咨询与建议

限定检索结果

文献类型

  • 125 篇 会议
  • 82 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 201 篇 工学
    • 144 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 44 篇 电气工程
    • 7 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 历史学
    • 1 篇 考古学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 艺术学理论

主题

  • 213 篇 source code anal...
  • 15 篇 software mainten...
  • 13 篇 reverse engineer...
  • 12 篇 static analysis
  • 11 篇 program comprehe...
  • 9 篇 machine learning
  • 8 篇 deep learning
  • 8 篇 software quality
  • 7 篇 software evoluti...
  • 7 篇 data mining
  • 7 篇 software securit...
  • 6 篇 mining software ...
  • 6 篇 java
  • 6 篇 codes
  • 6 篇 software metrics
  • 5 篇 tracing
  • 5 篇 clone detection
  • 4 篇 software visuali...
  • 4 篇 clustering
  • 4 篇 technical debt

机构

  • 3 篇 osaka univ grad ...
  • 3 篇 queens univ sch ...
  • 3 篇 concordia univ d...
  • 3 篇 concordia univ d...
  • 2 篇 tokyo inst techn...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 natl univ irelan...
  • 2 篇 luxembourg inst ...
  • 2 篇 univ milano bico...
  • 2 篇 blekinge inst te...
  • 2 篇 loyola coll dept...
  • 2 篇 univ sannio dept...
  • 2 篇 abb corp res ban...
  • 2 篇 comsats inst inf...
  • 2 篇 kyushu univ fuku...
  • 2 篇 osaka univ grad ...
  • 2 篇 natl cent univ d...
  • 2 篇 software compete...
  • 2 篇 vrije univ amste...
  • 2 篇 univ szeged dept...

作者

  • 10 篇 higo yoshiki
  • 8 篇 kusumoto shinji
  • 5 篇 di penta m
  • 5 篇 sureka ashish
  • 4 篇 merlo e
  • 4 篇 rilling juergen
  • 4 篇 antoniol g
  • 4 篇 hu qiang
  • 4 篇 rasool ghulam
  • 4 篇 lal sangeeta
  • 3 篇 monperrus martin
  • 3 篇 keivanloo iman
  • 3 篇 beszedes arpad
  • 3 篇 bernardi mario l...
  • 3 篇 li heng
  • 3 篇 jasz judit
  • 3 篇 ferretti claudio
  • 3 篇 cordy james r.
  • 3 篇 zhang zhenya
  • 3 篇 gyimothy tibor

语言

  • 208 篇 英文
  • 5 篇 其他
检索条件"主题词=Source code analysis"
213 条 记 录,以下是21-30 订阅
排序:
Back to the source [Feature: source code analysis]
收藏 引用
Information Professional 2005年 第4期2卷 38-42页
作者: Andy Gothard
The case for a less buggy development process is compelling. Organisations are looking to modeling languages such as the Unified Modeling Language (UML) to try to guarantee that requirements are written correctly and ... 详细信息
来源: 评论
PROTECTION AGAINST TROJAN HORSES BY source code analysis
收藏 引用
ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE 1994年 第1期77卷 11-19页
作者: SAITO, T AIDA, H KAWAGUCHI, Y Faculty of Engineering The University of Tokyo Tokyo Japan 113 Presently with NTT.
The technology of security in computer networks has far-reaching implications. In this paper, assuming a UNIX network system, which is the most Popular currently, we enumerate the threats against security and classify... 详细信息
来源: 评论
Getting Started with source code analysis for Programming Education Research  2022
Getting Started with Source Code Analysis for Programming Ed...
收藏 引用
Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 2
作者: Neil C. C. Brown Michael Kölling Charalampos Kyfonidis Pierre Weill-Tessier King's College London London United Kingdom
Interesting ideas for computing education research often involve analysis of source code written by beginners. The process is often difficult to carry out: data must be collected from learners and then the code must b... 详细信息
来源: 评论
A source code Quality analysis Approach  10
A Source Code Quality Analysis Approach
收藏 引用
10th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
作者: Iqbal, Tahira Iqbal, Moniba Asad, Muhammad Khan, Aihab Iqra Univ Dept Comp & Technol Islamabad Pakistan Natl Univ Sci & Technol CS Dept Mil Coll Signals Islamabad Pakistan
A huge amount of source code is written everyday for different languages and various platforms. It is necessary that the code written is efficient and optimized in terms of various parameters including hardware utiliz... 详细信息
来源: 评论
A source code Change Impact analysis Algorithm for Iterative Software Development
收藏 引用
INTERNATIONAL JOURNAL OF DECISION SUPPORT SYSTEM TECHNOLOGY 2012年 第4期4卷 60-75页
作者: Wilkerson, Jerod W. Sam & Irene Black Sch Business Dept Informat Syst Erie PA 16563 USA
CHA-AS is a source code change impact analysis algorithm for Java programs. CHA-AS differs from other algorithms in that it does not require the program versions it compares to be whole programs with a well-defined pr... 详细信息
来源: 评论
Enhancing HPC System Log analysis by Identifying Message Origin in source code  29
Enhancing HPC System Log Analysis by Identifying Message Ori...
收藏 引用
29th IEEE International Symposium on Software Reliability Engineering (ISSRE)
作者: Hickman, Megan Fulp, Dakota Baseman, Elisabeth Blanchard, Sean Greenberg, Hugh Jones, William DeBardeleben, Nathan Los Alamos Natl Lab Ultrascale Syst Res Ctr High Performance Comp Los Alamos NM 87545 USA Coastal Carolina Univ Dept Comp Sci Conway SC 29528 USA
Supercomputers, high performance computers, and clusters are composed of very large numbers of independent operating systems that are generating their own system logs. Messages are generated locally on each host and u... 详细信息
来源: 评论
Multilanguage Detection of Design Pattern Instances
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2025年 第2期37卷
作者: Andrade, Hugo Bispo, Joao Correia, Filipe F. Univ Porto Fac Engn Porto Portugal INESC TEC Porto Portugal
code comprehension is often supported by source code analysis tools that provide more abstract views over software systems, such as those detecting design patterns. These tools encompass analysis of source code and en... 详细信息
来源: 评论
Boosting source code learning with text-oriented data augmentation: an empirical study
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2025年 第3期30卷 1-65页
作者: Dong, Zeming Hu, Qiang Guo, Yuejun Zhang, Zhenya Cordy, Maxime Papadakis, Mike Le Traon, Yves Zhao, Jianjun Univ Luxembourg Esch Sur Alzette Luxembourg Tianjin Univ Tianjin Peoples R China Luxembourg Inst Sci & Technol Esch Sur Alzette Luxembourg Kyushu Univ Fukuoka Japan
Recent studies have demonstrated remarkable advancements in source code learning, which applies deep neural networks (DNNs) to tackle various software engineering tasks. Similar to other DNN-based domains, source code... 详细信息
来源: 评论
The Software Bill of Materials
收藏 引用
COMPUTER 2025年 第4期58卷 115-120页
作者: Riehle, Dirk Friedrich Alexander Univ Erlangen Nurnberg Open Source Software D-91058 Erlangen Germany
Cybersecurity threats and software supply chain attacks are at an all-time high. Customers and agencies keep tightening the requirements for their software. An important recent development is the practical use of soft... 详细信息
来源: 评论
Question-Answer Methodology for Vulnerable source code Review via Prototype-Based Model-Agnostic Meta-Learning
收藏 引用
FUTURE INTERNET 2025年 第1期17卷 33-33页
作者: Corona-Fraga, Pablo Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda Karina Perez-Meana, Hector Portillo-Portillo, Jose Olivares-Mercado, Jesus Villalba, Luis Javier Garcia Ctr Invest Innovac Tecnol Informac & Comunicac Ave San Fernando 37 Mexico City 14050 Mexico Inst Politecn Nacl ESIME Culhuacan Mexico City 04440 Mexico Univ Complutense Madrid UCM Fac Comp Sci & Engn Dept Software Engn & Artificial Intelligence DISIA Off 431Grp Anal Secur & Syst GASS Calle Prof Jose Garcia Santesmases 9Ciudad Univ Madrid 28040 Spain
In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit ... 详细信息
来源: 评论