咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 12 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 电气工程
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 17 篇 program dependen...
  • 3 篇 deep learning
  • 2 篇 control flow
  • 2 篇 software mainten...
  • 1 篇 internet of thin...
  • 1 篇 algorithm visual...
  • 1 篇 graph neural net...
  • 1 篇 software code cl...
  • 1 篇 probabilistic ca...
  • 1 篇 software visuali...
  • 1 篇 automatic assess...
  • 1 篇 suspicious code
  • 1 篇 codebert
  • 1 篇 control flow gra...
  • 1 篇 code similarity
  • 1 篇 code representat...
  • 1 篇 program slicing
  • 1 篇 software clone d...
  • 1 篇 code review
  • 1 篇 debugging

机构

  • 1 篇 penn state univ ...
  • 1 篇 univ queensland ...
  • 1 篇 natl taiwan univ...
  • 1 篇 northeastern uni...
  • 1 篇 kagawa univ fac ...
  • 1 篇 leshan normal un...
  • 1 篇 majmaah univ col...
  • 1 篇 guizhou educ uni...
  • 1 篇 natl inst techno...
  • 1 篇 jazan univ fac c...
  • 1 篇 beijing univ pos...
  • 1 篇 bharath univ com...
  • 1 篇 bombardier trans...
  • 1 篇 sichuan univ sch...
  • 1 篇 northeastern uni...
  • 1 篇 near east univ r...
  • 1 篇 northeastern uni...
  • 1 篇 pdeas coem dept ...
  • 1 篇 indian inst info...
  • 1 篇 natl elect & com...

作者

  • 2 篇 zhao yuhai
  • 2 篇 yin ying
  • 1 篇 huang cheng
  • 1 篇 liu shen
  • 1 篇 naeem muhammad r...
  • 1 篇 roy swarup
  • 1 篇 zeng minchuan
  • 1 篇 xu junjie
  • 1 篇 sun cong
  • 1 篇 xiang chengguan
  • 1 篇 indumathi c. p.
  • 1 篇 sheneamer abdull...
  • 1 篇 zhang yumei
  • 1 篇 singh paramvir
  • 1 篇 al-turjman fadi
  • 1 篇 gautam pratiksha
  • 1 篇 meananeatra pani...
  • 1 篇 chen chen
  • 1 篇 zhou qiyun
  • 1 篇 xin yang

语言

  • 17 篇 英文
检索条件"主题词=Program dependency graph"
17 条 记 录,以下是11-20 订阅
排序:
Data-centric Refinement of Database-Database dependency Analysis of Database program  15
Data-centric Refinement of Database-Database Dependency Anal...
收藏 引用
15th International Conference on Software Technologies (ICSOFT)
作者: Jana, Angshuman Indian Inst Informat Technol Guwahati Gauhati India
Since the pioneer work by Ottenstein and Ottenstein, the notion of program dependency graph (PDG) has attracted a wide variety of compelling applications in software engineering, e.g. program slicing, information flow... 详细信息
来源: 评论
Automatic Code Locations Identification for replacing temporary variable with query method  12
Automatic Code Locations Identification for replacing tempor...
收藏 引用
International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)
作者: Rongviriyapanish, Songsakdi Karunlanchakorn, Nopphawit Meananeatra, Panita Thammasat Univ Dept Comp Sci Pathum Thani Thailand Natl Elect & Comp Technol Ctr Stand & Testing Dev Lab Pathum Thani Thailand
Automatic application of refactoring techniques can help developer save effort for removing bad smells from their code which improves software maintainability. To remove automatically long method bad smell, which is o... 详细信息
来源: 评论
ENHANCING FAULT LOCALIZATION USING CONTROL AND DATA FLOW DEPENDENCE STRUCTURES  2
ENHANCING FAULT LOCALIZATION USING CONTROL AND DATA FLOW DEP...
收藏 引用
2nd International Conference on Inventive Systems and Control (ICISC)
作者: Indumathi, C. P. Vinothini, N. Univ Coll Engn Dept Comp Sci Engn BIT Campus Tiruchirappalli 620024 Tamil Nadu India
Locate the faults is more complex for software program. In this paper propose a control flow and data flow coverage based fault localization technique used to locate the fault and less complexity to calculate an execu... 详细信息
来源: 评论
Automatic Code Review by Learning the Structure Information of Code graph
收藏 引用
SENSORS 2023年 第5期23卷 2551-2551页
作者: Yin, Ying Zhao, Yuhai Sun, Yiming Chen, Chen Northeastern Univ Sch Comp Sci & Engn Shenyang 110169 Peoples R China
At present, the explosive growth of software code volume and quantity makes the code review process very labor-intensive and time-consuming. An automated code review model can assist in improving the efficiency of the... 详细信息
来源: 评论
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification
收藏 引用
ACM TRANSACTIONS ON INTERNET TECHNOLOGY 2022年 第2期22卷 40-40页
作者: Ullah, Farhan Naeem, Muhammad Rashid Bajahzar, Abdullah S. Al-Turjman, Fadi Northwestern Polytech Univ Sch Software 127 West Youyi Rd Xian 710072 Shaanxi Peoples R China Leshan Normal Univ Sch Artificial Intelligence 78 Binhe Rd Leshan 614000 Sichuan Peoples R China Majmaah Univ Coll Sci Zulfi Dept Comp Sci & Informat POB 1712 Zulfi 11932 Saudi Arabia Near East Univ Res Ctr AI & IoT Artificial Intelligence Dept Near East BlvdMersin 10 TR-99138 Nicosia Trnc Turkey
Software piracy is an act of illegal stealing and distributing commercial software either for revenue or identify theft. Pirated applications on Android app stores are harming developers and their users by clone scamm... 详细信息
来源: 评论
VulGAI: vulnerability detection based on graphs and images
收藏 引用
COMPUTERS & SECURITY 2023年 135卷
作者: Zhang, Chunyong Xin, Yang Beijing Univ Posts & Telecommun Beijing Peoples R China Natl Engn Lab DBR Beijing Peoples R China
Deep learning models have been widely used in the field of vulnerability detection. Deep learning-based vulnerability detection methods can automatically learn code patterns. Some methods consider processing codes as ... 详细信息
来源: 评论
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network
收藏 引用
COMPUTERS & SECURITY 2022年 118卷 1页
作者: Fang, Yong Huang, Chaoyi Zeng, Minchuan Zhao, Zhiying Huang, Cheng Sichuan Univ Sch Cyber Sci & Engn Chengdu Peoples R China
Web development technology has experienced significant progress. The creation of JavaScript has highly enriched the interactive ability of the client. However, the attacker uses the dynamic characteristics of the Java... 详细信息
来源: 评论