咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 20 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
  • 5 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 26 篇 control flow gra...
  • 3 篇 node splitting
  • 3 篇 compilation
  • 2 篇 compiler optimiz...
  • 2 篇 program analysis
  • 2 篇 reducibility
  • 2 篇 instruction-leve...
  • 2 篇 irreducibility
  • 2 篇 object-oriented ...
  • 2 篇 malware detectio...
  • 2 篇 convolutional ne...
  • 2 篇 software defect ...
  • 1 篇 global register ...
  • 1 篇 electromagnetic ...
  • 1 篇 cyber security
  • 1 篇 hyper-operation
  • 1 篇 permission contr...
  • 1 篇 program analysis...
  • 1 篇 compilers
  • 1 篇 firefly algorith...

机构

  • 1 篇 ist austria klos...
  • 1 篇 ferdowsi univ ma...
  • 1 篇 thiagarajar coll...
  • 1 篇 univ melbourne d...
  • 1 篇 lawrence livermo...
  • 1 篇 mahallat inst hi...
  • 1 篇 dartmouth coll h...
  • 1 篇 open univ nether...
  • 1 篇 gazi univ fac en...
  • 1 篇 univ saarland d-...
  • 1 篇 nasa ames res ct...
  • 1 篇 shanghai jiao to...
  • 1 篇 delft univ techn...
  • 1 篇 le quy don tech ...
  • 1 篇 virginia tech bl...
  • 1 篇 [a]data processi...
  • 1 篇 rvs coll engn de...
  • 1 篇 saudi aramco cor...
  • 1 篇 penn state univ ...
  • 1 篇 kaunas univ tech...

作者

  • 2 篇 cybenko george
  • 1 篇 peng hao
  • 1 篇 shar lwin khin
  • 1 篇 raz gil
  • 1 篇 stuckey peter j.
  • 1 篇 rajnish kumar
  • 1 篇 atici mehmet ali
  • 1 篇 bhattacharjee va...
  • 1 篇 tun yan naing
  • 1 篇 nitish kumar
  • 1 篇 bichhawat abhish...
  • 1 篇 henriques pedro ...
  • 1 篇 alotaibi saud s.
  • 1 篇 malviya vikas k.
  • 1 篇 xynyn ailys tee
  • 1 篇 devkota sabin
  • 1 篇 janssen johan
  • 1 篇 zhong ming
  • 1 篇 ji shouling
  • 1 篇 isaacs katherine...

语言

  • 25 篇 英文
  • 1 篇 中文
检索条件"主题词=Control Flow Graphs"
26 条 记 录,以下是21-30 订阅
排序:
Fine-Grained In-Context Permission Classification for Android Apps using control-flow Graph Embedding  38
Fine-Grained In-Context Permission Classification for Androi...
收藏 引用
38th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Malviya, Vikas K. Tun, Yan Naing Leow, Chee Wei Xynyn, Ailys Tee Shar, Lwin Khin Jiang, Lingxiao Singapore Management Univ Singapore Singapore
Android is the most popular operating system for mobile devices nowadays. Permissions are a very important part of Android security architecture. Apps frequently need the users' permission, but many of them only a... 详细信息
来源: 评论
controlled node splitting  6th
收藏 引用
Proceedings of the 6th International Conference on Compiler Construction, CC'96
作者: Janssen, Johan Corporaal, Henk Delft University of Technology Department of Electrical Engineering Section Computer Architecture and Digital Systems 2600 GA Delft 5031 Netherlands
To exploit instruction level parallelism in programs over multiple basic blocks, programs should have reducible control flow graphs. However not all programs satisfy this property. A new method, called controlled Node... 详细信息
来源: 评论
Regression coefficients as triad scale for malware detection
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2021年 90卷 106886-106886页
作者: Alotaibi, Saud S. Umm Al Qura Univ Coll Comp & Informat Syst Dept Informat Syst Mecca Saudi Arabia
The malware detection methods are classified into two categories, namely, dynamic analysis (active analysis) and static analysis (passive analysis). These methods undergo unusual obstruction, and challenges that are p... 详细信息
来源: 评论
An algorithm for tracing live variables based on a straightened program graph
收藏 引用
International journal of computer mathematics 1975年 第1-4期5卷 97-108页
作者: J. C. Beatty [a]Data Processing Product Group International Business Machines Corp. P.O. Box 390 South Road Poughkeepsie N.Y. 12602 U.S.A.
An algorithm is given for finding where the variables of a program are active or live. While the algorithm is modeled after that of Kennedy, it is based on the flow graph straightening procedure of Earnest, Balke, and... 详细信息
来源: 评论
Scalable Source Code Similarity Detection in Large Code Repositories
收藏 引用
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS 2019年 第22期6卷 1-11页
作者: Alomari, Firas Harbi, Muhammed Saudi Aramco Corp Applicat Dept Dhahran Saudi Arabia
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in ... 详细信息
来源: 评论
Automatic test data generator: A tool based on search-based techniques
Automatic test data generator: A tool based on search-based ...
收藏 引用
International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Ruchika Malhotra Poornima Nitish Kumar Department of Computer Science Delhi Technological University Shahbad Daulatpur Bawana Road New Delhi
Software Testing is the most time consuming activity in the software development lifecycle. It is impossible to test everything. Hence, several automated test data generation techniques have been introduced in recent ... 详细信息
来源: 评论