咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是71-80 订阅
排序:
Recommending Insightful Comments for source code using Crowdsourced Knowledge  15
Recommending Insightful Comments for Source Code using Crowd...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Rahman, Mohammad Masudur Roy, Chanchal K. Keivanloo, Iman Univ Saskatchewan Saskatoon SK S7N 0W0 Canada Queens Univ Kingston ON K7L 3N6 Canada
Recently, automatic code comment generation is proposed to facilitate program comprehension. Existing code comment generation techniques focus on describing the functionality of the source code. However, there are oth... 详细信息
来源: 评论
On the Use of Context in Recommending Exception Handling code Examples  14
On the Use of Context in Recommending Exception Handling Cod...
收藏 引用
14th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Rahman, Mohammad Masudur Roy, Chanchal K. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 0W0 Canada
Studies show that software developers often either misuse exception handling features or use them inefficiently, and such a practice may lead an undergoing software project to a fragile, insecure and non-robust applic... 详细信息
来源: 评论
JSNOSE: Detecting JavaScript code Smells
JSNOSE: Detecting JavaScript Code Smells
收藏 引用
13th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Fard, Amin Milani Mesbah, Ali Univ British Columbia Vancouver BC V5Z 1M9 Canada
JavaScript is a powerful and flexible prototype-based scripting language that is increasingly used by developers to create interactive web applications. The language is interpreted, dynamic, weakly-typed, and has firs... 详细信息
来源: 评论
The Strengths and Behavioral Quirks of Java Bytecode Decompilers  19
The Strengths and Behavioral Quirks of Java Bytecode Decompi...
收藏 引用
19th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Harrand, Nicolas Soto-Valero, Cesar Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol Stockholm Sweden
During compilation from Java source code to byte-code, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not symmetric. Consequently, the decompilation process, which... 详细信息
来源: 评论
Graal: The Quest for source code Knowledge  18
Graal: The Quest for Source Code Knowledge
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Cosentino, Valerio Duenas, Santiago Zerouali, Ahmed Robles, Gregorio Gonzalez-Barahona, Jesus M. Bitergia Madrid Spain Univ Rey Juan Carlos Madrid Spain
source code analysis tools are designed to analyze code artifacts with different intents, which span from improving the quality and security of the software to easing refactoring and reverse engineering activities. Ho... 详细信息
来源: 评论
Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact analysis  16
Augur: Incorporating Hidden Dependencies and Variable Granul...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Sharma, Tushar Suryanarayana, Girish Athens Univ Econ & Business Dept Management Sci & Technol Athens Greece Siemens Technol & Serv Pvt Ltd Corp Res & Technol Ctr Bangalore Karnataka India
Software change impact analysis (CIA) methods enable developers to understand potential impacts of a code change so that the change can be executed confidently without affecting reliability of the software. However, e... 详细信息
来源: 评论
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries  18
Obfuscating Java Programs by Translating Selected Portions o...
收藏 引用
18th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Pizzolotto, Davide Ceccato, Mariano Fdn Bruno Kessler Trento Italy Univ Trento Trento Italy
code obfuscation is a popular approach to turn program comprehension and analysis harder, with the aim of mitigating threats related to malicious reverse engineering and code tampering. However, programming languages ... 详细信息
来源: 评论
Analyzing the Effect of Preprocessor Annotations on code Clones
Analyzing the Effect of Preprocessor Annotations on Code Clo...
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Schulze, Sandro Juergens, Elmar Feigenspan, Janet Univ Magdeburg D-39106 Magdeburg Germany Tech Univ Munich Munich Germany
The C preprocessor cpp is a powerful and language-independent tool, widely used to implement variable software in different programming languages (C, C++) using conditional compilation. Preprocessor annotations can us... 详细信息
来源: 评论
Transforming C++11 code to C++03 to Support Legacy Compilation Environments  16
Transforming C++11 Code to C++03 to Support Legacy Compilati...
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Antal, Gabor Havas, David Siket, Istvan Beszedes, Arpad Ferenc, Rudolf Mihalicza, Jozsef Univ Szeged Dept Software Engn Szeged Hungary NNG LLC Budapest Hungary
Newer technologies - programming languages, environments, libraries - change very rapidly. However, various internal and external constraints often prevent projects from quickly adopting to these changes. Customers ma... 详细信息
来源: 评论
Subclass Instantiation Distribution
Subclass Instantiation Distribution
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Wheeler, Amy Binkley, Dave Loyola Univ Maryland Baltimore MD 21210 USA
During execution, an objected-oriented program typically creates a large number of objects. This research considers the distribution of those objects that share a common superclass. If this distribution is uniform the... 详细信息
来源: 评论