咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 31 册 图书
  • 24 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 48 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 28 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 1 篇 仪器科学与技术
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 2 篇 地球物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 物理学
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
    • 1 篇 美术学

主题

  • 103 篇 program executio...
  • 30 篇 program
  • 16 篇 data
  • 14 篇 command
  • 12 篇 manual
  • 11 篇 print
  • 11 篇 basic
  • 9 篇 file
  • 9 篇 breakpoint
  • 9 篇 display
  • 8 篇 statement
  • 7 篇 address
  • 7 篇 debugging
  • 7 篇 execution
  • 7 篇 legal executions
  • 6 篇 string
  • 6 篇 memory
  • 6 篇 location
  • 5 篇 reference manual
  • 5 篇 commands

机构

  • 2 篇 penn state univ ...
  • 2 篇 naval postgradua...
  • 2 篇 moscow mv lomono...
  • 1 篇 macronix int co ...
  • 1 篇 washington univ ...
  • 1 篇 saarland univ sa...
  • 1 篇 acad sinica inst...
  • 1 篇 univ grenoble al...
  • 1 篇 uppsala univ dep...
  • 1 篇 natl taiwan univ...
  • 1 篇 hewlett packard ...
  • 1 篇 georgia inst tec...
  • 1 篇 univ udine udine
  • 1 篇 dep. comp. sci. ...
  • 1 篇 center for secur...
  • 1 篇 hebei univ cyber...
  • 1 篇 department of ee...
  • 1 篇 texas state univ...
  • 1 篇 harvard univ sch...
  • 1 篇 univ politecn ma...

作者

  • 3 篇 wang meng
  • 2 篇 tian cong
  • 2 篇 grigoriadou mari...
  • 2 篇 kyriakou christi...
  • 2 篇 duan zhenhua
  • 2 篇 gogoulou agorits...
  • 1 篇 kassab mohamad
  • 1 篇 fellman rd
  • 1 篇 david bainbridge
  • 1 篇 liu shaoshan
  • 1 篇 mueller peter
  • 1 篇 brzozowski marci...
  • 1 篇 infante alejandr...
  • 1 篇 izu cruz
  • 1 篇 ronald c. arkin
  • 1 篇 black m
  • 1 篇 chang hung-sheng
  • 1 篇 kevin leach
  • 1 篇 langendoerfer pe...
  • 1 篇 walkinshaw neil

语言

  • 99 篇 英文
  • 4 篇 其他
检索条件"主题词=Program Execution"
103 条 记 录,以下是1-10 订阅
排序:
Main Memory in program execution: Threshold Concept in CS
收藏 引用
SN Computer Science 2025年 第5期6卷 1-21页
作者: Kyriakou, Christina Gogoulou, Agoritsa Grigoriadou, Maria Department of Informatics and Telecommunications National and Kapodistrian University of Athens Athens Greece
Recent studies have shed light on the challenges students face in grasping certain aspects of computer science (CS) curricula. According to the threshold concepts theory, specific foundational ideas, if not thoroughly... 详细信息
来源: 评论
Using information obtained in the course of program execution for improving the quality of data type reconstruction in decompilation
收藏 引用
programMING AND COMPUTER SOFTWARE 2010年 第6期36卷 343-362页
作者: Troshina, E. N. Chernov, A. V. Russian Acad Sci Inst Syst Programming Moscow 109004 Russia Moscow MV Lomonosov State Univ Dept Computat Math & Cybernet Moscow 119992 Russia
Methods of improving the decompilation quality, that is, the reconstruction of a program in a high-level language from a given program in a low-level language, are considered. Decompilation is considered as a reverse ... 详细信息
来源: 评论
Verifying Full Regular Temporal Properties of programs via Dynamic program execution
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2019年 第3期68卷 1101-1116页
作者: Wang, Meng Tian, Cong Zhang, Nan Duan, Zhenhua Xidian Univ ICTT & ISN Lab Xian 710071 Shaanxi Peoples R China
Verification of programs at code level has attracted more and more attentions since the cost is high to extract models from source code. Most of approaches available for code level verification are carried out by inse... 详细信息
来源: 评论
Full Regular Temporal Property Verification as Dynamic program execution  17
Full Regular Temporal Property Verification as Dynamic Progr...
收藏 引用
IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)
作者: Wang, Meng Tian, Cong Duan, Zhenhua ICTT & ISN Lab Xian 710071 Shaanxi Peoples R China
Verification of programs in code-level has attracted more and more attentions and considerable progress has been made in this area. The early research is limited to the verification of safety properties [1], [2], [3].... 详细信息
来源: 评论
UMC4M: A Verification Tool via program execution  9th
UMC4M: A Verification Tool via Program Execution
收藏 引用
9th International Workshop on Structured Object-Oriented Formal Language (SOFL)+The Modeling, Simulation and Verification Language (MSVL) for Reliability and Security
作者: Wang, Meng Tian, Junfeng Zhang, Hong Hebei Univ Cyberspace Secur & Comp Coll Baoding 071000 Peoples R China
Most of the software model checkers available for code level verification can only verify safety properties since desired properties are specified by assertions. However, other temporal properties such as liveness can... 详细信息
来源: 评论
The influence of contract type in program execution/V-22 OSPREY: a case study
The influence of contract type in program execution/V-22 OSP...
收藏 引用
作者: Smith, Danny Roy Naval Postgraduate School
学位级别:硕士
The purpose of this study was to look at the impact of a fixed price type con- tract on program execution of a major weapon system. The full scale development phase of the V-22 Osprey program was used as a case study.... 详细信息
来源: 评论
Guiding Dynamic Symbolic execution toward Unverified program executions  16
Guiding Dynamic Symbolic Execution toward Unverified Program...
收藏 引用
38th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Christakis, Maria Mueller, Peter Wutholz, Valentin Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland
Most techniques to detect program errors, such as testing, code reviews, and static program analysis, do not fully verify all possible executions of a program. They leave executions unverified when they do not check c... 详细信息
来源: 评论
The Forgotten Potential: Why Aspect-Oriented programming Faded Away
收藏 引用
COMPUTER 2025年 第3期58卷 100-104页
作者: Kassab, Mohamad Fernandes, Joao Paulo Laplante, Phil Boston Univ Boston MA 02215 USA New York Univ Abu Dhabi Abu Dhabi U Arab Emirates Penn State Univ University Pk PA USA
This article investigates why aspect-oriented programming, once celebrated as a revolutionary programming paradigm, lost its traction. We examine its early achievements, the technical obstacles it faced, and the core ... 详细信息
来源: 评论
Dnriproving the scalability of Wearable Devices via Transparent Computing Technology
收藏 引用
COMPUTING IN SCIENCE & ENGINEERING 2017年 第1期19卷 29-37页
作者: Yi, Letian Li, Jianbin Zhang, Yaoxue Cent S Univ Informat Secur & Big Data Res Inst Changsha Hunan Peoples R China Cent S Univ Comp Sci & Technol Changsha Hunan Peoples R China
A highly scalable system for power-efficient wearable devices, TCID (transparent computing-based intelligent device), leverages streaming to help applications for wearable devices obtain data from servers at runtime, ... 详细信息
来源: 评论
Locally optimal algorithms for designing schedules based on hopfield networks
收藏 引用
programMING AND COMPUTER SOFTWARE 2003年 第4期29卷 199-209页
作者: Kostenko, VA Vinokurov, AV Moscow MV Lomonosov State Univ Dept Computat Math & Cybernet Moscow 119992 Russia
Locally optimal algorithms for designing schedules for pro-ram execution on multiprocessors based on Hopfield networks are considered. Results of the numerical investigations of these algorithms are presented.
来源: 评论