咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 83 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 145 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 45 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 历史学
    • 1 篇 考古学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 艺术学理论

主题

  • 214 篇 source code anal...
  • 15 篇 software mainten...
  • 13 篇 static analysis
  • 13 篇 reverse engineer...
  • 11 篇 program comprehe...
  • 9 篇 machine learning
  • 8 篇 deep learning
  • 8 篇 software quality
  • 7 篇 software evoluti...
  • 7 篇 data mining
  • 7 篇 software securit...
  • 6 篇 mining software ...
  • 6 篇 java
  • 6 篇 codes
  • 6 篇 software metrics
  • 5 篇 tracing
  • 5 篇 clone detection
  • 4 篇 software visuali...
  • 4 篇 clustering
  • 4 篇 technical debt

机构

  • 3 篇 osaka univ grad ...
  • 3 篇 queens univ sch ...
  • 3 篇 concordia univ d...
  • 3 篇 concordia univ d...
  • 2 篇 tokyo inst techn...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 natl univ irelan...
  • 2 篇 luxembourg inst ...
  • 2 篇 univ milano bico...
  • 2 篇 blekinge inst te...
  • 2 篇 loyola coll dept...
  • 2 篇 univ sannio dept...
  • 2 篇 abb corp res ban...
  • 2 篇 comsats inst inf...
  • 2 篇 kyushu univ fuku...
  • 2 篇 osaka univ grad ...
  • 2 篇 natl cent univ d...
  • 2 篇 software compete...
  • 2 篇 vrije univ amste...
  • 2 篇 univ szeged dept...

作者

  • 10 篇 higo yoshiki
  • 8 篇 kusumoto shinji
  • 5 篇 di penta m
  • 5 篇 sureka ashish
  • 4 篇 merlo e
  • 4 篇 rilling juergen
  • 4 篇 antoniol g
  • 4 篇 hu qiang
  • 4 篇 rasool ghulam
  • 4 篇 lal sangeeta
  • 3 篇 monperrus martin
  • 3 篇 keivanloo iman
  • 3 篇 beszedes arpad
  • 3 篇 bernardi mario l...
  • 3 篇 li heng
  • 3 篇 jasz judit
  • 3 篇 ferretti claudio
  • 3 篇 cordy james r.
  • 3 篇 zhang zhenya
  • 3 篇 gyimothy tibor

语言

  • 209 篇 英文
  • 5 篇 其他
检索条件"主题词=Source Code Analysis"
214 条 记 录,以下是131-140 订阅
排序:
Reducing operational costs through MIPS management
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2015年 第Part4期98卷 551-588页
作者: Kwiatkowski, Lukasz M. Verhoef, Chris Vrije Univ Amsterdam Dept Comp Sci NL-1081 HV Amsterdam Netherlands
We focus on an approach to reducing the costs of running applications. MIPS, which is a traditional acronym for millions of instructions per second, have evolved to become a measurement of processing power and CPU res... 详细信息
来源: 评论
Handover of managerial responsibilities in global software development: a case study of source code evolution and quality
收藏 引用
SOFTWARE QUALITY JOURNAL 2015年 第4期23卷 539-566页
作者: Jabangwe, Ronald Borstler, Jurgen Petersen, Kai Blekinge Inst Technol S-37179 Karlskrona Sweden
Studies report on the negative effect on quality in global software development (GSD) due to communication and coordination-related challenges. However, empirical studies reporting on the magnitude of the effect are s... 详细信息
来源: 评论
Empirical evidence on the link between object-oriented measures and external quality attributes: a systematic literature review
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2015年 第3期20卷 640-693页
作者: Jabangwe, Ronald Borstler, Jurgen Smite, Darja Wohlin, Claes Blekinge Inst Technol S-37179 Karlskrona Sweden
There is a plethora of studies investigating object-oriented measures and their link with external quality attributes, but usefulness of the measures may differ across empirical studies. This study aims to aggregate a... 详细信息
来源: 评论
Searching Design Patterns Fast by Using Tree Traversals
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS 2015年 第4期61卷 321-326页
作者: Cicciarella, Stefano Napoli, Christian Tramontana, Emiliano Univ Catania Dept Math & Informat Viale A Doria 6 I-95125 Catania Italy
Large software systems need to be modified to remain useful. Changes can be more easily performed when their design has been carefully documented. This paper presents an approach to quickly find design patterns that h... 详细信息
来源: 评论
Semi-Formal Approach for Validating Compiler for Safety Critical Software in Airborne Systems  2
Semi-Formal Approach for Validating Compiler for Safety Crit...
收藏 引用
2nd International Conference on Computing for Sustainable Global Development (INDIACom)
作者: Avinash, A. K. Nanda, Manju Jayanthi, J. NAL Dept Aerosp Elect & Syst Div Bangalore Karnataka India
For safety critical systems, porting the correct object code to perform the safety function is very critical. So apart from verifying the embedded software at hardware, software and system levels, safety critical syst... 详细信息
来源: 评论
Experiences from Performing Software Quality Evaluations via Combining Benchmark-Based Metrics analysis, Software Visualization, and Expert Assessment  31
Experiences from Performing Software Quality Evaluations via...
收藏 引用
IEEE 31st International Conference on Software Maintenance and Evolution (ICSME)
作者: Yamashita, Aiko Oslo & Akershus Univ Coll Appl Sci Oslo Norway
Software quality assessments are critical in organizations where the software has been produced by external vendors, or when the development and maintenance of a software product has been outsourced to external partie... 详细信息
来源: 评论
Usage contracts: Offering immediate feedback on violations of structural source-code regularities
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2015年 105卷 73-91页
作者: Lozano, Angela Mens, Kim Kellens, Andy Catholic Univ Louvain ICTEAM Louvain Belgium Vrije Univ Brussel Software Languages Lab Brussels Belgium
Developers often encode design knowledge through structural regularities such as API usage protocols, coding idioms and naming conventions. As these regularities express how the source code should be structured, they ... 详细信息
来源: 评论
Discovering Likely Mappings between APIs using Text Mining  15
Discovering Likely Mappings between APIs using Text Mining
收藏 引用
15th IEEE International Working Conference on source code analysis and Manipulation (SCAM)
作者: Pandita, Rahul Jetley, Raoul Praful Sudarsan, Sithu D. Williams, Laurie N Carolina State Univ Raleigh NC 27695 USA ABB Corp Res New Delhi India
Developers often release different versions of their applications to support various platform/programming-language application programming interfaces (APIs). To migrate an application written using one API (source) to... 详细信息
来源: 评论
Industry Practices and Event Logging: Assessment of a Critical Software Development Process  37
Industry Practices and Event Logging: Assessment of a Critic...
收藏 引用
IEEE/ACM 2nd International Workshop on Software Architecture and Metrics (SAM)
作者: Pecchia, Antonio Cinque, Marcello Carrozza, Gabriella Cotroneo, Domenico Univ Naples Federico II Dipartimento Ingn Elettr & Tecnol Informaz Via Claudio 21 I-80125 Naples Italy Critiware Srl I-80121 Naples Italy Selex ES SpA I-00195 Rome Italy
Practitioners widely recognize the importance of event logging for a variety of tasks, such as accounting, system measurements and troubleshooting. Nevertheless, in spite of the importance of the tasks based on the lo... 详细信息
来源: 评论
Static analysis for Web Service Security - Tools & Techniques for a Secure Development Life Cycle
Static Analysis for Web Service Security - Tools & Technique...
收藏 引用
IEEE International Symposium on Technologies for Homeland Security (HST)
作者: Masood, Adnan Java, Jim Nova Southeastern Univ Grad Sch Comp & Informat Sci Ft Lauderdale FL 33314 USA
In this ubiquitous IoT (Internet of Things) era, web services have become a vital part of today's critical national and public sector infrastructure. With the industry wide adaptation of service-oriented architect... 详细信息
来源: 评论