咨询与建议

限定检索结果

文献类型

  • 2,216 篇 会议
  • 480 篇 期刊文献
  • 5 篇 学位论文
  • 2 册 图书
  • 2 篇 科技报告

馆藏范围

  • 2,705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,648 篇 工学
    • 2,419 篇 计算机科学与技术...
    • 2,217 篇 软件工程
    • 213 篇 电气工程
    • 208 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 61 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 37 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 材料科学与工程(可...
    • 18 篇 环境科学与工程(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
  • 489 篇 理学
    • 365 篇 数学
    • 42 篇 统计学(可授理学、...
    • 40 篇 生物学
    • 40 篇 系统科学
    • 38 篇 物理学
    • 17 篇 化学
  • 416 篇 管理学
    • 222 篇 图书情报与档案管...
    • 219 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 122 篇 教育学
    • 122 篇 教育学
  • 30 篇 法学
    • 21 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 24 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,705 篇 java programming...
  • 256 篇 java
  • 45 篇 computer softwar...
  • 33 篇 software
  • 22 篇 codes
  • 21 篇 libraries
  • 19 篇 computer personn...
  • 18 篇 language
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 16 篇 graphical user i...
  • 15 篇 source code
  • 14 篇 runtime
  • 14 篇 analysis program...
  • 14 篇 open source soft...
  • 13 篇 extensible marku...
  • 13 篇 testing
  • 13 篇 computer program...
  • 12 篇 computer program...

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 singapore manage...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of ma...
  • 3 篇 indiana univ dep...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 fox geoffrey
  • 7 篇 damiani ferrucci...
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana

语言

  • 2,503 篇 英文
  • 165 篇 其他
  • 14 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=JAVA programming language"
2705 条 记 录,以下是731-740 订阅
排序:
Finding Security Vulnerabilities in java Web Applications with Test Generation and Dynamic Taint Analysis
Finding Security Vulnerabilities in Java Web Applications wi...
收藏 引用
2nd International Congress on Computer Applications and Computational Science (CACS 2011)
作者: Huang, Yu-Yu Chen, Kung Chiang, Shang-Lung Natl Chengchi Univ Dept Comp Sci Taipei Taiwan
This paper investigates how to combine techniques of static and dynamic analysis for finding security vulnerabilities in java web applications. We present a hybrid analyzer that employs test case generation and dynami... 详细信息
来源: 评论
PROPOSAL FOR EXPANSION OF STASEC TOOL
PROPOSAL FOR EXPANSION OF STASEC TOOL
收藏 引用
20th Telecommunications Forum
作者: Vukovic, Dijana R. Duric, Zoran I. Gligoroski, Danilo Univ Banjoj Luci Elektrotehn Fak Banja LukaPatre 5 Banja Luka Republika Srpsk Bosnia & Herceg Norwegian Univ Sci & Technol Dept Telemat N-7491 Trondheim Norway
Priority in the development of Web applications is the implementation of security mechanisms. In order to detect potential security vulnerabilities and implement appropriate security mechanisms, it is necessary to per... 详细信息
来源: 评论
Scalable Flow-Sensitive Pointer Analysis for java with Strong Updates  12
Scalable Flow-Sensitive Pointer Analysis for Java with Stron...
收藏 引用
26th European Conference on Object-Oriented programming (ECOOP)
作者: De, Arnab D'Souza, Deepak Indian Inst Sci Dept Comp Sci & Automat Bangalore 560012 Karnataka India
The ability to perform strong updates is the main contributor to the precision of flow-sensitive pointer analysis algorithms. Traditional flow-sensitive pointer analyses cannot strongly update pointers residing in the... 详细信息
来源: 评论
An Approach to Manage Semantic Heterogeneity in Unstructured P2P Information Retrieval Systems
An Approach to Manage Semantic Heterogeneity in Unstructured...
收藏 引用
12th IEEE International Conference on Peer-to-Peer Computing (P2P)
作者: Cerqueus, Thomas Cazalens, Sylvie Lamarre, Philippe Univ Nantes LINA UMR 6241 F-44035 Nantes France Univ Nantes LINA UMR 6241 INRIA Sophia F-44035 Nantes France Univ Nantes LINA UMR 6241 INSA Lyon F-69621 Villeurbanne France
In unstructured information retrieval P2P systems, semantic heterogeneity comes from the use of different ontologies. Semantic interoperability refers to the ability of peers to communicate with each others. We take i... 详细信息
来源: 评论
Verification of Snapshot Isolation in Transactional Memory java Programs  12
Verification of Snapshot Isolation in Transactional Memory J...
收藏 引用
26th European Conference on Object-Oriented programming (ECOOP)
作者: Dias, Ricardo J. Distefano, Dino Seco, Joao Costa Lourenco, Joao M. Univ Nova Lisboa CITI P-1200 Lisbon Portugal Queen Mary Univ London London England
This paper presents an automatic verification technique for transactional memory java programs executing under snapshot isolation level. We certify which transactions in a program are safe to execute under snapshot is... 详细信息
来源: 评论
AccessAnalysis - A tool for measuring the appropriateness of access modifiers in java systems
AccessAnalysis - A tool for measuring the appropriateness of...
收藏 引用
2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, SCAM 2012
作者: Zoller, Christian Schmolitzky, Axel Software Engineering and Software Architecture Department of Informatics University of Hamburg Hamburg Germany
Access modifiers allow java developers to define package and class interfaces tailored for different groups of clients. According to the principles of information hiding and encapsulation, the accessibility of types, ... 详细信息
来源: 评论
JATO: Native code atomicity for java  1
收藏 引用
10th Asian Symposium on programming languages and Systems, APLAS 2012
作者: Li, Siliang Liu, Yu David Tan, Gang Department of Computer Science and Engineering Lehigh University United States Department of Computer Science SUNY Binghamton United States
Atomicity enforcement in a multi-threaded application can be critical to the application's safety. In this paper, we take the challenge of enforcing atomicity in a multilingual application, which is developed in m... 详细信息
来源: 评论
ReIm and reiminfer: Checking and inference of reference immutability and method purity
ReIm and reiminfer: Checking and inference of reference immu...
收藏 引用
2012 ACM SIGPLAN Conference on Object-Oriented programming, Systems, languages, and Applications, OOPSLA 2012
作者: Huang, Wei Milanova, Ana Dietl, Werner Ernst, Michael D. Rensselaer Polytechnic Institute Troy NY United States University of Washington Seattle WA United States
Reference immutability ensures that a reference is not used to modify the referenced object, and enables the safe sharing of object structures. A pure method does not cause side-effects on the objects that existed in ... 详细信息
来源: 评论
MOPBox: A library approach to runtime verification
MOPBox: A library approach to runtime verification
收藏 引用
2nd International Conference on Runtime Verification, RV 2011
作者: Bodden, Eric Center for Advanced Security Research Darmstadt Software Technology Group Technische Universität Darmstadt Germany
In this work we propose MOPBox, a library-based approach to runtime verification. MOPBox is a java library for defining and evaluating parametric runtime monitors. A user can define monitors through a simple set of AP... 详细信息
来源: 评论
RefactoringNG: A flexible java refactoring tool  12
RefactoringNG: A flexible Java refactoring tool
收藏 引用
27th Annual ACM Symposium on Applied Computing, SAC 2012
作者: Troníček, Zdeněk Faculty of Information Technology Czech Technical University in Prague Czech Republic
The java programming language and the java API evolve and this evolution certainly will continue in future. Upgrade to a new version of programming language or API is nowadays usually done manually. We describe a new ... 详细信息
来源: 评论