咨询与建议

限定检索结果

文献类型

  • 934 篇 会议
  • 23 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 550 篇 软件工程
    • 414 篇 计算机科学与技术...
    • 133 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 生物工程
    • 12 篇 信息与通信工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 建筑学
    • 1 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 13 篇 生物学
    • 6 篇 化学
    • 5 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 111 篇 software
  • 107 篇 java
  • 102 篇 static analysis
  • 78 篇 source coding
  • 74 篇 open source soft...
  • 57 篇 software systems
  • 54 篇 codes
  • 51 篇 visualization
  • 44 篇 measurement
  • 43 篇 tools
  • 42 篇 task analysis
  • 42 篇 algorithm design...
  • 38 篇 data mining
  • 37 篇 cloning
  • 36 篇 testing
  • 35 篇 libraries
  • 35 篇 software enginee...
  • 35 篇 semantics
  • 34 篇 computer bugs
  • 33 篇 programming

机构

  • 11 篇 vrije univ bruss...
  • 8 篇 delft university...
  • 8 篇 univ szeged dept...
  • 7 篇 delft univ techn...
  • 7 篇 delft university...
  • 7 篇 kent state univ ...
  • 6 篇 queens univ sch ...
  • 6 篇 fraunhofer iem p...
  • 6 篇 univ bern softwa...
  • 5 篇 department of so...
  • 5 篇 software analysi...
  • 5 篇 ucl england
  • 5 篇 eindhoven univer...
  • 5 篇 paderborn univ p...
  • 5 篇 eindhoven univ t...
  • 5 篇 univ akron dept ...
  • 4 篇 department of so...
  • 4 篇 vrije univ bruss...
  • 4 篇 univ saskatchewa...
  • 4 篇 univ bern softwa...

作者

  • 17 篇 de roover coen
  • 10 篇 roy chanchal k.
  • 10 篇 stievenart quent...
  • 10 篇 coen de roover
  • 9 篇 poshyvanyk denys
  • 8 篇 ferenc rudolf
  • 7 篇 inoue katsuro
  • 7 篇 ahmed e. hassan
  • 7 篇 van deursen arie
  • 6 篇 moonen leon
  • 6 篇 bodden eric
  • 6 篇 gyimothy tibor
  • 6 篇 harman mark
  • 6 篇 collard michael ...
  • 6 篇 gall harald c.
  • 6 篇 bram adams
  • 6 篇 zaidman andy
  • 6 篇 quentin stiévena...
  • 6 篇 adams bram
  • 5 篇 serebrenik alexa...

语言

  • 952 篇 英文
  • 6 篇 其他
检索条件"任意字段=IEEE Working Conference on Source Code Analysis and Manipulation"
958 条 记 录,以下是81-90 订阅
排序:
Assessment of source code Obfuscation Techniques  16
Assessment of Source Code Obfuscation Techniques
收藏 引用
16th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Viticchie, Alessio Regano, Leonardo Torchiano, Marco Basile, Cataldo Ceccato, Mariano Tonella, Paolo Tiella, Roberto Politecn Torino Dipartimento Automat & Informat Turin Italy FBK Trento Italy
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscatio... 详细信息
来源: 评论
Parallel Reachability and Escape Analyses
Parallel Reachability and Escape Analyses
收藏 引用
10th ieee working conference on source code analysis and manipulation (SCAM)
作者: Edvinsson, Marcus Lundberg, Jonas Lowe, Welf Linnaeus Univ Sch Comp Sci Phys & Math Vaxjo Sweden
Static program analysis usually consists of a number of steps, each producing partial results. For example, the points-to analysis step, calculating object references in a program, usually just provides the input for ... 详细信息
来源: 评论
A Static code Smell Detector for SQL Queries Embedded in Java code  17
A Static Code Smell Detector for SQL Queries Embedded in Jav...
收藏 引用
ieee 17th International working conference on source code analysis and manipulation (SCAM)
作者: Nagy, Csaba Cleve, Anthony Univ Namur PReCISE Res Ctr Namur Belgium
A database plays a central role in the architecture of an information system, and the way it stores the data delimits its main features. However, it is not just the data that matters. The way it is handled, i.e., how ... 详细信息
来源: 评论
A Comparative Study of code Query Technologies
A Comparative Study of Code Query Technologies
收藏 引用
11th ieee International working conference on source code analysis and manipulation/ieee International conference on Software Maintenance/ieee International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Alves, Tiago L. Hage, Jurriaan Rademaker, Peter Software Improvement Group Netherlands University of Minho Portugal University of Utrecht Netherlands
When analyzing software systems we face the challenge of how to implement a particular analysis for different programming languages. A solution for this problem is to write a single analysis using a code query languag... 详细信息
来源: 评论
When code Smells Twice as Much: Metric-Based Detection of Variability-Aware code Smells  15
When Code Smells Twice as Much: Metric-Based Detection of Va...
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Fenske, Wolfram Schulze, Sandro Meyer, Daniel Saake, Gunter Univ Magdeburg D-39106 Magdeburg Germany TU Braunschweig Braunschweig Germany
code smells are established, widely used characterizations of shortcomings in design and implementation of software systems. As such, they have been subject to intensive research regarding their detection and impact o... 详细信息
来源: 评论
A Value analysis for C programs
A Value Analysis for C programs
收藏 引用
9th ieee International working conference on source code analysis and manipulation (SCAM 2009)
作者: Canet, Geraud Cuoq, Pascal Monate, Benjamin CEA LIST Software Reliabil Labs F-91191 Gif Sur Yvette France
We demonstrate the value analysis of Frama-C. Frama-C is an Open source static analysis framework for the C language. In Frama-C, each static analysis technique, approach or idea can be implemented as a new plug-in, w... 详细信息
来源: 评论
Leveraging Unsupervised Learning to Summarize APIs Discussed in Stack Overflow  21
Leveraging Unsupervised Learning to Summarize APIs Discussed...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Naghshzan, AmirHossein Guerrouj, Latifa Baysal, Olga Ecole Technol Super Montreal PQ Canada Carleton Univ Ottawa ON Canada
Automated source code summarization is a task that generates summarized information about the purpose, usage, and-or implementation of methods and classes to support understanding of these code entities. Multiple appr... 详细信息
来源: 评论
Static Estimation of Test Coverage
Static Estimation of Test Coverage
收藏 引用
9th ieee International working conference on source code analysis and manipulation (SCAM 2009)
作者: Alves, Tiago L. Visser, Joost Univ Minho P-4719 Braga Portugal Software Improvement Grp Amsterdam Netherlands
Test coverage is an important indicator for unit test quality. Tools such as Clover compute coverage by first instrumenting the code with logging functionality, and then logging which parts are executed during unit te... 详细信息
来源: 评论
Cumulative code Churn: Impact on Maintainability  15
Cumulative Code Churn: Impact on Maintainability
收藏 引用
15th ieee International working conference on source code analysis and manipulation (SCAM)
作者: Farago, Csaba Hegedus, Peter Ferenc, Rudolf Univ Szeged Dept Software Engn Szeged Hungary
It is a well-known phenomena that the source code of software systems erodes during development, which results in higher maintenance costs in the long term. But can we somehow narrow down where exactly this erosion ha... 详细信息
来源: 评论
SECUCHECK: Engineering configurable taint analysis for software developers  21
SECUCHECK: Engineering configurable taint analysis for softw...
收藏 引用
21st ieee International working conference on source code analysis and manipulation (SCAM)
作者: Piskachev, Goran Krishnamurthy, Ranjith Bodden, Eric Fraunhofer IEM Paderborn Germany Paderborn Univ Paderborn Germany
Due to its ability to detect many frequently occurring security vulnerabilities, taint analysis is one of the core static analyses used by many static application security testing (SAST) tools. Previous studies have i... 详细信息
来源: 评论