咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 83 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 145 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 45 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 历史学
    • 1 篇 考古学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 艺术学理论

主题

  • 214 篇 source code anal...
  • 15 篇 software mainten...
  • 13 篇 static analysis
  • 13 篇 reverse engineer...
  • 11 篇 program comprehe...
  • 9 篇 machine learning
  • 8 篇 deep learning
  • 8 篇 software quality
  • 7 篇 software evoluti...
  • 7 篇 data mining
  • 7 篇 software securit...
  • 6 篇 mining software ...
  • 6 篇 java
  • 6 篇 codes
  • 6 篇 software metrics
  • 5 篇 tracing
  • 5 篇 clone detection
  • 4 篇 software visuali...
  • 4 篇 clustering
  • 4 篇 technical debt

机构

  • 3 篇 osaka univ grad ...
  • 3 篇 queens univ sch ...
  • 3 篇 concordia univ d...
  • 3 篇 concordia univ d...
  • 2 篇 tokyo inst techn...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 natl univ irelan...
  • 2 篇 luxembourg inst ...
  • 2 篇 univ milano bico...
  • 2 篇 blekinge inst te...
  • 2 篇 loyola coll dept...
  • 2 篇 univ sannio dept...
  • 2 篇 abb corp res ban...
  • 2 篇 comsats inst inf...
  • 2 篇 kyushu univ fuku...
  • 2 篇 osaka univ grad ...
  • 2 篇 natl cent univ d...
  • 2 篇 software compete...
  • 2 篇 vrije univ amste...
  • 2 篇 univ szeged dept...

作者

  • 10 篇 higo yoshiki
  • 8 篇 kusumoto shinji
  • 5 篇 di penta m
  • 5 篇 sureka ashish
  • 4 篇 merlo e
  • 4 篇 rilling juergen
  • 4 篇 antoniol g
  • 4 篇 hu qiang
  • 4 篇 rasool ghulam
  • 4 篇 lal sangeeta
  • 3 篇 monperrus martin
  • 3 篇 keivanloo iman
  • 3 篇 beszedes arpad
  • 3 篇 bernardi mario l...
  • 3 篇 li heng
  • 3 篇 jasz judit
  • 3 篇 ferretti claudio
  • 3 篇 cordy james r.
  • 3 篇 zhang zhenya
  • 3 篇 gyimothy tibor

语言

  • 209 篇 英文
  • 5 篇 其他
检索条件"主题词=Source Code Analysis"
214 条 记 录,以下是151-160 订阅
排序:
A selection of distinguished papers from the 19th Working Conference on Reverse Engineering 2012
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2014年 第11期26卷 929-930页
作者: Oliveto, Rocco Poshyvanyk, Denys Univ Molise Comp Sci & Sci Computat Lab Pesche Italy Coll William & Mary Dept Comp Sci Williamsburg VA 23185 USA
This special issue contains a selection of distinguished papers from the 19th Working Conference on Reverse Engineering, held in Kingston, Ontario, Canada on October 15th-18th, 2012. The papers address a variety of to... 详细信息
来源: 评论
Reverse Engineering PL/SQL Legacy code: An Experience Report  30
Reverse Engineering PL/SQL Legacy Code: An Experience Report
收藏 引用
30th IEEE International Conference on Software Maintenance and Evolution (ICSME)
作者: Habringer, Martin Moser, Michael Pichler, Josef Voestalpine Stahl GmbH A-4020 Linz Austria Software Competence Ctr Hagenberg GmbH Software Analyt & Evolut A-4232 Hagenberg Austria
The reengineering of legacy code is a tedious endeavor. Automatic transformation of legacy code from an old technology to a new one preserves potential problems in legacy code with respect to obsolete, changed, and ne... 详细信息
来源: 评论
Using Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution Function
Using Program Transformation, Annotation, and Reflection to ...
收藏 引用
15th IEEE International Symposium on High-Assurance Systems Engineering (HASE)
作者: Winter, Victor L. Reinke, Carl Guerrero, Jonathan Univ Nebraska Dept Comp Sci Omaha NE 68182 USA
In Java, type resolution is a function that takes a reference to a type occurring in a given context as input, and returns the canonical form of that type. This information is fundamental to static analysis - a "... 详细信息
来源: 评论
Using codeBrowser to Seek Differences between Novice Programmers  14
Using CodeBrowser to Seek Differences between Novice Program...
收藏 引用
45th ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE)
作者: Heinonen, Kenny Hirvikoski, Kasper Luukkainen, Matti Vihavainen, Arto Univ Helsinki Dept Comp Sci POB 68 Gustaf Hallstromin Katu 2b FI-00014 Helsinki Finland
A large body of systems that gather data on students' programming process exists, and with the increase of massive open online courses in programming, the amount of gathered data is growing even at a higher rate. ... 详细信息
来源: 评论
Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives  14
Automatic Detection and Correction of Web Application Vulner...
收藏 引用
23rd International Conference on World Wide Web (WWW)
作者: Medeiros, Iberia Neves, Nuno F. Correia, Miguel Univ Lisbon Fac Sci LaSIGE Lisbon Portugal Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal
Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulne... 详细信息
来源: 评论
Toward Extended Change Types for Analyzing Software Faults  14
Toward Extended Change Types for Analyzing Software Faults
收藏 引用
14th Annual International Conference on Quality Software (QSIC)
作者: Kidwell, Billy Hayes, Jane Huffman Nikora, Allen P. Univ Kentucky Dept Comp Sci Lexington KY 40506 USA CALTECH Jet Prop Lab Pasadena CA USA
This research extends an existing source code change taxonomy that was designed to analyze change coupling. The extension expands change types related to statements in order to achieve more granular data about the typ... 详细信息
来源: 评论
An Automated Architectural Evaluation Approach Based on Metadata and code analysis  15
An Automated Architectural Evaluation Approach Based on Meta...
收藏 引用
15th International Conference on Enterprise Information Systems (ICEIS)
作者: Pinto, Felipe Kulesza, Uira Guerra, Eduardo Fed Univ Rio Grande Norte UFRN Natal RN Brazil Fed Inst Educ Sci & Technol Rio Grande Norte IFRN Natal RN Brazil Natl Inst Space Res INPE Sao Jose Dos Campos Brazil
Traditional methods of scenario-based software architecture evaluation rely on manual review and advanced skills from architects and developers. They are used when the system architecture has been specified, but befor... 详细信息
来源: 评论
Detecting Anomalous Energy Consumption in Android Applications
收藏 引用
18th Brazilian Symposium on Programming Languages (SBLP)
作者: Couto, Marco Carcao, Tiago Cunha, Jacome Fernandes, Joao Paulo Saraiva, Joao Univ Minho INESC TEC HASLab P-4719 Braga Portugal
The use of powerful mobile devices, like smartphones, tablets and laptops, is changing the way programmers develop software. While in the past the primary goal to optimize software was the run time optimization, nowad... 详细信息
来源: 评论
Towards Tool Support for Analyzing Legacy Systems in Technical Domains
Towards Tool Support for Analyzing Legacy Systems in Technic...
收藏 引用
Software Evolution Week / IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
作者: Klammer, Claus Pichler, Josef Software Competence Ctr Hagenberg GmbH Software Analyt & Evolut A-4232 Hagenberg Austria
Software in technical domains contains extensive and complex computations in a highly-optimized and unstructured way. Such software systems developed and maintained over years are prone to become legacy code based on ... 详细信息
来源: 评论
A source code Change Impact analysis Algorithm for Iterative Software Development
收藏 引用
INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY 2012年 第4期4卷 60-75页
作者: Wilkerson, Jerod W. Sam & Irene Black Sch Business Dept Informat Syst Erie PA 16563 USA
CHA-AS is a source code change impact analysis algorithm for Java programs. CHA-AS differs from other algorithms in that it does not require the program versions it compares to be whole programs with a well-defined pr... 详细信息
来源: 评论