咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 88 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 187 篇 工学
    • 152 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 203 篇 control flow gra...
  • 12 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 193 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
203 条 记 录,以下是91-100 订阅
排序:
Dynamic Slicing of UML Communication Diagram
Dynamic Slicing of UML Communication Diagram
收藏 引用
3rd IEEE International Advance Computing Conference (IACC)
作者: Mishra, Alina Mohapatra, D. P. Panda, Subhrakanta Natl Inst Technol Dept Comp Sci & Engn Rourkela India
We propose a new technique for dynamic slicing of the UML communication models. In this technique, we use UML 2.0 communication diagram for representing the dynamic behavior of the system. First, the communication dia... 详细信息
来源: 评论
Generating Test Data for Path Coverage Based Testing Using Genetic Algorithms  1
收藏 引用
1st International Conference on Internet Computing and Information Communications (ICICIC)
作者: Panda, Madhumita Mohapatra, Durga Prasad Seemanta Engn Coll Dept MCA Mayurbhanj 757086 Odisha India Natl Inst Technol Dept Comp Sci & Engn Rourkela 769008 India
In this paper, we have developed an approach to generate test data for path coverage based testing using genetic algorithm. We have used control flow graph and cyclomatic complexity of the example program to find out ... 详细信息
来源: 评论
Automatic Test Data Generation Based On Multi-Objective Ant Lion Optimization Algorithm  28
Automatic Test Data Generation Based On Multi-Objective Ant ...
收藏 引用
Pattern-Recognition-Association-of-South-Africa-and-Robotics-and-Mechatronics International Conference (PRASA-RobMech)
作者: Singh, Mayank Srivastava, Viranjay M. Gaurav, Kumar Gupta, P. K. Univ KwaZulu Natal Dept Elect Elect & Comp Engn Howard Coll ZA-4041 Durban South Africa Maharaja Surajmal Inst Dept MCA New Delhi 110058 India Jaypee Univ Informat Technol Dept Comp Sci & Engn Solan 173234 India
Automated software testing allows testers and managers for generating the quality of test data during each phase of software development. Path coverage based testing is the most effective technique in structural testi... 详细信息
来源: 评论
A Model Based Approach to Test Case Generation for Testing the Navigation Behavior of Dynamic Web Applications
A Model Based Approach to Test Case Generation for Testing t...
收藏 引用
6th International Conference on Contemporary Computing (IC3)
作者: Bansal, Priti Sabharwal, Sangeeta Netaji Subhas Inst Technol Dept Comp Sci & Informat Technol New Delhi India
In today's world web applications have become increasingly popular which mandates high reliability and high quality of web applications. With the growing complexity of web applications, developing a reliable web a... 详细信息
来源: 评论
Features of Dataflow Processor Emulator Implementing
收藏 引用
LOBACHEVSKII JOURNAL OF MATHEMATICS 2020年 第12期41卷 2614-2620页
作者: Shabanov, B. M. Kuznetsova, E. A. Rybakov, A. A. Russian Acad Sci Joint Supercomp Ctr Sci Res Inst Syst Anal Moscow 119334 Russia
The development of dataflow processor architecture is a promising direction for improving the performance of computing systems. The dataflow processors have several advantages in contrast with the von Neumann architec... 详细信息
来源: 评论
An Heuristic Method for Web-Service Program Security Testing
An Heuristic Method for Web-Service Program Security Testing
收藏 引用
4th ChinaGrid Annual Conference
作者: Zhao, Gang Zheng, Weimin Zhao, Jinjing Chen, Hua Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Beijing Inst Syst Engn Beijing 100101 Peoples R China
The security of the web-service program is a very significant facet in the grid computing envroinment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application... 详细信息
来源: 评论
Predicting Metamorphic Relations for Matrix Calculation Programs  3
Predicting Metamorphic Relations for Matrix Calculation Prog...
收藏 引用
IEEE/ACM 3rd International Workshop on Metamorphic Testing (MET)
作者: Rahman, Karishma Kanewala, Upulee Montana State Univ Bozeman MT 59717 USA
Matrices often represent important information in scientific applications and are involved in performing complex calculations. But systematically testing these applications is hard due to the oracle problem. Metamorph... 详细信息
来源: 评论
Selection of optimal computing platforms through the suitability measure
Selection of optimal computing platforms through the suitabi...
收藏 引用
6th International Symposium on Parallel and Distributed Computing
作者: McMahon, Shean T. Scherson, Isaac D. Phys Opt Corp 20600 Gramercy PlBldg 100 Torrance CA 90501 USA Univ Calif Irvine Irvine CA 92717 USA
Selection of spaceborne computing platforms requires balance among several competing factors. Traditional performance analysis techniques are ill-suited for this purpose due to their overriding concern with runtime. T... 详细信息
来源: 评论
A Survey on Heuristic Malware Detection Techniques
A Survey on Heuristic Malware Detection Techniques
收藏 引用
5th Conference on Information and Knowledge Technology (IKT)
作者: Bazrafshan, Zahra Hashemi, Hashem Fard, Seyed Mehdi Hazrati Hamzeh, Ali Shiraz Univ Dept Comp Sci & Engn Shiraz Iran
Malware is a malicious code which is developed to harm a computer or network. The number of malwares is growing so fast and this amount of growth makes the computer security researchers invent new methods to protect c... 详细信息
来源: 评论
Visualization of Promela with NS-Chart  12
Visualization of Promela with NS-Chart
收藏 引用
12th International Conference on Information and Communication Technology and System (ICTS)
作者: Chawanothai, Arin Vatanawood, Wiwat Chulalongkorn Univ Fac Engn Dept Comp Engn Bangkok Thailand
In the paradigm of model checking, a formal model is considered as one of the crucial sources that tends to be verified with the desired properties. The definition of the formal model should be understandable and clea... 详细信息
来源: 评论