咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 222 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 216 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
222 条 记 录,以下是71-80 订阅
排序:
An Approach to Software Defect Prediction Combining Semantic Features and Code Changes
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2022年 第9期32卷 1345-1368页
作者: Tao, Chuanqi Wang, Tao Guo, Hongjing Zhang, Jingxuan Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Peoples R China
Software defect prediction (SDP), which predicts defective code regions, can help developers reasonably allocate limited resources for locating bugs and prioritizing their testing efforts. Previous work on defect pred... 详细信息
来源: 评论
DFlow: A data flow analysis tool for C/C plus
收藏 引用
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING 2021年 第12期16卷 1635-1641页
作者: Yan, Qiaoqiao Li, Yongjun Wu, Yuanhao Zhou, Jialong Northwestern Polytech Univ Sch Comp Xian 710072 Shaanxi Peoples R China
.abstract syntax trees (ASTs), control flow graphs (CFGs), and data flow analysis (DFA) are prerequisites for static and dynamic analysis and vulnerability detection for programs;thus, obtaining them is significant. R... 详细信息
来源: 评论
Transforming MPI source code based on communication patterns
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2010年 第1期26卷 147-154页
作者: Preissl, Robert Schulz, Martin Kranzlmueller, Dieter de Supinski, Bronis R. Quinlan, Daniel J. Johannes Kepler Univ Linz GUP Dept Graph & Parallel Proc Linz Austria Lawrence Livermore Natl Lab CASC Comp Sci Grp Livermore CA USA Lawrence Livermore Natl Lab ADEPT Adv Simulat & Comp Program Livermore CA USA Univ Munich Dept Comp Sci Munich Germany Bavarian Acad Sci Leibniz Supercomp Ctr LRZ Garching Germany
A high-level understanding of communication behavior can facilitate performance optimization of HPC applications. In particular, MPI communication patterns can serve as the basis of code transformations that substitut... 详细信息
来源: 评论
Generating Python Mutants From Bug Fixes Using Neural Machine Translation
收藏 引用
IEEE ACCESS 2023年 11卷 85678-85693页
作者: Asik, Sergen Yayan, Ugur Eskisehir Osmangazi Univ Dept Software Engn TR-26040 Eskisehir Turkiye Eskisehir Osmangazi Univ Autonomous Syst & Reliabil Lab TR-26040 Eskisehir Turkiye Eskisehir Osmangazi Univ Intelligent Factory & Robot Lab TR-26040 Eskisehir Turkiye
Due to the fast-paced development of technology, the software has become a crucial aspect of modern life, facilitating the operation and management of hardware devices. Nevertheless, using substandard software can res... 详细信息
来源: 评论
Identifying typical approaches and errors in Prolog programming with argument-based machine learning
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2018年 112卷 110-124页
作者: Mozina, Martin Lazar, Timotej Bratko, Ivan Univ Ljubljana Fac Comp & Informat Sci Vecna Pot 113 Ljubljana 1000 Slovenia
Students learn programming much faster when they receive feedback. However, in programming courses with high student-teacher ratios, it is practically impossible to provide feedback to all homeworks submitted by stude... 详细信息
来源: 评论
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models  22
AST-Probe: Recovering abstract syntax trees from hidden repr...
收藏 引用
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering
作者: José Antonio Hernández López Martin Weyssow Jesús Sánchez Cuadrado Houari Sahraoui Department of Computer Science and Systems University of Murcia Spain DIRO Université de Montréal Canada
The objective of pre-trained language models is to learn contextual representations of textual data. Pre-trained language models have become mainstream in natural language processing and code modeling. Using probes, a... 详细信息
来源: 评论
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2024年 第7期34卷 1135-1171页
作者: Zou, Yifan Wang, Huiqiang Lv, Hongwu Zhao, Shuai Tian, Haoye Harbin Engn Univ Coll Comp Sci & Technol Harbin 150000 Peoples R China Univ Melbourne Grattan St Parkville Vic 3052 Australia
Context: Cross-project defect prediction (CPDP), due to the potential of adaption by industry in realistic scenarios, had gained significant attention from the research community. Currently, existing CPDP studies use ... 详细信息
来源: 评论
SEMI-STRUCTURED CURSOR MOVEMENTS IN MUPE-2
收藏 引用
SOFTWARE ENGINEERING JOURNAL 1989年 第6期4卷 309-320页
作者: MADHAVJI, NH ZHANG, MJ BOULOS, S GU, YX MCGILL UNIV SCH COMP SCIMONTREAL H3A 2A7QUEBECCANADA
It has been recognised that cursor movements on a textual representation of a program present some problems when the movements are based on an underlying abstract syntax tree in a programming system. Approaches taken ... 详细信息
来源: 评论
Automated pattern-directed refactoring for complex conditional statements
收藏 引用
Journal of Central South University 2014年 第5期21卷 1935-1945页
作者: 刘伟 胡志刚 刘宏韬 杨柳 School of Information Science and Engineering Central South University School of Software Central South University
Complex conditional statement is one of the bad code smells, which affects the quality of the code and design of software. In the proposed approach, two commonly-used design patterns for handling complex conditional s... 详细信息
来源: 评论
Proximal Instance Aggregator networks for explainable security vulnerability detection
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2022年 134卷 303-318页
作者: Hariharan, M. Kumar, Sathish C. Tanwar, Anshul Sundaresan, Krishna Ganesan, Prasanna Ravi, Sriram Karthik, R. Cisco Syst Pvt Ltd Bengaluru India Vellore Inst Technol Ctr Cyber Phys Syst Chennai India Vellore Inst Technol Sch Elect Engn Chennai India
Security vulnerabilities in software are the root cause of cyberattacks. Considering that these defects have huge associated costs, they should be proactively detected and resolved before shipping the software. Data-d... 详细信息
来源: 评论