咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 31 册 图书
  • 25 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 68 篇 工学
    • 48 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 29 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 1 篇 仪器科学与技术
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 2 篇 地球物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 物理学
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
    • 1 篇 美术学

主题

  • 104 篇 program executio...
  • 30 篇 program
  • 16 篇 data
  • 14 篇 command
  • 12 篇 manual
  • 11 篇 print
  • 11 篇 basic
  • 9 篇 file
  • 9 篇 breakpoint
  • 9 篇 display
  • 8 篇 statement
  • 7 篇 address
  • 7 篇 debugging
  • 7 篇 execution
  • 7 篇 legal executions
  • 6 篇 string
  • 6 篇 memory
  • 6 篇 location
  • 5 篇 reference manual
  • 5 篇 commands

机构

  • 2 篇 penn state univ ...
  • 2 篇 naval postgradua...
  • 2 篇 moscow mv lomono...
  • 1 篇 macronix int co ...
  • 1 篇 washington univ ...
  • 1 篇 saarland univ sa...
  • 1 篇 acad sinica inst...
  • 1 篇 univ grenoble al...
  • 1 篇 uppsala univ dep...
  • 1 篇 natl taiwan univ...
  • 1 篇 hewlett packard ...
  • 1 篇 georgia inst tec...
  • 1 篇 univ udine udine
  • 1 篇 dep. comp. sci. ...
  • 1 篇 department of en...
  • 1 篇 center for secur...
  • 1 篇 hebei univ cyber...
  • 1 篇 department of ee...
  • 1 篇 texas state univ...
  • 1 篇 harvard univ sch...

作者

  • 3 篇 wang meng
  • 2 篇 tian cong
  • 2 篇 grigoriadou mari...
  • 2 篇 kyriakou christi...
  • 2 篇 duan zhenhua
  • 2 篇 gogoulou agorits...
  • 1 篇 kassab mohamad
  • 1 篇 fellman rd
  • 1 篇 david bainbridge
  • 1 篇 liu shaoshan
  • 1 篇 mueller peter
  • 1 篇 brzozowski marci...
  • 1 篇 infante alejandr...
  • 1 篇 izu cruz
  • 1 篇 ronald c. arkin
  • 1 篇 black m
  • 1 篇 chang hung-sheng
  • 1 篇 kevin leach
  • 1 篇 langendoerfer pe...
  • 1 篇 walkinshaw neil

语言

  • 100 篇 英文
  • 4 篇 其他
检索条件"主题词=Program execution"
104 条 记 录,以下是51-60 订阅
排序:
Microcontroller based Multi-Star Simulator using Controller Area Network (CAN)
Microcontroller based Multi-Star Simulator using Controller ...
收藏 引用
IEEE National Aerospace and Electronics Conference
作者: Umamaheswaran, S. Nagendra, Santosh Trichy NITT Dept Instrumentat & Control Engn Natl Inst Technol Tiruchirappalli Tamil Nadu India Nagpur VNIT Dept Comp Sci & Engn Natl Inst Technol Nagpur Maharashtra India
This paper presents a Multi star simulator which is an embedded system used in the ground testing of Star sensors meant for the precision attitude control of satellites. This system shall not only simulate star intens... 详细信息
来源: 评论
Using the Executable Semantics for CFG Extraction and Unfolding
Using the Executable Semantics for CFG Extraction and Unfold...
收藏 引用
13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
作者: Asavoae, Mihail Asavoae, Irina Mariuca Alexandru Ioan Cuza Univ Fac Comp Sci Iasi Romania
The longest path search problem is important in low-level worst-case execution time analysis and implies that all program executions are exhibited and inspected, via convenient abstractions, for their timing behavior.... 详细信息
来源: 评论
Efficiently Identifying Object Production Sites  22
Efficiently Identifying Object Production Sites
收藏 引用
22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)
作者: Infante, Alejandro Bergel, Alexandre Univ Chile Dept Comp Sci DCC Pleiad Lab Santiago Region Metropol Chile
Most programming environments are shipped with accurate memory profilers. Although efficient in their analyses, memory profilers traditionally output textual listing reports, thus reducing the memory profile explorati... 详细信息
来源: 评论
Black-Box Test Generation from Inferred Models  4
Black-Box Test Generation from Inferred Models
收藏 引用
IEEE/ACM 4th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE)
作者: Papadopoulos, Petros Walkinshaw, Neil Univ Leicester Dept Comp Sci Leicester LE1 7RH Leics England
Automatically generating test inputs for components without source code (are 'black-box') and specification is challenging. One particularly interesting solution to this problem is to use Machine Learning algo... 详细信息
来源: 评论
Low-energy intra-task voltage scheduling using static timing analysis  01
Low-energy intra-task voltage scheduling using static timing...
收藏 引用
38th Design Automation Conference (DAC)
作者: Shin, D Kim, J Lee, S Seoul Natl Univ Sch Comp Sci & Engn Seoul 151 South Korea
We propose an intra-task voltage scheduling algorithm for low-energy hard real-time applications. Based on a static timing analysis technique, the proposed algorithm controls the supply voltage within an individual ta... 详细信息
来源: 评论
Selected Results and Related Issues of Confidentiality-Preserving Controlled Interaction execution  9th
Selected Results and Related Issues of Confidentiality-Prese...
收藏 引用
9th International Symposium on Foundations of Information and Knowledge Systems (FoIKS)
作者: Biskup, Joachim Tech Univ Dortmund Dortmund Germany
Controlled Interaction execution has been developed as a security server for inference control shielding an isolated, logic-oriented information system when interacting over the time with a client by means of messages... 详细信息
来源: 评论
Assuring Application-level Correctness Against Soft Errors
Assuring Application-level Correctness Against Soft Errors
收藏 引用
IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
作者: Cong, Jason Gururaj, Karthik Univ Calif Los Angeles Dept Comp Sci Los Angeles CA 90024 USA
Traditionally, research in fault tolerance has required architectural state to be numerically perfect for program execution to be correct. However, in many programs, even if execution is not 100% numerically correct, ... 详细信息
来源: 评论
A System for Visualizing the Process Address Space in the Context of Teaching Secure Coding in C  20
A System for Visualizing the Process Address Space in the Co...
收藏 引用
51st ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE)
作者: Walker, James Wang, Man Carr, Steve Mayo, Jean Shene, Ching-Kuang Michigan Technol Univ Houghton MI 49931 USA Western Michigan Univ Kalamazoo MI 49008 USA
Seemingly small coding errors can create significant vulnerabilities in C programs. This often occurs due to memory being overwritten in unexpected ways. If a student understands where program variables appear in the ... 详细信息
来源: 评论
Debugging with Probabilistic Event Structures  17
Debugging with Probabilistic Event Structures
收藏 引用
IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)
作者: Soremekun, Ezekiel O. Saarland Univ Saarbrucken Germany
Debugging is a search process to find, understand and fix the root cause of software defects. Can debugging benefit from probabilistic information? We hypothesize that debugging activities can benefit from probabilist... 详细信息
来源: 评论
Comparing Small programs for Equivalence: A Code Comprehension Task for Novice programmers  20
Comparing Small Programs for Equivalence: A Code Comprehensi...
收藏 引用
25th Conference on Innovation and Technology in Computer Science Education
作者: Izu, Cruz Mirolo, Claudio Univ Adelaide Adelaide SA Australia Univ Udine Udine Italy
Novice programmers should develop program comprehension skills as they learn to code so that they are able both to read and reason about code created by others, and to reflect on their code when writing, debugging or ... 详细信息
来源: 评论