
作者: Gutzmann, Tobias Lundberg, Jonas Löwe, Welf School of Computer Science Physics and Mathematics Linnaeus University Växjö Sweden
Points-to information is the basis for many analyses and transformations, e.g., for program understanding and optimization. Collections frameworks are part of most modern programming languages' infrastructures and... 详细信息
来源: 评论
Proteum/FL: A tool for localizing faults using mutation analysis
Proteum/FL: A tool for localizing faults using mutation anal...
收藏 引用
2013 ieee 13th International working conference on source code analysis and manipulation, SCAM 2013
作者: Papadakis, Mike Delamaro, Marcio E. Traon, Yves Le University of Luxembourg Luxembourg Instituto de Ciências Matemáticas e de Computaçã o Universidade de São Paulo São Carlos SP Brazil
Fault diagnosis is the process of analyzing programs with the aim of identifying the code fragments that are faulty. It has been identified as one of the most expensive and time consuming tasks of software development... 详细信息
来源: 评论
Change Pattern Detection for Optimising Incremental Static analysis  23
Change Pattern Detection for Optimising Incremental Static A...
收藏 引用
23rd ieee International working conference on source code analysis and manipulation, SCAM 2023
作者: Wauters, Cindy Plas, Jens Van Der Stievenart, Quentin Roover, Coen De Vrije Universiteit Brussel Brussels Belgium Université du Québec À Montréal Montréal Canada
Static analyses can be used by developers to compute properties of a program, enabling e.g., bug detection and program verification. However, reanalysing a program from scratch upon every change is time-consuming, esp... 详细信息
来源: 评论
The Mind Is a Powerful Place: How Showing code Comprehensibility Metrics Influences code Understanding  21
The Mind Is a Powerful Place: How Showing Code Comprehensibi...
收藏 引用
43rd ieee/ACM International conference on Software Engineering - Software Engineering in Practice (ICSE-SEIP) / 43rd ACM/ieee International conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER)
作者: Wyrich, Marvin Preikschat, Andreas Graziotin, Daniel Wagner, Stefan Univ Stuttgart Inst Software Engn Stuttgart Germany
Static code analysis tools and integrated development environments present developers with quality-related software metrics, some of which describe the understandability of source code. Software metrics influence over... 详细信息
来源: 评论
Trading-off security and performance in barrier slicing for remote software entrusting
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2009年 第2期16卷 235-261页
作者: Ceccato, Mariano Preda, Mila Dalla Nagra, Jasvir Collberg, Christian Tonella, Paolo Fdn Bruno Kessler Trento Italy Univ Trent Trento Italy Univ Arizona Tucson AZ USA
Network applications often require that a trust relationship is established between a trusted host (e.g., the server) and an untrusted host (e.g., the client). The remote entrusting problem is the problem of ensuring ... 详细信息
来源: 评论
INVocD: Identifier Name Vocabulary Dataset
INVocD: Identifier Name Vocabulary Dataset
收藏 引用
10th ieee working conference on Mining Software Repositories (MSR)
作者: Butler, Simon Wermelinger, Michel Yu, Yijun Sharp, Helen Open Univ Ctr Res Comp Dept Comp Milton Keynes Bucks England
INVocD is a database of the identifier name declarations and vocabulary found in 60 FLOSS Java projects where the source code structure is recorded and the identifier name vocabulary is made directly available, offeri... 详细信息
来源: 评论
ACER: An AST-based Call Graph Generator Framework  23
ACER: An AST-based Call Graph Generator Framework
收藏 引用
23rd ieee International working conference on source code analysis and manipulation, SCAM 2023
作者: Chen, Andrew Yan, Yanfu Poshyvanyk, Denys William & Mary Computer Science Department Williamsburg United States
We introduce ACER, an AST-based call graph generator framework. ACER leverages tree-sitter to interface with any language. We opted to focus on generators that operate on abstract syntax trees (ASTs) due to their spee... 详细信息
来源: 评论
Applying the Universal Version History Concept to Help De-Risk Copy-Based code Reuse  23
Applying the Universal Version History Concept to Help De-Ri...
收藏 引用
23rd ieee International working conference on source code analysis and manipulation, SCAM 2023
作者: Reid, David Mockus, Audris University of Tennessee KnoxvilleTN United States
The ability to easily copy code among open source projects makes it difficult to comply with the need to determine the provenance of code essential for cybersecurity and for complying with the licensing terms. Such pr... 详细信息
来源: 评论
Do code Quality and Style Issues Differ Across (Non-)Machine Learning Notebooks? Yes!  23
Do Code Quality and Style Issues Differ Across (Non-)Machine...
收藏 引用
23rd ieee International working conference on source code analysis and manipulation, SCAM 2023
作者: Siddik, Md Saeed Bezemer, Cor-Paul University of Alberta Department of Electrical and Computer Engineering Canada
The popularity of computational notebooks is rapidly increasing because of their interactive code-output visualization and on-demand non-sequential code block execution. These notebook features have made notebooks esp... 详细信息
来源: 评论
InputTracer: A data-flow analysis tool for manual program comprehension of x86 binaries
InputTracer: A data-flow analysis tool for manual program co...
收藏 引用
2012 ieee 12th International working conference on source code analysis and manipulation, SCAM 2012
作者: Kargén, Ulf Shahmehri, Nahid Department of Computer and Information Science Linköping University SE-58183 Linköping Sweden
Third-party security analysis of closed-source programs has become an important part of a defense-in-depth approach to software security for many companies. In the absence of efficient tools, the analysis has generall... 详细信息
来源: 评论