咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是41-50 订阅
排序:
CheckPointer A C Memory Access Validator
CheckPointer A C Memory Access Validator
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Mehlich, Michael Semant Designs Inc Austin TX USA
CheckPointer is a memory access validator for checking spatial and temporal pointer usage errors in multi-threaded applications by tracking meta data and validating pointer dereferences at run-time. The tool uses sour... 详细信息
来源: 评论
Learning from 6,000 Projects: Mining Models in the Large
Learning from 6,000 Projects: Mining Models in the Large
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Zeller, Andreas Saarland Univ Comp Sci Saarbrucken Germany
Models-abstract and simple descriptions of some artifact-are the backbone of all software engineering activities. While writing models is hard, existing code can serve as a source for abstract descriptions of how soft... 详细信息
来源: 评论
Similarity of source code in the Presence of Pervasive Modifications  16
Similarity of Source Code in the Presence of Pervasive Modif...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Ragkhitwetsagul, Chaiyong Krinke, Jens Clark, David UCL Dept Comp Sci CREST London WC1E 6BT England
source code analysis to detect code cloning, code plagiarism, and code reuse suffers from the problem of pervasive code modifications, i.e. transformations that may have a global effect. We compare 30 similarity detec... 详细信息
来源: 评论
Optimizing Away JavaScript Obfuscation  20
Optimizing Away JavaScript Obfuscation
收藏 引用
20th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Herrera, Adrian Def Sci & Technol Grp Canberra ACT Australia
JavaScript is a popular attack vector for releasing malicious payloads on unsuspecting Internet users. Authors of this malicious JavaScript often employ numerous obfuscation techniques in order to prevent the automati... 详细信息
来源: 评论
Lightweight Transformation and Fact Extraction with the srcML Toolkit
Lightweight Transformation and Fact Extraction with the srcM...
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Collard, Michael L. Decker, Michael J. Maletic, Jonathan I. Univ Akron Dept Comp Sci Akron OH 44325 USA Kent State Univ Dept Comp Sci Kent OH 44242 USA
The srcML toolkit for lightweight transformation and fact-extraction of source code is described. srcML is an XML format for C/C++/Java source code. The open source toolkit that includes the source-to-srcML and srcML-... 详细信息
来源: 评论
A source-level Energy Optimization Framework for Mobile Applications  16
A Source-level Energy Optimization Framework for Mobile Appl...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Li, Xueliang Gallagher, John P. Roskilde Univ Roskilde Denmark IMDEA Software Inst Madrid Spain
Energy efficiency can have a significant influence on user experience of mobile devices such as smartphones and tablets. Although energy is consumed by hardware, software optimization plays an important role in saving... 详细信息
来源: 评论
Deriving Modernity Signatures for PHP Systems with Static analysis  22
Deriving Modernity Signatures for PHP Systems with Static An...
收藏 引用
ieee 22nd International working conference on source code analysis and manipulation (SCAM)
作者: van den Brink, Wouter Gerhold, Marcus Zaytsev, Vadim Univ Twente Tech Comp Sci Enschede Netherlands Univ Twente Formal Methods & Tools Enschede Netherlands
The PHP language has undergone many changes in its syntax and grammar, with respect to both features the language has to offer as well as the distribution of language features used by programmers in their projects. We... 详细信息
来源: 评论
sourceMeter SonarQube plug-in  14
SourceMeter SonarQube plug-in
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Ferenc, Rudolf Lango, Laszlo Siket, Istvan Gyimothy, Tibor Bakota, Tibor Univ Szeged Dept Software Engn H-6720 Szeged Hungary FrontEndART Software Ltd H-6722 Szeged Hungary
The sourceMeter SonarQube plug-in is an extension of SonarQube, an open-source platform for managing code quality made by Sonarsource S.A, Switzerland. The plug-in extends the built-in Java code analysis engine of Son... 详细信息
来源: 评论
Backporting Java 5 code
Backporting Java 5 Code
收藏 引用
9th ieee International working conference on source code analysis and manipulation (SCAM 2009)
作者: Gutzmann, Tobias Steijger, Tamara Vaxjo Univ Sch Math & Syst Engn S-35195 Vaxjo Sweden
Java 5 has introduced a number 4 new syntactical language features that make development faster, easier, and safer. However, at the same time, it has also introduced downward incompatibilities: code written for Java 5... 详细信息
来源: 评论
On The Quality of Identifiers in Test code  19
On The Quality of Identifiers in Test Code
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Lin, Bin Nagy, Csaba Marcus, Andrian Bavota, Gabriele Lanza, Michele Univ Svizzera Italiana USI Software Inst Lugano Switzerland Univ Texas Dallas Richardson TX 75083 USA
Meaningful, expressive identifiers in source code can enhance the readability and reduce comprehension efforts. Over the past years, researchers have devoted considerable effort to understanding and improving the nami... 详细信息
来源: 评论