咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 43 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 114 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 75 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 28 篇 电气工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 1 篇 网络空间安全
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 数学

主题

  • 114 篇 program dependen...
  • 22 篇 program slicing
  • 12 篇 dynamic slicing
  • 11 篇 static slicing
  • 9 篇 control flow gra...
  • 6 篇 data dependence
  • 6 篇 program slice
  • 5 篇 program debuggin...
  • 4 篇 refactoring
  • 4 篇 control dependen...
  • 4 篇 software mainten...
  • 4 篇 system dependenc...
  • 3 篇 concurrent progr...
  • 3 篇 noninterference
  • 3 篇 information flow...
  • 3 篇 clone detection
  • 3 篇 path condition
  • 3 篇 abstract syntax ...
  • 3 篇 software securit...
  • 3 篇 dependence analy...

机构

  • 6 篇 indian inst tech...
  • 3 篇 rochester inst t...
  • 2 篇 princeton univ p...
  • 2 篇 univ tokushima g...
  • 2 篇 univ tokushima d...
  • 2 篇 univ karlsruhe t...
  • 2 篇 fernuniversitat ...
  • 2 篇 vrije univ bruss...
  • 2 篇 institute of inf...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 linköping univer...
  • 1 篇 osaka univ grad ...
  • 1 篇 amer univ beirut...
  • 1 篇 univ wisconsin d...
  • 1 篇 department of el...
  • 1 篇 telecom paristec...
  • 1 篇 near east univ a...
  • 1 篇 univ sci & techn...
  • 1 篇 zhejiang univ co...

作者

  • 5 篇 mall r
  • 5 篇 snelting gregor
  • 4 篇 marin victor j.
  • 4 篇 de roover coen
  • 4 篇 rivero carlos r.
  • 2 篇 inoue k
  • 2 篇 ben brahim ghass...
  • 2 篇 de koster joeri
  • 2 篇 kurmangaleev sha...
  • 2 篇 shimomura t
  • 2 篇 zhioua zeineb
  • 2 篇 avetisyan arutyu...
  • 2 篇 hajj hazem
  • 2 篇 krinke j
  • 2 篇 chung is
  • 2 篇 adaimy ralph
  • 2 篇 de meuter wolfga...
  • 2 篇 mund gb
  • 2 篇 oh taewook
  • 2 篇 zhang xj

语言

  • 108 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Dependence Graph"
114 条 记 录,以下是51-60 订阅
排序:
Clustering Recurrent and Semantically Cohesive program Statements in Introductory programming Assignments  19
Clustering Recurrent and Semantically Cohesive Program State...
收藏 引用
28th ACM International Conference on Information and Knowledge Management (CIKM)
作者: Marin, Victor J. Rivero, Carlos R. Rochester Inst Technol Rochester NY USA
Students taking introductory programming courses are typically required to complete assignments and expect timely feedback to advance their learning. With the current popularity of these courses in both traditional an... 详细信息
来源: 评论
Using computing-all-slices algorithm in measuring functional cohesion
Using computing-all-slices algorithm in measuring functional...
收藏 引用
International Conference on Software Engineering
作者: Al Dallal, Jehad Kuwait Univ Dept Informat Sci Safat 13060 Kuwait
program slicing is the task of finding all statements in a program that directly, or indirectly, influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some poin... 详细信息
来源: 评论
Towards Summarizing program Statements in Source Code Search  20
Towards Summarizing Program Statements in Source Code Search
收藏 引用
35th Annual ACM Symposium on Applied Computing (SAC)
作者: Marin, Victor J. Bansal, Iti Rivero, Carlos R. Rochester Inst Technol Rochester NY 14623 USA
A common practice among programmers is to find pieces of source code using search engines. programs retrieved by these engines are typically semantically but not necessarily syntactically similar. As a result, ranking... 详细信息
来源: 评论
Scalable Detection of Semantic Clones  08
Scalable Detection of Semantic Clones
收藏 引用
30th International Conference on Software Engineering
作者: Gabel, Mark Jiang, Lingxiao Su, Zhendong Univ Calif Davis Dept Comp Sci Davis CA 95616 USA
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant code, locate bugs, or gain insight into... 详细信息
来源: 评论
JavaPDG: A New Platform for program dependence Analysis
JavaPDG: A New Platform for Program Dependence Analysis
收藏 引用
6th IEEE International Conference on Software Testing, Verification and Validation (ICST)
作者: Shu, Gang Sun, Boya Henderson, Tim A. D. Podgurski, Andy Case Western Reserve Univ Dept Elect Engn & Comp Sci Cleveland OH 44106 USA
dependence analysis is a fundamental technique for program understanding and is widely used in software testing and debugging. However, there are a limited number of analysis tools available despite a wide range of re... 详细信息
来源: 评论
New Types of program dependences and Interprocedural Relations in Ada 2012 programs
New Types of Program Dependences and Interprocedural Relatio...
收藏 引用
4th IEEE International Conference on Software Engineering and Service Science (ICSESS)
作者: Wang, Bo Goto, Yuichi Cheng, Jingde Saitama Univ Dept Informat & Comp Sci Saitama 3388570 Japan
System dependence net is a formal model to explicitly represent program dependences and interprocedural relations in a concurrent program with multiple procedures. It is useful for development and maintenance of concu... 详细信息
来源: 评论
A Novel Speculative Multithreading Parallelization Method in Chip Multiprocessor Systems
A Novel Speculative Multithreading Parallelization Method in...
收藏 引用
9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES 2010)
作者: Wu, Yue Xu, Lei Yang, Hongbin Shanghai Univ Sch Engn & Comp Sci Shanghai 200041 Peoples R China
Chip multiprocessors have become mainstream processors in recent years. In this paper, we propose a novel speculative multithreading parallelization method for parallelizing a sequential program into multiple threads.... 详细信息
来源: 评论
CALI: Compiler-Assisted Library Isolation  21
CALI: Compiler-Assisted Library Isolation
收藏 引用
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS)
作者: Bauer, Markus Rossow, Christian CISPA Helmholtz Ctr Informat Secur Saarbrucken Saarland Germany
Software libraries can freely access the program's entire address space, and also inherit its system-level privileges. This lack of separation regularly leads to security-critical incidents once libraries contain ... 详细信息
来源: 评论
Information Flow Analysis via Path Condition Refinement
Information Flow Analysis via Path Condition Refinement
收藏 引用
7th International Workshop on Formal Aspects of Security and Trust
作者: Taghdiri, Mana Snelting, Gregor Sinz, Carsten Karlsruher Inst Technol D-76128 Karlsruhe Germany
We present a new approach to information flow control (WC), which exploits counterexample-guided abstraction refinement (CEGAR) technology. The CEGAR process is built on top of our existing IFC analysis in which illeg... 详细信息
来源: 评论
Formal Specification and Verification of Security Guidelines  22
Formal Specification and Verification of Security Guidelines
收藏 引用
IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)
作者: Zhioua, Zeineb Roudier, Yves Ameur, Rabea Boulifa SAP Labs France EURECOM Mougins France Univ Nice Sophia Antipolis I3S CNRS Nice France Telecom ParisTech Paris France
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, w... 详细信息
来源: 评论