咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 3 册 图书
  • 2 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 12 篇 program graph
  • 3 篇 input
  • 2 篇 graph
  • 2 篇 loop
  • 2 篇 program
  • 1 篇 computer science
  • 1 篇 active
  • 1 篇 mit-lcs-tr-370
  • 1 篇 graphs
  • 1 篇 complexity measu...
  • 1 篇 intervals
  • 1 篇 execution sequen...
  • 1 篇 loop junction
  • 1 篇 node
  • 1 篇 instructions
  • 1 篇 output link
  • 1 篇 token
  • 1 篇 parallel operati...
  • 1 篇 mit-lcs-tr-064
  • 1 篇 data item

机构

  • 1 篇 institute of com...
  • 1 篇 charles sturt un...
  • 1 篇 univ stuttgart i...
  • 1 篇 czechoslavak aca...
  • 1 篇 theanalytic scie...
  • 1 篇 charles sturt un...
  • 1 篇 swinburne univ t...
  • 1 篇 wuhan social wor...
  • 1 篇 naval postgradua...
  • 1 篇 tokyo inst techn...
  • 1 篇 fernuniv hagen f...
  • 1 篇 wuhan univ techn...

作者

  • 1 篇 islam md saiful
  • 1 篇 liu chengfei
  • 1 篇 saeki m
  • 1 篇 liu hong-xin
  • 1 篇 nakanishi t
  • 1 篇 stetter f
  • 1 篇 huang wei-teh
  • 1 篇 král jaroslav
  • 1 篇 islam md rafiqul
  • 1 篇 kayes a. s. m.
  • 1 篇 altas irfan
  • 1 篇 li yong-hua
  • 1 篇 van douglas unde...
  • 1 篇 paige michael r.
  • 1 篇 feng yu-qing
  • 1 篇 rzehak h
  • 1 篇 zhang juan
  • 1 篇 hecht v

语言

  • 11 篇 英文
  • 1 篇 其他
检索条件"主题词=Program graph"
12 条 记 录,以下是1-10 订阅
排序:
A Survey on Mining program-graph Features for Malware Analysis  1
收藏 引用
10th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
作者: Islam, Md Saiful Islam, Md Rafiqul Kayes, A. S. M. Liu, Chengfei Altas, Irfan Swinburne Univ Technol Melbourne Vic Australia Charles Sturt Univ Alburry NSW Australia Charles Sturt Univ Wagga Wagga NSW Australia
Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious in... 详细信息
来源: 评论
On Partitioning program graphs
收藏 引用
IEEE Transactions on Software Engineering 1977年 第6期SE-3卷 386-393页
作者: Paige, Michael R. TheAnalytic Sciences Corporation (TASC) Reading MA 01867 United States
In recent years, applications of graph theory to computer software have given fruitful results and attracted more and more attention. A program graph is a graph structural model of a program exhibiting the flow relati... 详细信息
来源: 评论
Applying multiple program graphs to modify specifications
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2000年 第4期E83D卷 669-678页
作者: Nakanishi, T Saeki, M Tokyo Inst Technol Dept Comp Sci Tokyo 1528552 Japan
In a software maintenance phase, since quanity assurance engineers frequently only change source codes, the consistency between the source codes and their specification documents cannot be kept. In this paper we propo... 详细信息
来源: 评论
A MEASURE OF program COMPLEXITY
收藏 引用
COMPUTER LANGUAGES 1984年 第3-4期9卷 203-208页
作者: STETTER, F FERNUNIV HAGEN FACHBEREICH MATH & INFORMATD-5800 HAGENFED REP GER
We propose a measure of program complexity which takes into account both the relationship between statements and the relationships between statements and data objects (constants and variables). This measure, called pr... 详细信息
来源: 评论
LANGUAGES AND TRANSLATION TECHNIQUES FOR EXTENSIVE USE OF PARALLEL OPERATIONS
收藏 引用
COMPUTING 1975年 第1-2期14卷 15-27页
作者: HECHT, V RZEHAK, H UNIV STUTTGART INST INFORMATIKD-7000 STUTTGARTFED REP GER
The basic assumption for the following paper is the availability of as many processors as the possible parallelism in a program requires. Such a system e. g. may be a hybrid system. Based on the single assignment conc... 详细信息
来源: 评论
One way of estimating frequencies of jumps in a program
收藏 引用
Communications of the ACM 1968年 第7期11卷 475-480页
作者: Král, Jaroslav Czechoslavak Academy of Sciences Prayne United States
For the segmentation of a program it is useful to have a reasonable estimation of the values of Sij, where Sij is the mean value of the number of jumps from the ith instruction on to the ith instruction in the run tim... 详细信息
来源: 评论
A Research of DD Path Automatically Generated System
A Research of DD Path Automatically Generated System
收藏 引用
2nd International Conference on Computer Science and Applications (CSA)
作者: Zhang, Juan Liu, Hong-xin Li, Yong-hua Feng, Yu-qing Wuhan Univ Technol Wuhan Hubei Peoples R China Wuhan Social Work Profess Coll Wuhan Hubei Peoples R China
This paper proposes a method to generate program graph and DD-paths automatically. Firstly, this method makes static analysis on the structured program to get the defining and using information of the variables and th... 详细信息
来源: 评论
Functional programming in graphs
收藏 引用
Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an 1987年 第1期10卷 87-97页
作者: Huang, Wei-Teh Institute of Computer Science and Electronic Engineering National Central University Chungli 32054 Taiwan
The notation of functional programming (FP) provides a clear and general syntax for writing programs which have extremely simple semantics and exhibit a clear hierarchical structure. Unfortunately, functional language... 详细信息
来源: 评论
An investigation of the parameters for register allocation during compilation
An investigation of the parameters for register allocation d...
收藏 引用
作者: Van Douglas Underwood Naval Postgraduate School
学位级别:硕士
Two established methods of code improvement, Day [U] and Kildall [7], are reviewed. The problems of optimal register allocation are discussed. A method is presented using Kilda1l's [7] optimization algorithm for s... 详细信息
来源: 评论
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-370
收藏 引用
2016年
Mit :: Lcs :: Tr :: Mit-Lcs-Tr-370 by published by
来源: 评论