咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 41 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 104 篇 工学
    • 75 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 26 篇 电气工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 1 篇 网络空间安全
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 数学

主题

  • 112 篇 program dependen...
  • 22 篇 program slicing
  • 12 篇 dynamic slicing
  • 11 篇 static slicing
  • 9 篇 control flow gra...
  • 6 篇 data dependence
  • 6 篇 program slice
  • 5 篇 program debuggin...
  • 4 篇 refactoring
  • 4 篇 control dependen...
  • 4 篇 software mainten...
  • 4 篇 system dependenc...
  • 3 篇 concurrent progr...
  • 3 篇 noninterference
  • 3 篇 information flow...
  • 3 篇 clone detection
  • 3 篇 path condition
  • 3 篇 abstract syntax ...
  • 3 篇 software securit...
  • 3 篇 automatic parall...

机构

  • 6 篇 indian inst tech...
  • 3 篇 rochester inst t...
  • 2 篇 princeton univ p...
  • 2 篇 univ tokushima g...
  • 2 篇 univ tokushima d...
  • 2 篇 univ karlsruhe t...
  • 2 篇 fernuniversitat ...
  • 2 篇 vrije univ bruss...
  • 2 篇 institute of inf...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 linköping univer...
  • 1 篇 osaka univ grad ...
  • 1 篇 amer univ beirut...
  • 1 篇 univ wisconsin d...
  • 1 篇 department of el...
  • 1 篇 telecom paristec...
  • 1 篇 near east univ a...
  • 1 篇 univ sci & techn...
  • 1 篇 zhejiang univ co...

作者

  • 5 篇 mall r
  • 5 篇 snelting gregor
  • 4 篇 marin victor j.
  • 4 篇 de roover coen
  • 4 篇 rivero carlos r.
  • 2 篇 inoue k
  • 2 篇 ben brahim ghass...
  • 2 篇 de koster joeri
  • 2 篇 kurmangaleev sha...
  • 2 篇 shimomura t
  • 2 篇 zhioua zeineb
  • 2 篇 avetisyan arutyu...
  • 2 篇 hajj hazem
  • 2 篇 krinke j
  • 2 篇 chung is
  • 2 篇 adaimy ralph
  • 2 篇 de meuter wolfga...
  • 2 篇 mund gb
  • 2 篇 oh taewook
  • 2 篇 zhang xj

语言

  • 106 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Dependence Graph"
112 条 记 录,以下是41-50 订阅
排序:
Optimization of Business Processes in Service Oriented Architecture
Optimization of Business Processes in Service Oriented Archi...
收藏 引用
16th IEEE International Enterprise Distributed Object Computing Conference (EDOC)
作者: Ratkowski, Andrzej Sacha, Krzysztof Zalewski, Andrzej Warsaw Univ Technol Warsaw Poland
This paper describes a method for the implementation and optimization of business processes in a service oriented architecture (SOA). A process specification is created by business people, and expressed in Business Pr... 详细信息
来源: 评论
Formal Specification and Verification of Security Guidelines  22
Formal Specification and Verification of Security Guidelines
收藏 引用
IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)
作者: Zhioua, Zeineb Roudier, Yves Ameur, Rabea Boulifa SAP Labs France EURECOM Mougins France Univ Nice Sophia Antipolis I3S CNRS Nice France Telecom ParisTech Paris France
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, w... 详细信息
来源: 评论
Untangling Composite Commits Using program Slicing  18
Untangling Composite Commits Using Program Slicing
收藏 引用
18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
作者: Muylaert, Ward De Roover, Coen Vrije Univ Brussel Software Languages Lab Brussels Belgium
Composite commits are a common mistake in the use of version control software. A composite commit groups many unrelated tasks, rendering the commit difficult for developers to understand, revert, or integrate and for ... 详细信息
来源: 评论
Tracking Dependent Information Flows  3
Tracking Dependent Information Flows
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Zhioua, Zeineb Roudier, Yves Ameur, Rabea Boulifa Kechiche, Takoua Short, Stuart EURECOM SAP Labs France Mougins France Univ Nice Sophia Antipolis CNRS I3S Biot France Telecom ParisTech Biot France SAP Labs France Mougins France
Ensuring the compliance of developed software with security requirements is a challenging task due to imprecision on the security guidelines definition, and to the lack of automatic and formal means to lead this verif... 详细信息
来源: 评论
Using computing-all-slices algorithm in measuring functional cohesion
Using computing-all-slices algorithm in measuring functional...
收藏 引用
International Conference on Software Engineering
作者: Al Dallal, Jehad Kuwait Univ Dept Informat Sci Safat 13060 Kuwait
program slicing is the task of finding all statements in a program that directly, or indirectly, influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some poin... 详细信息
来源: 评论
RELIABILITY ANALYSIS OF TEST CASES FOR program SLICING  1
RELIABILITY ANALYSIS OF TEST CASES FOR PROGRAM SLICING
收藏 引用
1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)
作者: Negi, Gaurav Elias, Eldo Kohli, Rashi Bibhu, Vimal Dr APJ AKTU CSE Dept Lucknow Uttar Pradesh India Amity Univ CSE Dept Greater Noida India
The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program, The slicing criterion refers to the slice that is likely to ... 详细信息
来源: 评论
Slicing, chopping, and path conditions with barriers
Slicing, chopping, and path conditions with barriers
收藏 引用
3rd IEEE International Workshop on Source Code Analysis and Manipulation
作者: Krinke, J Fernuniversitat Hagen Germany
One of the critiques on program slicing is that slices presented to the user are hard to understand. This is mainly related to the problem that slicing 'dumps' the results onto the user without any explanation... 详细信息
来源: 评论
Path-Sensitive Sparse Analysis without Path Conditions  2021
Path-Sensitive Sparse Analysis without Path Conditions
收藏 引用
42nd ACM SIGPLAN International Conference on programming Language Design and Implementation (PLDI)
作者: Shi, Qingkai Yao, Peisen Wu, Rongxin Zhang, Charles Hong Kong Univ Sci & Technol Hong Kong Peoples R China Xiamen Univ Xiamen Peoples R China
Sparse program analysis is fast as it propagates data flow facts via data dependence, skipping unnecessary control flows. However, when path-sensitively checking millions of lines of code, it is still prohibitively ex... 详细信息
来源: 评论
JavaPDG: A New Platform for program dependence Analysis
JavaPDG: A New Platform for Program Dependence Analysis
收藏 引用
6th IEEE International Conference on Software Testing, Verification and Validation (ICST)
作者: Shu, Gang Sun, Boya Henderson, Tim A. D. Podgurski, Andy Case Western Reserve Univ Dept Elect Engn & Comp Sci Cleveland OH 44106 USA
dependence analysis is a fundamental technique for program understanding and is widely used in software testing and debugging. However, there are a limited number of analysis tools available despite a wide range of re... 详细信息
来源: 评论
A Novel Speculative Multithreading Parallelization Method in Chip Multiprocessor Systems
A Novel Speculative Multithreading Parallelization Method in...
收藏 引用
9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES 2010)
作者: Wu, Yue Xu, Lei Yang, Hongbin Shanghai Univ Sch Engn & Comp Sci Shanghai 200041 Peoples R China
Chip multiprocessors have become mainstream processors in recent years. In this paper, we propose a novel speculative multithreading parallelization method for parallelizing a sequential program into multiple threads.... 详细信息
来源: 评论