咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 83 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 145 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 45 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 历史学
    • 1 篇 考古学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 艺术学理论

主题

  • 214 篇 source code anal...
  • 15 篇 software mainten...
  • 13 篇 static analysis
  • 13 篇 reverse engineer...
  • 11 篇 program comprehe...
  • 9 篇 machine learning
  • 8 篇 deep learning
  • 8 篇 software quality
  • 7 篇 software evoluti...
  • 7 篇 data mining
  • 7 篇 software securit...
  • 6 篇 mining software ...
  • 6 篇 java
  • 6 篇 codes
  • 6 篇 software metrics
  • 5 篇 tracing
  • 5 篇 clone detection
  • 4 篇 software visuali...
  • 4 篇 clustering
  • 4 篇 technical debt

机构

  • 3 篇 osaka univ grad ...
  • 3 篇 queens univ sch ...
  • 3 篇 concordia univ d...
  • 3 篇 concordia univ d...
  • 2 篇 tokyo inst techn...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 natl univ irelan...
  • 2 篇 luxembourg inst ...
  • 2 篇 univ milano bico...
  • 2 篇 blekinge inst te...
  • 2 篇 loyola coll dept...
  • 2 篇 univ sannio dept...
  • 2 篇 abb corp res ban...
  • 2 篇 comsats inst inf...
  • 2 篇 kyushu univ fuku...
  • 2 篇 osaka univ grad ...
  • 2 篇 natl cent univ d...
  • 2 篇 software compete...
  • 2 篇 vrije univ amste...
  • 2 篇 univ szeged dept...

作者

  • 10 篇 higo yoshiki
  • 8 篇 kusumoto shinji
  • 5 篇 di penta m
  • 5 篇 sureka ashish
  • 4 篇 merlo e
  • 4 篇 rilling juergen
  • 4 篇 antoniol g
  • 4 篇 hu qiang
  • 4 篇 rasool ghulam
  • 4 篇 lal sangeeta
  • 3 篇 monperrus martin
  • 3 篇 keivanloo iman
  • 3 篇 beszedes arpad
  • 3 篇 bernardi mario l...
  • 3 篇 li heng
  • 3 篇 jasz judit
  • 3 篇 ferretti claudio
  • 3 篇 cordy james r.
  • 3 篇 zhang zhenya
  • 3 篇 gyimothy tibor

语言

  • 209 篇 英文
  • 5 篇 其他
检索条件"主题词=Source Code Analysis"
214 条 记 录,以下是61-70 订阅
排序:
DejaVu: A Map of code Duplicates on GitHub
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2017年 第OOPSLA期1卷 1-28页
作者: Lopes, Cristina, V Maj, Petr Martins, Pedro Saini, Vaibhav Yang, Di Zitny, Jakub Sajnani, Hitesh Vitek, Jan Univ Calif Irvine Irvine CA 92697 USA Czech Tech Univ Prague Czech Republic Microsoft Res Redmond WA USA Northeastern Univ Boston MA 02115 USA
Previous studies have shown that there is a non-trivial amount of duplication in source code. This paper analyzes a corpus of 4.5 million non-fork projects hosted on GitHub representing over 428 million files written ... 详细信息
来源: 评论
Special issue: a selection of distinguished papers from the 18th Working Conference on Reverse Engineering 2011
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2014年 第1期26卷 1-2页
作者: Pinzger, Martin Poshyvanyk, Denys Univ Klagenfurt Software Engn Res Grp Klagenfurt Austria Coll William & Mary Software Engn Maintenance & Evolut Res Unit Williamsburg VA 23187 USA
The article introduces a selection of papers from the 18th Working Conference on Reverse Engineering held in 2011.
来源: 评论
Search-based inference of dialect grammars
收藏 引用
SOFT COMPUTING 2008年 第1期12卷 51-66页
作者: Di Penta, Massimiliano Lombardi, Pierpaolo Taneja, Kunal Troiano, Luigi Univ Sannio Res Ctr Software Technol I-82100 Benevento Italy N Carolina State Univ Raleigh NC 27695 USA
Building parsers is an essential task for the development of many tools, from software maintenance tools to any kind of business-specific, programmable environment having a command-line interface. Whilst grammars for ... 详细信息
来源: 评论
Decompiled APK based malicious code classification
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2020年 110卷 135-147页
作者: Mateless, Roni Rejabek, Daniel Margalit, Oded Moskovitch, Robert Ben Gurion Univ Negev Beer Sheva Israel IBM Corp Cyber Secur Ctr Excellence Petah Tiqwa Israel
Due to the increasing growth in the variety of Android malware, it is important to distinguish between the unique types of each. In this paper, we introduce the use of a decompiled source code for malicious code class... 详细信息
来源: 评论
Static analysis of Corpus of source codes of Python Applications
收藏 引用
PROGRAMMING AND COMPUTER SOFTWARE 2023年 第4期49卷 302-309页
作者: Kapustin, D. A. Shvyrov, V. V. Shulika, T. I. Lugansk State Pedag Univ Ul Oboronnaya 2 Lugansk 91011 Russia
A static analysis method is one of the popular methods of software code analysis. Such method allows checking the code for compliance with the language specification as well as finding potential vulnerabilities. In th... 详细信息
来源: 评论
IMPROVING REVERSE-ENGINEERING THROUGH THE USE OF MULTIPLE KNOWLEDGE sourceS
收藏 引用
JOURNAL OF SOFTWARE MAINTENANCE-RESEARCH AND PRACTICE 1995年 第4期7卷 279-299页
作者: LAYZELL, PJ FREEMAN, MJ BENEDUSI, P University of Manchester Institute of Science and Technology PO Box 88 Manchester M60 1QD U.K.
With the growing awareness of the importance of software maintenance has come a re-evaluation of software maintenance tools, Such tools range from source code analysers to semi-intelligent tools which seek to reconstr... 详细信息
来源: 评论
A query algebra for program databases
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1996年 第3期22卷 202-217页
作者: Paul, S Prakash, A UNIV MICHIGAN DEPT ELECT ENGN & COMP SCI SOFTWARE SYST RES LAB ANN ARBOR MI 48109 USA
Querying source code is an essential aspect of a variety of software engineering tasks such as program understanding, reverse engineering, program structure analysis, and program flow analysis. In this paper, we prese... 详细信息
来源: 评论
Searching Design Patterns Fast by Using Tree Traversals
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS 2015年 第4期61卷 321-326页
作者: Cicciarella, Stefano Napoli, Christian Tramontana, Emiliano Univ Catania Dept Math & Informat Viale A Doria 6 I-95125 Catania Italy
Large software systems need to be modified to remain useful. Changes can be more easily performed when their design has been carefully documented. This paper presents an approach to quickly find design patterns that h... 详细信息
来源: 评论
Analyzing cloning evolution in the Linux kernel
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2002年 第13期44卷 755-765页
作者: Antoniol, G Villano, U Merlo, E Di Penta, M Res Ctr Software Technol RCOST I-82100 Benevento Italy Univ Sannio Dept Engn I-82100 Benevento Italy Ecole Polytech Montreal PQ H3C 347 Canada
Identifying code duplication in large multi-platform software systems is a challenging problem. This is due to a variety of reasons including the presence of high-level programming languages and structures interleaved... 详细信息
来源: 评论
A metrics suite for grammar-based software
收藏 引用
JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE 2004年 第6期16卷 405-426页
作者: Power, JE Malloy, BA Clemson Univ Dept Comp Sci Clemson SC 29634 USA Natl Univ Ireland Dept Comp Sci Maynooth Kildare Ireland
One approach to measuring and managing the complexity of software, as it evolves over time, is to exploit software metrics. Metrics have been used to estimate the complexity of the maintenance effort, to facilitate ch... 详细信息
来源: 评论