咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 222 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 216 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
222 条 记 录,以下是101-110 订阅
排序:
Mining Patterns from Genetic Improvement Experiments  6
Mining Patterns from Genetic Improvement Experiments
收藏 引用
IEEE/ACM 6th International Workshop on Genetic Improvement (GI@ICSE)
作者: Krauss, Oliver Mossenbock, Hanspeter Affenzeller, Michael Johannes Kepler Univ Linz Linz Austria Univ Appl Sci Upper Austria Wels Austria
When conducting genetic improvement experiments, a large amount of individuals (approximate to population size * generations) is created and evaluated. The corresponding experiments contain valuable data concerning th... 详细信息
来源: 评论
KNOD: Domain Knowledge Distilled tree Decoder for Automated Program Repair  23
KNOD: Domain Knowledge Distilled Tree Decoder for Automated ...
收藏 引用
45th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Jiang, Nan Lutellier, Thibaud Lou, Yiling Tan, Lin Goldwasser, Dan Zhang, Xiangyu Purdue Univ W Lafayette IN 47907 USA Univ Alberta Edmonton AB Canada Fudan Univ Shanghai Peoples R China
Automated Program Repair (APR) improves software reliability by generating patches for a buggy program automatically. Recent APR techniques leverage deep learning (DL) to build models to learn to generate patches from... 详细信息
来源: 评论
Codewebs: Scalable Homework Search for Massive Open Online Programming Courses  14
Codewebs: Scalable Homework Search for Massive Open Online P...
收藏 引用
23rd International Conference on World Wide Web (WWW)
作者: Nguyen, Andy Piech, Christopher Huang, Jonathan Guibas, Leonidas Stanford Univ Stanford CA 94305 USA
Massive open online courses (MOOCs), one of the latest internet revolutions have engendered hope that constant iterative improvement and economies of scale may cure the "cost disease" of higher education. Wh... 详细信息
来源: 评论
Test coverage analysis for Object Oriented programs - Structural testing through Aspect Oriented instrumentation
Test coverage analysis for Object Oriented programs - Struct...
收藏 引用
2nd International Conference on Software and Data Technologies
作者: Baldini, Fabrizio Bucci, Giacomo Grassi, Leonardo Vicario, Enrico Univ Florence Dept Sistemi & Informat I-50139 Florence Italy
The introduction of Object Oriented Technologies in test centered processes has emphasized the importance of finding new methods for software verification. Testing metrics and practices, developed for structured progr... 详细信息
来源: 评论
Cross-language Source Code Clone Detection Based On Graph Neural Network  24
Cross-language Source Code Clone Detection Based On Graph Ne...
收藏 引用
3rd International Conference on Cryptography, Network Security and Communication Technology (CNSCT)
作者: Zhang, Yuguo Yang, Jia Ruan, Ou Hubei Univ Technol Wuhan Hubei Peoples R China
Code clone detection has important applications in the security field, including vulnerability mining and recovery, malware detection, and copyright protection. Currently, clone detection in a single programming langu... 详细信息
来源: 评论
JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG
JSAC: A Novel Framework to Detect Malicious JavaScript via C...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Jiang, Hongliang Yang, Yuxing Sun, Lu Jiang, Lin Beijing Univ Posts & Telecommun Scool Comp Sci Beijing Peoples R China
JavaScript (JS) is a dominant programming language in web/mobile development, while it is also notoriously abused by attackers due to its powerful characteristics, e.g., dynamic, prototype-based and multi-paradigm, wh... 详细信息
来源: 评论
Python Source Code De-Anonymization Using Nested Bigrams  18
Python Source Code De-Anonymization Using Nested Bigrams
收藏 引用
18th IEEE International Conference on Data Mining Workshops (ICDMW)
作者: Hozhabrierdi, Pegah Hitos, Dunai Fuentes Mohan, Chilukuri K. Syracuse Univ Dept EECS Syracuse NY 13244 USA Matilock Inc Huelva Spain
An important issue in cybersecurity is the insertion or modification of code by individuals other than the original authors of the code. This motivates research on authorship attribution of unknown source code. We hav... 详细信息
来源: 评论
Low-Complexity Code Clone Detection using Graph-based Neural Networks  18
Low-Complexity Code Clone Detection using Graph-based Neural...
收藏 引用
18th IEEE International Conference on Mobility, Sensing and Networking (MSN)
作者: Liu, Hu Zhao, Hui Han, Changhao Hou, Lu Beijing Univ Posts & Telecommun Intelligent Comp & Commun Lab Key Lab Univ Wireless Commun Beijing 100876 Peoples R China
Code clone detection is of great significance for intellectual property protection and software maintenance. Deep learning has been applied in some research and achieved better performance than traditional methods. To... 详细信息
来源: 评论
A Framework for Scanning Privacy Information based on Static Analysis  22
A Framework for Scanning Privacy Information based on Static...
收藏 引用
22nd IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Zhao, Yuan Yi, Gaolei Liu, Fan Hui, Zhanwei Zhao, Jianhua Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China Mil Acad Sci Beijing Peoples R China
Modern software brings many conveniences to users through big data, but it also risks privacy leakage. In recent years, privacy leaks have been frequent, and various countries have introduced privacy protection bills ... 详细信息
来源: 评论
Interactive Characterization of A Code Pattern  13
Interactive Characterization of A Code Pattern
收藏 引用
13th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SoMeT)
作者: Nakayama, Ken Sakai, Eko Kobayakawa, Michihiro Tsuda Coll Kodaira Tokyo 1878577 Japan Otani Univ Kyoto Japan Tokyo Metropolitan Coll Ind Technol Tokyo Japan
There are semantic chunks and relations (code patterns) of various granularities in source code. Since a code pattern is closely tied to a unit of understanding by a programmer, searching specific code pattern through... 详细信息
来源: 评论