咨询与建议

限定检索结果

文献类型

  • 51 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 70 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 4 篇 电气工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
  • 16 篇 理学
    • 15 篇 数学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 科学技术史(分学科...
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 哲学
    • 1 篇 哲学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 历史学
    • 1 篇 世界史
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 83 篇 program semantic...
  • 12 篇 genetic programm...
  • 10 篇 abstract interpr...
  • 4 篇 recursion
  • 3 篇 semiring
  • 3 篇 pl/0
  • 3 篇 program transfor...
  • 3 篇 attributed trans...
  • 3 篇 general correctn...
  • 3 篇 fixpoint
  • 3 篇 program verifica...
  • 3 篇 code obfuscation
  • 3 篇 hoare logic
  • 3 篇 programming lang...
  • 3 篇 code generation
  • 3 篇 egli-milner orde...
  • 2 篇 program correctn...
  • 2 篇 compilers
  • 2 篇 measure theory
  • 2 篇 probabilistic se...

机构

  • 5 篇 poznan univ tech...
  • 4 篇 univ sheffield d...
  • 3 篇 the pennsylvania...
  • 3 篇 univ kent comp l...
  • 2 篇 univ verona dept...
  • 2 篇 univ london gold...
  • 2 篇 zhengzhou inform...
  • 2 篇 imdea software i...
  • 2 篇 carnegie mellon ...
  • 2 篇 univ verona vero...
  • 2 篇 ecole normale su...
  • 2 篇 univ washington ...
  • 1 篇 uk plc 5 jupiter...
  • 1 篇 univ waterloo wa...
  • 1 篇 univ pisa dipart...
  • 1 篇 new jersey inst ...
  • 1 篇 univ toronto on
  • 1 篇 inst sup gest ba...
  • 1 篇 georgia inst tec...
  • 1 篇 poznan univ tech...

作者

  • 6 篇 krawiec krzyszto...
  • 5 篇 guttmann walter
  • 5 篇 dalla preda mila
  • 4 篇 giacobazzi rober...
  • 3 篇 beadle lawrence
  • 3 篇 mccluskey cps
  • 3 篇 mastroeni isabel...
  • 3 篇 johnson colin g.
  • 2 篇 zeng ying
  • 2 篇 bongard josh c.
  • 2 篇 kiss akos
  • 2 篇 liu fenlin
  • 2 篇 mili ali
  • 2 篇 ganguly sangram
  • 2 篇 barraclough rich...
  • 2 篇 monniaux d
  • 2 篇 harman mark
  • 2 篇 ikarashi yuka
  • 2 篇 pawlak tomasz
  • 2 篇 kodali anuradha

语言

  • 69 篇 英文
  • 14 篇 其他
检索条件"主题词=Program Semantics"
83 条 记 录,以下是31-40 订阅
排序:
Software Watermarking: A semantics-based Approach
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2017年 331卷 71-85页
作者: Dalla Preda, Mila Pasqua, Michele Univ Verona Dept Comp Sci Str Grazie 15 I-37134 Verona Italy
Software watermarking is a defence technique used to prevent software piracy by embedding a signature, i.e., an identifier reliably representing the owner, in the code. When an illegal copy is made, the ownership can ... 详细信息
来源: 评论
A LINKED FOREST MANIPULATION SYSTEM semantics RULES FOR AN ATTRIBUTED TRANSLATION GRAMMAR FOR PL/O
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1988年 第1期24卷 1-28页
作者: MCCLUSKEY, CPS The Pennsylvania State University Computer Science Department Fogelsville PA 18051 United States
In this paper a linked forest manipulation system (abbreviated as LFMS) semantics rules is defined for an attributed translation grammar (abbreviated as ATG) for PL/0 defined and discussed by McCluskey [9]. The LFMS r... 详细信息
来源: 评论
Graph semantic similarity-based automatic assessment for programming exercises
收藏 引用
SCIENTIFIC REPORTS 2024年 第1期14卷 1-14页
作者: Xiang, Chengguan Wang, Ying Zhou, Qiyun Yu, Zhen Cent China Normal Univ Fac Artificial Intelligence Educ Wuhan 430079 Peoples R China Guizhou Educ Univ Sch Math & Big Data Guiyang 550018 Peoples R China
This paper proposes an algorithm for the automatic assessment of programming exercises. The algorithm assigns assessment scores based on the program dependency graph structure and the program semantic similarity, but ... 详细信息
来源: 评论
AN ATTRIBUTED TRANSLATION GRAMMAR FOR PL/O
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 1987年 第3-4期21卷 205-227页
作者: MCCLUSKEY, CPS The Pennsylvania State University Computer Science Department Fogelsville PA 18051 United States
In this paper an attributed translation grammar (abbreviated as ATG) for the PL/0 is defined. The translation achieved by the ATG is the generation of theP-codes, used in the original interpreter by Wirth [7]. Due (o ... 详细信息
来源: 评论
Invariant relations, invariant functions, and loop functions
收藏 引用
INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING 2012年 第3期8卷 195-212页
作者: Jilani, Lamia Labed Louhichi, Asma Mraihi, Olfa Mili, Ali Inst Sup Gest Bardo 2000 Tunisia Inst Sup Inform & Multimedia Ariana 2080 Tunisia NJIT CCS Newark NJ 07102 USA
The increasing criticality of software applications, the increasing size and complexity of such applications, and the increasing reliance of software engineering paradigms on third party software assets combine to pla... 详细信息
来源: 评论
Inductive Completeness of Logics of programs
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2009年 第C期228卷 101-112页
作者: Leivant, Daniel Indiana Univ Bloomington IN 47405 USA
We propose a new approach to delineating logics of programs, based directly on inductive definition of program semantics. The ingredients are elementary and well-known, but their fusion yields a simple yet powerful ap... 详细信息
来源: 评论
A Rewriting semantics for ABEL with Applications to Hardware/Software Co-Design and Analysis
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2007年 第4期176卷 47-60页
作者: Katelman, Michael Meseguer, Jose Univ Illinois Dept Comp Sci Urbana IL 61801 USA
We present a rewriting logic semantics in Maude of the ABEL hardware description language. Based on this semantics, and on Maude's underlying LTL model checker, we propose a scalable formal analysis framework and ... 详细信息
来源: 评论
Harnessing a Refinement Theory to Compute Loop Functions
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2009年 243卷 139-155页
作者: Mili, Ali Ben Ayed, Rahma Aharon, Shir Nadkarni, Chaitanya New Jersey Inst Technol Coll Comp Sci Newark NJ 07102 USA Univ Tunis El Manar SysCom Ecole Natl Ingn Tunis Tunis Tunisia
We consider a while loop on some space S and we are interested in deriving the function that this loop defines between its initial states and its final states (when it terminates). Such a capability is useful in a wid... 详细信息
来源: 评论
Characterizing a property-driven obfuscation strategy
收藏 引用
JOURNAL OF COMPUTER SECURITY 2018年 第1期26卷 31-69页
作者: Dalla Preda, Mila Mastroeni, Isabella Univ Verona Dipartimento Informat Verona Italy
In recent years, code obfuscation has attracted both researchers and software developers as a useful technique for protecting secret properties of proprietary programs. The idea of code obfuscation is to modify a prog... 详细信息
来源: 评论
semantics-based code obfuscation by abstract interpretation
收藏 引用
JOURNAL OF COMPUTER SECURITY 2009年 第6期17卷 855-908页
作者: Dalla Preda, Mila Giacobazzi, Roberto Univ Verona Dipartimento Informat Str Grazie 15 I-37134 Verona Italy
In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide thei... 详细信息
来源: 评论