咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 43 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 114 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 75 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 28 篇 电气工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 1 篇 网络空间安全
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 数学

主题

  • 114 篇 program dependen...
  • 22 篇 program slicing
  • 12 篇 dynamic slicing
  • 11 篇 static slicing
  • 9 篇 control flow gra...
  • 6 篇 data dependence
  • 6 篇 program slice
  • 5 篇 program debuggin...
  • 4 篇 refactoring
  • 4 篇 control dependen...
  • 4 篇 software mainten...
  • 4 篇 system dependenc...
  • 3 篇 concurrent progr...
  • 3 篇 noninterference
  • 3 篇 information flow...
  • 3 篇 clone detection
  • 3 篇 path condition
  • 3 篇 abstract syntax ...
  • 3 篇 software securit...
  • 3 篇 dependence analy...

机构

  • 6 篇 indian inst tech...
  • 3 篇 rochester inst t...
  • 2 篇 princeton univ p...
  • 2 篇 univ tokushima g...
  • 2 篇 univ tokushima d...
  • 2 篇 univ karlsruhe t...
  • 2 篇 fernuniversitat ...
  • 2 篇 vrije univ bruss...
  • 2 篇 institute of inf...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 linköping univer...
  • 1 篇 osaka univ grad ...
  • 1 篇 amer univ beirut...
  • 1 篇 univ wisconsin d...
  • 1 篇 department of el...
  • 1 篇 telecom paristec...
  • 1 篇 near east univ a...
  • 1 篇 univ sci & techn...
  • 1 篇 zhejiang univ co...

作者

  • 5 篇 mall r
  • 5 篇 snelting gregor
  • 4 篇 marin victor j.
  • 4 篇 de roover coen
  • 4 篇 rivero carlos r.
  • 2 篇 inoue k
  • 2 篇 ben brahim ghass...
  • 2 篇 de koster joeri
  • 2 篇 kurmangaleev sha...
  • 2 篇 shimomura t
  • 2 篇 zhioua zeineb
  • 2 篇 avetisyan arutyu...
  • 2 篇 hajj hazem
  • 2 篇 krinke j
  • 2 篇 chung is
  • 2 篇 adaimy ralph
  • 2 篇 de meuter wolfga...
  • 2 篇 mund gb
  • 2 篇 oh taewook
  • 2 篇 zhang xj

语言

  • 108 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"主题词=Program Dependence Graph"
114 条 记 录,以下是71-80 订阅
排序:
Control and Data Flow in Security Smell Detection for Infrastructure as Code: Is It Worth the Effort?  20
Control and Data Flow in Security Smell Detection for Infras...
收藏 引用
IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)
作者: Opdebeeck, Ruben Zerouali, Ahmed De Roover, Coen Vrije Univ Brussel Brussels Belgium
Infrastructure as Code is the practice of developing and maintaining computing infrastructure through executable source code. Unfortunately, IaC has also brought about new cyber attack vectors. Prior work has therefor... 详细信息
来源: 评论
Tracking Dependent Information Flows  3
Tracking Dependent Information Flows
收藏 引用
3rd International Conference on Information Systems Security and Privacy (ICISSP) / International Conference on Security and Cryptography (SECRYPT)
作者: Zhioua, Zeineb Roudier, Yves Ameur, Rabea Boulifa Kechiche, Takoua Short, Stuart EURECOM SAP Labs France Mougins France Univ Nice Sophia Antipolis CNRS I3S Biot France Telecom ParisTech Biot France SAP Labs France Mougins France
Ensuring the compliance of developed software with security requirements is a challenging task due to imprecision on the security guidelines definition, and to the lack of automatic and formal means to lead this verif... 详细信息
来源: 评论
Path-Sensitive Sparse Analysis without Path Conditions  2021
Path-Sensitive Sparse Analysis without Path Conditions
收藏 引用
42nd ACM SIGPLAN International Conference on programming Language Design and Implementation (PLDI)
作者: Shi, Qingkai Yao, Peisen Wu, Rongxin Zhang, Charles Hong Kong Univ Sci & Technol Hong Kong Peoples R China Xiamen Univ Xiamen Peoples R China
Sparse program analysis is fast as it propagates data flow facts via data dependence, skipping unnecessary control flows. However, when path-sensitively checking millions of lines of code, it is still prohibitively ex... 详细信息
来源: 评论
RELIABILITY ANALYSIS OF TEST CASES FOR program SLICING  1
RELIABILITY ANALYSIS OF TEST CASES FOR PROGRAM SLICING
收藏 引用
1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)
作者: Negi, Gaurav Elias, Eldo Kohli, Rashi Bibhu, Vimal Dr APJ AKTU CSE Dept Lucknow Uttar Pradesh India Amity Univ CSE Dept Greater Noida India
The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program, The slicing criterion refers to the slice that is likely to ... 详细信息
来源: 评论
Semi-Automatic Extraction and Exploitation of Hierarchical Pipeline Parallelism Using Profiling Information  10
Semi-Automatic Extraction and Exploitation of Hierarchical P...
收藏 引用
19th International Conference on Parallel Architectures and Compilation Techniques
作者: Tournavitis, Georgios Franke, Bjoern Univ Edinburgh Sch Informat Inst Comp Syst Architecture Edinburgh EH8 9YL Midlothian Scotland
In recent years multi-core computer systems have left the realm of high-performance computing and virtually all of today's desktop computers and embedded computing systems are equipped with several processing core... 详细信息
来源: 评论
Automatically identifying domain variables based on data dependence graph
Automatically identifying domain variables based on data dep...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Wang, XY Sun, JL Yang, XH He, ZJ Maddineni, SR Zhejiang Univ Coll Comp Sci Hangzhou 310027 Peoples R China
Experience in reengineering legacy sytem shows one shouldn't assume the availability of the system documents;even if they are available, the documents may be inconsistent with the code. The software code becomes m... 详细信息
来源: 评论
Scalable Framework for Accurate Binary Code Comparison
Scalable Framework for Accurate Binary Code Comparison
收藏 引用
2017 Ivannikov ISPRAS Open Conference (ISPRAS)
作者: Aslanyan, Hayk Avetisyan, Arutyun Arutunian, Mariam Keropyan, Grigor Kurmangaleev, Shamil Vardanyan, Vahagn ISPRAS Compiler Technol Dept Moscow Russia
Comparison of two binary files has many practical applications: the ability to detect programmatic changes between two versions, the ability to find old versions of statically linked libraries to prevent the use of we... 详细信息
来源: 评论
A Framework for Secure Information Flow Analysis in Web Applications  29
A Framework for Secure Information Flow Analysis in Web Appl...
收藏 引用
IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA)
作者: Adaimy, Ralph El-Hajj, Wassim Ben Brahim, Ghassen Hajj, Hazem Safa, Haidar Amer Univ Beirut Comp Sci Beirut Lebanon Amer Univ Beirut Elect & Comp Eng Beirut Lebanon
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can ha... 详细信息
来源: 评论
Distilling Useful Clones by Contextual Differencing
Distilling Useful Clones by Contextual Differencing
收藏 引用
20th Working Conference on Reverse Engineering
作者: Xing, Zhenchang Xue, Yinxing Jarzabek, Stan Nanyang Technol Univ Singapore 639798 Singapore Natl Univ Singapore Singapore Singapore
Clone detectors find similar code fragments and report large numbers of them for large systems. Textually similar clones may perform different computations, depending on the program context in which clones occur. Unde... 详细信息
来源: 评论
CCSharp: An Efficient Three-phase Code Clone Detector Using Modified PDGs  24
CCSharp: An Efficient Three-phase Code Clone Detector Using ...
收藏 引用
24th Asia-Pacific Software Engineering Conference (APSEC)
作者: Wang, Min Wang, Pengcheng Xu, Yun Univ Sci & Technol China Sch Comp Sci Hefei 230027 Anhui Peoples R China Natl Univ Def Technol Lab High Performance Comp Anhui Prov Changsha 410073 Hunan Peoples R China Natl Univ Def Technol Collaborat Innovat Ctr High Performance Comp Changsha 410073 Hunan Peoples R China
Detecting code clones in software systems is becoming more and more important with the blossom of open source projects. In spite of numerous active researches, there is still a lack of detecting clones especially high... 详细信息
来源: 评论