咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 232 册 图书
  • 205 篇 期刊文献
  • 22 篇 学位论文
  • 3 件 标准

馆藏范围

  • 914 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 621 篇 工学
    • 404 篇 计算机科学与技术...
    • 280 篇 软件工程
    • 181 篇 电气工程
    • 40 篇 生物工程
    • 39 篇 信息与通信工程
    • 36 篇 机械工程
    • 32 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 6 篇 网络空间安全
    • 5 篇 交通运输工程
    • 3 篇 航空宇航科学与技...
  • 74 篇 理学
    • 42 篇 生物学
    • 9 篇 系统科学
    • 7 篇 地球物理学
    • 6 篇 数学
    • 5 篇 物理学
    • 4 篇 化学
    • 4 篇 科学技术史(分学科...
  • 41 篇 农学
    • 40 篇 作物学
  • 38 篇 管理学
    • 35 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 18 篇 教育学
    • 16 篇 教育学
  • 7 篇 法学
    • 4 篇 社会学
    • 2 篇 政治学
  • 7 篇 医学
    • 4 篇 临床医学
  • 4 篇 文学
    • 3 篇 新闻传播学
  • 4 篇 历史学
    • 3 篇 考古学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 914 篇 source code
  • 146 篇 program
  • 135 篇 software
  • 89 篇 disk
  • 83 篇 data
  • 70 篇 code
  • 62 篇 hard disk
  • 61 篇 computer softwar...
  • 58 篇 file
  • 49 篇 ibm
  • 45 篇 turbo pascal
  • 44 篇 power supply
  • 42 篇 codes
  • 42 篇 operating system
  • 39 篇 programming
  • 35 篇 turbo
  • 34 篇 source
  • 34 篇 disk drive
  • 34 篇 magazine
  • 33 篇 deep learning

机构

  • 8 篇 inria
  • 8 篇 brno university ...
  • 5 篇 univ trento tren...
  • 4 篇 hebei univ sch c...
  • 4 篇 charles universi...
  • 4 篇 inria rmod team ...
  • 4 篇 univ paris
  • 3 篇 osaka univ grad ...
  • 3 篇 innopolis univ i...
  • 3 篇 budapest univ te...
  • 3 篇 duke nus med sch...
  • 3 篇 delft univ techn...
  • 3 篇 free univ tbilis...
  • 3 篇 heidelberg univ ...
  • 3 篇 univ zurich dept...
  • 2 篇 univ waterloo wa...
  • 2 篇 mit lincoln lab ...
  • 2 篇 yangzhou univ sc...
  • 2 篇 univ texas san a...
  • 2 篇 hong kong polyte...

作者

  • 11 篇 zacchiroli stefa...
  • 7 篇 sharif bonita
  • 6 篇 li zhen
  • 6 篇 inoue katsuro
  • 5 篇 peterson cole s.
  • 5 篇 gupta atul
  • 5 篇 ducasse stephane
  • 5 篇 haiduc sonia
  • 5 篇 rai sawan
  • 4 篇 yu willie
  • 4 篇 huebner paul
  • 4 篇 lanza michele
  • 4 篇 paech barbara
  • 4 篇 belwal ramesh ch...
  • 4 篇 ali nasir
  • 4 篇 gueheneuc yann-g...
  • 4 篇 marchetto alessa...
  • 4 篇 anquetil nicolas
  • 4 篇 pietri antoine
  • 4 篇 kakushadze zura

语言

  • 895 篇 英文
  • 11 篇 中文
  • 6 篇 其他
  • 1 篇 德文
  • 1 篇 塞尔维亚文
检索条件"主题词=Source code"
914 条 记 录,以下是71-80 订阅
排序:
Identifying source code Reuse across Repositories using LCS-based source code Similarity  14
Identifying Source Code Reuse across Repositories using LCS-...
收藏 引用
14th IEEE International Working Conference on source code Analysis and Manipulation (SCAM)
作者: Kawamitsu, Naohiro Ishio, Takashi Kanda, Tetsuya Kula, Raula Gaikovina De Roover, Coen Inoue, Katsuro Osaka Univ Grad Sch Informat Sci & Technol Suita Osaka 5650871 Japan Vrije Univ Brussel Software Languages Lab B-1050 Brussels Belgium
Developers often reuse source files developed for another project. In order to update a reused file to a newer version released by the original project, developers have to track which revision of a file was reused and... 详细信息
来源: 评论
Building Domain Specific Dictionaries of Verb-Object Relation from source code
Building Domain Specific Dictionaries of Verb-Object Relatio...
收藏 引用
15th European Conference on Software Maintenance and Reengineering (CSMR)/International Workshop on System Quality and Maintainability (SQM)/International Workshop on Model-Driven Software Migration (MSDM)
作者: Hayase, Yasuhiro Kashima, Yu Manabe, Yuki Inoue, Katsuro Toyo Univ Fac Informat Sci & Arts Kawagoe Saitama Japan Osaka Univ Grad Sch Informat Sci & Technol Suita Osaka 565 Japan
An identifier is an important key in mapping program elements onto domain knowledge for the purpose of program comprehension. Therefore, if identifiers in a program have inappropriate names, developers can waste a lot... 详细信息
来源: 评论
Application of Information Retrieval Techniques for source code Authorship Attribution
Application of Information Retrieval Techniques for Source C...
收藏 引用
14th International Conference on Database Systems for Advanced Applications
作者: Burrows, Steven Uitdenbogerd, Alexandra L. Turpin, Andrew RMIT Univ Sch Comp Sci & Informat Technol Melbourne Vic 3001 Australia
Authorship attribution assigns works of contentions authorship to their rightful owners solving cases of theft, plagiarism and authorship disputes in academia and industry. In this paper we investigate the application... 详细信息
来源: 评论
Computationally Sound Verification of source code  10
Computationally Sound Verification of Source Code
收藏 引用
17th ACM Conference on Computer and Communications Security (CCS)
作者: Backes, Michael Maffei, Matteo Unruh, Dominique Univ Saarland MPI SWS D-66123 Saarbrucken Germany Univ Saarland D-66123 Saarbrucken Germany
Increasing attention has recently been given to the formal verification of the source code of cryptographic protocols. The standard approach is to use symbolic abstractions of cryptography that make the analysis amena... 详细信息
来源: 评论
An Assessment of Vulnerable Detection source code Tools  50th
An Assessment of Vulnerable Detection Source Code Tools
收藏 引用
50th Annual Convention of the Computer-Society-of-India (CSI) on Digital Life
作者: Verma, Anoop Kumar Sharma, Aman Kumar Himachal Pradesh Univ Dept Comp Sci Shimla India
The commonly used programming language includes C and C++ for the software development and even introduced as a course contents in computer applications in number of institutions. As software development proceeds thro... 详细信息
来源: 评论
Authorship analysis of the Zeus botnet source code  5
Authorship analysis of the Zeus botnet source code
收藏 引用
5th Cybercrime and Trustworthy Computing Conference CTC
作者: Layton, Robert Azab, Ahmad Federat Univ Internet Commerce Secur Lab Mt Helen Vic 3350 Australia
Authorship analysis has been used successfully to analyse the provenance of source code files in previous studies. The source code for Zeus, one of the most damaging and effective botnets to date, was leaked in 2011. ... 详细信息
来源: 评论
Automated Change Propagation from source code to Sequence Diagrams  44th
Automated Change Propagation from Source Code to Sequence Di...
收藏 引用
44th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM)
作者: Rastocny, Karol Mlyncar, Andrej Slovak Univ Technol Bratislava Fac Informat & Informat Technol Ilkovieova 2 Bratislava 84216 Slovakia
Sequence diagrams belong to three most frequently used UML diagrams and they are often an integral part of a software design. Designers utilize sequence diagrams to define and visualize designed software's behavio... 详细信息
来源: 评论
Do Bugs Lead to Unnaturalness of source code?  2022
Do Bugs Lead to Unnaturalness of Source Code?
收藏 引用
30th ACM Joint European Software Engineering Conference / Symposium on the Foundations of Software Engineering (ESEC/FSE)
作者: Jiang, Yanjie Liu, Hui Zhang, Yuxia Ji, Weixing Zhong, Hao Zhang, Lu Beijing Inst Technol Sch Comp Sci & Technol Beijing Peoples R China Shanghai Jiao Tong Univ Shanghai Peoples R China Peking Univ Key Lab High Confidence Software Technol Beijing Peoples R China
Texts in natural languages are highly repetitive and predictable because of the naturalness of natural languages. Recent research validated that source code in programming languages is also repetitive and predictable,... 详细信息
来源: 评论
A Convolutional Neural Network for Language-Agnostic source code Summarization  14
A Convolutional Neural Network for Language-Agnostic Source ...
收藏 引用
14th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE)
作者: Moore, Jessica Ben Gelman Slater, David Two Six Labs Machine Learning Grp Arlington VA 22203 USA
Descriptive comments play a crucial role in the software engineering process. They decrease development time, enable better bug detection, and facilitate the reuse of previously written code. However, comments are com... 详细信息
来源: 评论
Automatic Translation from Pseudocode to source code: A Conceptual-Metamodel Approach
Automatic Translation from Pseudocode to Source Code: A Conc...
收藏 引用
IEEE International Conference on Cybernetics and Computational Intelligence (IEEE CyberneticsCom)
作者: Dirgahayu, Teduh Huda, Sheila Nurul Zukhri, Zainudin Ratnasari, Chanifah Indah Univ Islam Indonesia Dept Informat Yogyakarta Indonesia
Pseudocode is commonly used to teach algorithms for computer science students in an introductory programming course. When an automatic translation tool is available, students can translate their pseudocode to source c... 详细信息
来源: 评论