咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 5 篇 会议
  • 3 册 图书
  • 2 篇 学位论文

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 14 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程

主题

  • 21 篇 intermediate cod...
  • 3 篇 compiler
  • 3 篇 program
  • 2 篇 file
  • 2 篇 mezikód
  • 2 篇 native code
  • 2 篇 cobol
  • 2 篇 pic
  • 2 篇 command
  • 2 篇 level
  • 2 篇 code
  • 2 篇 data
  • 1 篇 mit-lcs-tr-709
  • 1 篇 extensions
  • 1 篇 mothra
  • 1 篇 raw machine
  • 1 篇 compilers
  • 1 篇 stack
  • 1 篇 code generator
  • 1 篇 cursor

机构

  • 2 篇 brno university ...
  • 1 篇 micro focus limi...
  • 1 篇 department of co...
  • 1 篇 huawei technol c...
  • 1 篇 hong kong polyte...
  • 1 篇 chinese acad sci...
  • 1 篇 rajagiri sch eng...
  • 1 篇 queens univ dept...
  • 1 篇 chongqing univ s...
  • 1 篇 clemson univ dep...
  • 1 篇 inner mongolia u...
  • 1 篇 macau univ sci &...
  • 1 篇 pusan natl univ ...
  • 1 篇 elect & telecomm...
  • 1 篇 univ chinese aca...
  • 1 篇 jaypee inst info...
  • 1 篇 chalmers univ te...
  • 1 篇 arsycom bv kabel...
  • 1 篇 department of co...
  • 1 篇 florida state un...

作者

  • 1 篇 zhang tao
  • 1 篇 wei renzheng
  • 1 篇 bae jung ho
  • 1 篇 kim tae yeon
  • 1 篇 mahalingam p. r.
  • 1 篇 chanson samuel t...
  • 1 篇 du gewangzi
  • 1 篇 gao guanglai
  • 1 篇 wu tongshuai
  • 1 篇 horník jakub
  • 1 篇 fang sen
  • 1 篇 jones dw
  • 1 篇 offutt aj
  • 1 篇 luo xiapu
  • 1 篇 goel ankur
  • 1 篇 unnikrishnan c.
  • 1 篇 agarwal rakesh k...
  • 1 篇 mennie al
  • 1 篇 woo gyun
  • 1 篇 kim won-young

语言

  • 20 篇 英文
  • 1 篇 其他
检索条件"主题词=Intermediate code"
21 条 记 录,以下是1-10 订阅
排序:
Vulnerability Localization Based On intermediate code Representation and Feature Fusion
收藏 引用
COMPUTER JOURNAL 2024年 第9期67卷 2749-2762页
作者: Zhu, Chenguang Wei, Renzheng Chen, Liwei Wu, Tongshuai Du, Gewangzi Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing 100095 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Huawei Technol Co Ltd Beijing Res Inst Beijing 100095 Peoples R China
Vulnerability localization can assist security professionals in vulnerability validation and analysis. This study proposes an intelligent vulnerability localization method based on fine-grained program representation ... 详细信息
来源: 评论
Java code Clone Detection by Exploiting Semantic and Syntax Information From intermediate code-Based Graph
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2023年 第2期72卷 511-526页
作者: Yuan, Dawei Fang, Sen Zhang, Tao Xu, Zhou Luo, Xiapu Macau Univ Sci & Technol Sch Comp Sci & Engn Taipa 999078 Macao Peoples R China Chongqing Univ Sch Big Data & Software Engn Chongqing 400030 Peoples R China Hong Kong Polytech Univ Dept Comp Hong Kong Peoples R China
code clone detection plays a critical role in the field of software engineering. To achieve this goal, developers are required to have rich development experience for finding the "functional" clone code. How... 详细信息
来源: 评论
INFORMATION-FLOW CERTIFICATION USING AN intermediate code PROGRAM REPRESENTATION
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1981年 第6期7卷 594-607页
作者: MENNIE, AL MACEWEN, GH ANDYNE COMP LTD KINGSTONONTARIOCANADA QUEENS UNIV DEPT COMP & INFORMAT SCIKINGSTON K7L 3N6ONTARIOCANADA
Control of information flow is one of the issues in the area of computer and data security. A mechanism has been devised to supply control at compile time that will certify that all objects a program wishes to access... 详细信息
来源: 评论
USING PEEPHOLE OPTIMIZATION ON intermediate code
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1982年 第1期4卷 21-36页
作者: TANENBAUM, AS VANSTAVEREN, H STEVENSON, JW Department of Mathematics Vrije Universiteit Postbus 7161 1007 MC Amsterdam The Netherlands Department of Mathematics Vrije Universiteit Postbus 7161 1007 MC Amsterdam The Netherlands Arsycom BV Kabelweg 43 Amsterdam The Netherlands
Many portable compilers generate an intermediate code that is subsequently translated into the target machine's assembly language. In this paper a stack-machine-based intermediate code suitable for algebraic langu... 详细信息
来源: 评论
A FORTRAN LANGUAGE SYSTEM FOR MUTATION-BASED SOFTWARE TESTING
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1991年 第7期21卷 685-718页
作者: KING, KN OFFUTT, AJ CLEMSON UNIV DEPT COMP SCI CLEMSON SC 29631 USA
Mutation analysis is a powerful technique for testing software systems. The Mothra software testing project uses mutation analysis as the basis for an integrated software testing environment. Mutation analysis require... 详细信息
来源: 评论
An automated approach to reducing test suites for testing retargeted C compilers for embedded systems
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2011年 第12期84卷 2053-2064页
作者: Chae, Heung Seok Woo, Gyun Kim, Tae Yeon Bae, Jung Ho Kim, Won-Young Pusan Natl Univ Dept Comp Sci & Engn Pusan 609735 South Korea Elect & Telecommun Res Inst Taejon 305700 South Korea
With widespread use of embedded processors, there is an increasing need to develop compilers for them in a timely manner. Retargeting has been an effective approach to constructing new compilers by modifying the back-... 详细信息
来源: 评论
code GENERATION WITH A RECURSIVE OPTIMIZER
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1980年 第5期10卷 393-403页
作者: STEVENSON, G Micro Focus Limited 58 Acacia Road London NW8 6AG U.K.
This paper describes a general purpose optimizer used to construct a new code generator for an existing Coral 66 compiler. The optimizer is recursive and gives the one pass code generator some of the advantages of a m... 详细信息
来源: 评论
A COMPUTER ARCHITECTURE SUITED TO MULTIPLEX WIRING SYSTEMS IN CARS
MICROPROCESSING AND MICROPROGRAMMING
收藏 引用
MICROPROCESSING AND MICROPROGRAMMING 1987年 第1期19卷 1-4页
作者: JOHANSSON, LT CHALMERS UNIV TECHNOL DEPT COMP TECHNOLS-41296 GOTHENBURGSWEDEN
The system level architecture for a computer system of the Local Area Network type is described. The system designed is intended to implement Multiplex Wiring systems in cars. It is realized with a large number of rom... 详细信息
来源: 评论
Algorithm Classification Using Worst-Case Execution Time
Algorithm Classification Using Worst-Case Execution Time
收藏 引用
2nd IEEE International Conference on Computer Science and Information Technology
作者: Mehrotra, Mudit Goel, Ankur Agarwal, Nipun Bindu, M. Hima Sharma, Bhudev Jaypee Inst Informat Technol Univ Dept Comp Sci & Engn Noida India
Problems in computer science require some time to produce an output. Some can be executed in few seconds or minutes. Others require hours, days or even centuries to produce an output. In this paper, we propose a techn... 详细信息
来源: 评论
Transforming procedural code for streaming environments  25
Transforming procedural code for streaming environments
收藏 引用
25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
作者: Brabec, Michal Bednarek, David Charles Univ Prague Dept Software Engn Prague Czech Republic
Streaming environments and similar parallel platforms are widely used in image, signal, or general data processing as a means of achieving high performance. Unfortunately, they are often associated with specific progr... 详细信息
来源: 评论