咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是311-320 订阅
排序:
Free the Bugs: Disclosing Blocking Violations in Reactive Programming
Free the Bugs: Disclosing Blocking Violations in Reactive Pr...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Felix Dobslaw Morgan Vallin Robin Sundström Mid Sweden University Östersund Sweden
In programming, concurrency allows threads to share processing units interleaving and seemingly simultaneous to improve resource utilization and performance. Previous research has found that concurrency faults are har... 详细信息
来源: 评论
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C++
The Role of Implicit Conversions in Erroneous Function Argum...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Richárd Szalay Ábel Sinkovics Zoltán Porkoláb Faculty of Informatics Eötvös Loránd University Budapest Hungary
Argument selection defects, in which the programmer has chosen the wrong argument to a function call is a widely investigated problem. The compiler can detect such misuse of arguments based on the argument and paramet... 详细信息
来源: 评论
CONAN: Contrastive Fusion Networks for Multi-view Clustering
CONAN: Contrastive Fusion Networks for Multi-view Clustering
收藏 引用
ieee International conference on Big Data
作者: Guanzhou Ke Zhiyong Hong Zhiqiang Zeng Zeyi Liu Yangjie Sun Yannan Xie Wuyi University Jiangmen China Polytechnic of EPE1 Foshan China
With the development of big data, deep learning has made remarkable progress on multi-view clustering. Multi-view fusion is a crucial technique for the model obtaining a common representation. However, existing litera... 详细信息
来源: 评论
Static Extraction of Enforced Authorization Policies SeeAuthz
Static Extraction of Enforced Authorization Policies SeeAuth...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Bernhard J. Berger Rodrigue Wete Nguempnang Karsten Sohr Rainer Koschke Software Engineering Group University of Bremen Bremen Germany Technologie-Zentrum Informatik und Informationstechnik University of Bremen Bremen Germany
Authorization is an intrinsic part of a software's security. Determining whether a user is allowed to access a resource or not is crucial, not only in safety-critical applications but also in everyday applications... 详细信息
来源: 评论
An Approach for the Identification of Information Leakage in Automotive Infotainment systems
An Approach for the Identification of Information Leakage in...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Abdul Moiz Manar H. Alalfi Ryerson University Toronto ON Canada
The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infot... 详细信息
来源: 评论
Does Infrastructure as code Adhere to Semantic Versioning? An analysis of Ansible Role Evolution
Does Infrastructure as Code Adhere to Semantic Versioning? A...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Ruben Opdebeeck Ahmed Zerouali Camilo Velázquez-Rodríguez Coen De Roover Vrije Universiteit Brussel Brussels Belgium
Ansible, a popular Infrastructure-as-code platform, provides reusable collections of tasks called roles. Roles are often contributed by third parties, and like general-purpose libraries, they evolve. As such, new rele... 详细信息
来源: 评论
CloneCompass: Visualizations for Exploring Assembly code Clone Ecosystems  7
CloneCompass: Visualizations for Exploring Assembly Code Clo...
收藏 引用
7th ieee working conference on Software Visualization (VISSOFT)
作者: Wang, Ying Weatherston, Jorin Storey, Margaret-Anne German, Daniel M. Univ Victoria Dept Comp Sci Victoria BC Canada
Assembly code analysis is an intensive process undertaken by security analysts and reverse engineers to discover vulnerabilities in existing software when source code is unavailable. Kam1n0 is an efficient code clone ... 详细信息
来源: 评论
DroidXP: A Benchmark for Supporting the Research on Mining Android Sandboxes
DroidXP: A Benchmark for Supporting the Research on Mining A...
收藏 引用
ieee International Workshop on source code analysis and manipulation
作者: Francisco Handrick da Costa Ismael Medeiros Pedro Costa Thales Menezes Marcos Vinícius Rodrigo Bonifácio Edna Dias Canedo University of Brasília Brazil
Due to the popularization of Android and the full range of applications (apps) targeting this platform, many security issues have emerged, attracting researchers and practitioners' attention. As such, many techniq... 详细信息
来源: 评论
srcPtr: A Framework for Implementing Static Pointer analysis Approaches  27
srcPtr: A Framework for Implementing Static Pointer Analysis...
收藏 引用
27th ieee/ACM International conference on Program Comprehension (ICPC)
作者: Zyrianov, Vlas Newman, Christian D. Guarnera, Drew T. Collard, Michael L. Maletic, Jonathan, I Kent State Univ Dept Comp Sci Kent OH 44242 USA Rochester Inst Technol Dept Software Engn Rochester NY 14623 USA Univ Akron Dept Comp Sci Akron OH 44325 USA
A lightweight pointer-analysis framework, srcPtr, is presented to support the implementation and comparison of points-to analysis algorithms. It differentiates itself from existing tools by performing the analysis dir... 详细信息
来源: 评论
From Start-ups to Scale-ups: Opportunities and Open Problems for Static and Dynamic Program analysis  18
From Start-ups to Scale-ups: Opportunities and Open Problems...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Harman, Mark O'Hearn, Peter Facebook London London England UCL London England
This paper describes some of the challenges and opportunities when deploying static and dynamic analysis at scale, drawing on the authors' experience with the Infer and Sapienz Technologies at Facebook, each of wh... 详细信息
来源: 评论