咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 40 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 111 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 103 篇 工学
    • 74 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 26 篇 电气工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 1 篇 网络空间安全
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 数学

主题

  • 111 篇 program dependen...
  • 22 篇 program slicing
  • 12 篇 dynamic slicing
  • 11 篇 static slicing
  • 9 篇 control flow gra...
  • 6 篇 program slice
  • 5 篇 program debuggin...
  • 5 篇 data dependence
  • 4 篇 refactoring
  • 4 篇 software mainten...
  • 4 篇 system dependenc...
  • 3 篇 concurrent progr...
  • 3 篇 noninterference
  • 3 篇 information flow...
  • 3 篇 clone detection
  • 3 篇 path condition
  • 3 篇 abstract syntax ...
  • 3 篇 software securit...
  • 3 篇 control dependen...
  • 3 篇 automatic parall...

机构

  • 6 篇 indian inst tech...
  • 3 篇 rochester inst t...
  • 2 篇 princeton univ p...
  • 2 篇 univ tokushima g...
  • 2 篇 univ tokushima d...
  • 2 篇 univ karlsruhe t...
  • 2 篇 fernuniversitat ...
  • 2 篇 vrije univ bruss...
  • 2 篇 institute of inf...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 linköping univer...
  • 1 篇 osaka univ grad ...
  • 1 篇 amer univ beirut...
  • 1 篇 univ wisconsin d...
  • 1 篇 department of el...
  • 1 篇 telecom paristec...
  • 1 篇 near east univ a...
  • 1 篇 univ sci & techn...
  • 1 篇 zhejiang univ co...

作者

  • 5 篇 mall r
  • 5 篇 snelting gregor
  • 4 篇 marin victor j.
  • 4 篇 de roover coen
  • 4 篇 rivero carlos r.
  • 2 篇 inoue k
  • 2 篇 ben brahim ghass...
  • 2 篇 de koster joeri
  • 2 篇 kurmangaleev sha...
  • 2 篇 shimomura t
  • 2 篇 zhioua zeineb
  • 2 篇 avetisyan arutyu...
  • 2 篇 hajj hazem
  • 2 篇 krinke j
  • 2 篇 chung is
  • 2 篇 adaimy ralph
  • 2 篇 de meuter wolfga...
  • 2 篇 mund gb
  • 2 篇 oh taewook
  • 2 篇 zhang xj

语言

  • 105 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Dependence Graph"
111 条 记 录,以下是31-40 订阅
排序:
Tracking Dependent Information Flows  3
Tracking Dependent Information Flows
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Zhioua, Zeineb Roudier, Yves Ameur, Rabea Boulifa Kechiche, Takoua Short, Stuart EURECOM SAP Labs France Mougins France Univ Nice Sophia Antipolis CNRS I3S Biot France Telecom ParisTech Biot France SAP Labs France Mougins France
Ensuring the compliance of developed software with security requirements is a challenging task due to imprecision on the security guidelines definition, and to the lack of automatic and formal means to lead this verif... 详细信息
来源: 评论
CCSharp: An Efficient Three-phase Code Clone Detector Using Modified PDGs  24
CCSharp: An Efficient Three-phase Code Clone Detector Using ...
收藏 引用
24th Asia-Pacific Software Engineering Conference (APSEC)
作者: Wang, Min Wang, Pengcheng Xu, Yun Univ Sci & Technol China Sch Comp Sci Hefei 230027 Anhui Peoples R China Natl Univ Def Technol Lab High Performance Comp Anhui Prov Changsha 410073 Hunan Peoples R China Natl Univ Def Technol Collaborat Innovat Ctr High Performance Comp Changsha 410073 Hunan Peoples R China
Detecting code clones in software systems is becoming more and more important with the blossom of open source projects. In spite of numerous active researches, there is still a lack of detecting clones especially high... 详细信息
来源: 评论
A Collaborative dependence Analysis Framework
A Collaborative Dependence Analysis Framework
收藏 引用
IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
作者: Johnson, Nick P. Fix, Jordan Beard, Stephen R. Oh, Taewook Jablin, Thomas B. August, David I. Princeton Univ Princeton NJ 08544 USA UIUC Multicoreware Princeton NJ USA
Compiler optimizations discover facts about program behavior by querying static analysis. However, developing or extending precise analysis is difficult. Some prior works implement analysis with a single algorithm, bu... 详细信息
来源: 评论
Security-by-construction in web applications development via database annotations
收藏 引用
COMPUTERS & SECURITY 2016年 59卷 151-165页
作者: El-Hajj, Wassim Ben Brahim, Ghassen Hajj, Hazem Safa, Haidar Adaimy, Ralph Amer Univ Beirut Dept Comp Sci Beirut Lebanon Prince Mohammad Bin Fahd Univ Dept Comp Sci Riyadh Saudi Arabia Amer Univ Beirut Dept Elect & Comp Engn Beirut Lebanon
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can ha... 详细信息
来源: 评论
Measuring Source Code Similarity by Finding Similar Subgraph with an Incremental Genetic Algorithm  16
Measuring Source Code Similarity by Finding Similar Subgraph...
收藏 引用
Genetic and Evolutionary Computation Conference (GECCO)
作者: Kim, Jinhyun Choi, HyukGeun Yun, Hansang Moon, Byung-Ro Seoul Natl Univ Sch Comp Sci & Engn 1 Gwanak Ro Seoul 151744 South Korea
Measuring similarity between source codes has lots of applications, such as code plagiarism detection, code clone detection, and malware detection. A variety of methods for the measurement have been developed and prog... 详细信息
来源: 评论
Exploring and Enforcing Security Guarantees via program dependence graphs  15
Exploring and Enforcing Security Guarantees via Program Depe...
收藏 引用
36th ACM SIGPLAN Conference on programming Language Design and Implementation
作者: Johnson, Andrew Waye, Lucas Moore, Scott Chong, Stephen MIT Lincoln Lab Cambridge MA 02139 USA Harvard Univ Cambridge MA 02138 USA
We present PIDGIN, a program analysis and understanding tool that enables the specification and enforcement of precise application-specific information security guarantees. PIDGIN also allows developers to interactive... 详细信息
来源: 评论
RELIABILITY ANALYSIS OF TEST CASES FOR program SLICING  1
RELIABILITY ANALYSIS OF TEST CASES FOR PROGRAM SLICING
收藏 引用
1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)
作者: Negi, Gaurav Elias, Eldo Kohli, Rashi Bibhu, Vimal Dr APJ AKTU CSE Dept Lucknow Uttar Pradesh India Amity Univ CSE Dept Greater Noida India
The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program, The slicing criterion refers to the slice that is likely to ... 详细信息
来源: 评论
A Survey of Loop Parallelization: Models, Approaches, and Recent Developments
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING 2016年 第11期9卷 143-156页
作者: Yao, Hong Deng, Huifang Zou, Caifeng South China Univ Technol Sch Comp Sci & Engn Guangzhou 510006 Guangdong Peoples R China
In cloud computing era, automatic parallelization is still significant for virtualization platform. However, after several decades of development, the overall effect is still to be improved. Summary of the mainstream ... 详细信息
来源: 评论
dependence-driven delimited CPS transformation for JavaScript
收藏 引用
ACM SIGPLAN Notices 2016年 第3期52卷 59-69页
作者: Philips, Laure De Koster, Joeri De Meuter, Wolfgang De Roover, Coen Software Languages Lab Vrije Universiteit Brussel Belgium
In today's web applications asynchronous requests to remote services using callbacks or futures are omnipresent. The continuation of such a non-blocking task is represented as a callback function that will later b... 详细信息
来源: 评论
A new algorithm for low-deterministic security
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2015年 第3期14卷 263-287页
作者: Giffhorn, Dennis Snelting, Gregor Karlsruhe Inst Technol D-76021 Karlsruhe Germany
We present a new algorithm for checking probabilistic noninterference in concurrent programs. The algorithm, named RLSOD, is based on the Low-Security Observational Determinism criterion. It utilizes program dependenc... 详细信息
来源: 评论