咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 4 篇 电气工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 14 篇 code pattern
  • 2 篇 program synthesi...
  • 2 篇 empirical study
  • 2 篇 reverse engineer...
  • 2 篇 data constraint
  • 2 篇 codes
  • 2 篇 library reuse
  • 2 篇 business rule
  • 2 篇 images
  • 1 篇 jpeg
  • 1 篇 mode division mu...
  • 1 篇 computer
  • 1 篇 evolution
  • 1 篇 framework-specif...
  • 1 篇 multiaddress con...
  • 1 篇 sql
  • 1 篇 program executio...
  • 1 篇 mimo communicati...
  • 1 篇 helical phase st...
  • 1 篇 application prog...

机构

  • 2 篇 peking univ sch ...
  • 2 篇 minist educ key ...
  • 1 篇 uoc icrea barcel...
  • 1 篇 cqse amer sunnyv...
  • 1 篇 indian inst tech...
  • 1 篇 natl chiao tung ...
  • 1 篇 ibm res peoples ...
  • 1 篇 tata consultancy...
  • 1 篇 univ andes sch e...
  • 1 篇 ostfalia univ ap...
  • 1 篇 indian inst tech...
  • 1 篇 department of in...
  • 1 篇 school of electr...
  • 1 篇 univ texas dalla...
  • 1 篇 univ waterloo de...
  • 1 篇 nanjing univ pos...
  • 1 篇 asia univ dept i...
  • 1 篇 asesoftware bogo...
  • 1 篇 national institu...
  • 1 篇 hangzhou dianzi ...

作者

  • 2 篇 zhu zixiao
  • 2 篇 wei shiyi
  • 2 篇 wu shijun
  • 2 篇 florez juan manu...
  • 2 篇 marcus andrian
  • 2 篇 xie bing
  • 2 篇 shen qi
  • 2 篇 zou yanzhen
  • 1 篇 david bainbridge
  • 1 篇 czarnecki krzysz...
  • 1 篇 wang lei
  • 1 篇 escobar daniel
  • 1 篇 salamanca alejan...
  • 1 篇 binbin xu
  • 1 篇 yu dongjin
  • 1 篇 casallas rubby
  • 1 篇 hoeppner frank
  • 1 篇 wenyu li
  • 1 篇 sari hikmet
  • 1 篇 bill rogers

语言

  • 14 篇 英文
检索条件"主题词=code pattern"
14 条 记 录,以下是1-10 订阅
排序:
Retrieving Data Constraint Implementations Using Fine-Grained code patterns  22
Retrieving Data Constraint Implementations Using Fine-Graine...
收藏 引用
ACM/IEEE 44th International Conference on Software Engineering (ICSE)
作者: Florez, Juan Manuel Perry, Jonathan Wei, Shiyi Marcus, Andrian Univ Texas Dallas Richardson TX 75083 USA
Business rules are an important part of the requirements of software systems that are meant to support an organization. These rules describe the operations, definitions, and constraints that apply to the organization.... 详细信息
来源: 评论
Engineering of Framework-Specific Modeling Languages
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2009年 第6期35卷 795-824页
作者: Antkiewicz, Michal Czarnecki, Krzysztof Stephan, Matthew Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
Framework-specific modeling languages (FSMLs) help developers build applications based on object-oriented frameworks. FSMLs model abstractions and rules of application programming interfaces (APIs) exposed by framewor... 详细信息
来源: 评论
Mode division multiple access: a new scheme based on orbital angular momentum in millimetre wave communications for fifth generation
收藏 引用
IET COMMUNICATIONS 2018年 第12期12卷 1416-1421页
作者: Wang, Lei Jiang, Fa Yuan, Zhe Yang, Jie Gui, Guan Sari, Hikmet Nanjing Univ Posts & Telecommun Natl & Local Joint Engn Lab RF Integrat & Microas Nanjing 210003 Jiangsu Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China
Compared with the conventional degrees of freedom, the orbital angular momentum (OAM), which describes the helical phase structure of electromagnetic wave, provides a new degree of freedom. As a new multiple access sc... 详细信息
来源: 评论
A New Data Transfer Method via Signal-Rich-Art code Images Captured by Mobile Devices
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 2015年 第4期25卷 688-700页
作者: Lee, Ya-Lin Tsai, Wen-Hsiang Natl Chiao Tung Univ Inst Comp Sci & Engn Hsinchu 30010 Taiwan Natl Chiao Tung Univ Dept Comp Sci Hsinchu 30010 Taiwan Asia Univ Dept Informat Commun Taichung 41354 Taiwan
A new type of signal-rich-art image for applications of data transfer, called signal-rich-art code image, is proposed. The created code image is visually similar to a preselected target image and, with a given message... 详细信息
来源: 评论
Towards an understanding of memory leak patterns: an empirical study in Python
收藏 引用
SOFTWARE QUALITY JOURNAL 2023年 第4期31卷 1303-1330页
作者: Chen, Jie Yu, Dongjin Hu, Haiyang Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Zhejiang Peoples R China
Memory leaks, an important and difficult issue in software development, occur when an object is inadvertently retained longer than necessary. Programming languages provide a variety of dynamic memory management method... 详细信息
来源: 评论
Model-based assisted migration of oracle forms applications: The overall process in an industrial setting
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2021年 第8期51卷 1641-1675页
作者: Rodriguez, Cristo Garces, Kelly Cabot, Jordi Casallas, Rubby Melo, Fabian Escobar, Daniel Salamanca, Alejandro Asesoftware Bogota Colombia Univ Andes Sch Engn Dept Syst & Comp Engn Bogota Colombia UOC ICREA Barcelona Spain
The migration of software is an economically important niche since the daily operations of many business still rely on systems based on legacy technologies. Migration to more recent technologies comes with major techn... 详细信息
来源: 评论
From API to NLI: A new interface for library reuse
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2020年 169卷 110728-110728页
作者: Shen, Qi Wu, Shijun Zou, Yanzhen Zhu, Zixiao Xie, Bing Minist Educ Key Lab High Confidence Software Technol Beijing 100871 Peoples R China Peking Univ Sch Elect Engn & Comp Sci Beijing 100871 Peoples R China IBM Res Beijing 100191 Peoples R China
Developers frequently reuse APIs from existing libraries to implement certain functionality. However, learning APIs is difficult due to their large scale and complexity. In this paper, we design an abstract framework ... 详细信息
来源: 评论
A New code Obfuscation Scheme for Software Protection
A New Code Obfuscation Scheme for Software Protection
收藏 引用
8th IEEE International Symposium on Service Oriented System Engineering (SOSE)
作者: Kulkarni, Aniket Metta, Ravindra Tata Consultancy Serv TCS Res Pune 411013 Maharashtra India
IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. code obfuscation techniques counter such attacks by transforming code into patterns tha... 详细信息
来源: 评论
LOW BIT-RATE COMPRESSION OF VIDEO AND LIGHT-FIELD DATA USING codeD SNAPSHOTS AND LEARNED DICTIONARIES  17
LOW BIT-RATE COMPRESSION OF VIDEO AND LIGHT-FIELD DATA USING...
收藏 引用
IEEE 17th International Workshop on Multimedia Signal Processing (MMSP 2015)
作者: Choudhury, Chandrajit Tarun, Yellamraju Rajwade, Ajit Chaudhuri, Subhasis Indian Inst Technol Dept Elect Engn Bombay Maharashtra India Indian Inst Technol Dept Comp Sci & Engn Bombay Maharashtra India
The method of coded snapshots has been proposed recently for compressive acquisition of video data to overcome the space-time trade-of inherent in video acquisition. The method involves modulation of the light enterin... 详细信息
来源: 评论
NLI2code: Reusing Libraries with Natural Language Interface  18th
NLI2Code: Reusing Libraries with Natural Language Interface
收藏 引用
18th International Conference on Software and Systems Reuse (ICSR)
作者: Shen, Qi Xie, Bing Zou, Yanzhen Zhu, Zixiao Wu, Shijun Minist Educ Key Lab High Confidence Software Technol Beijing 100871 Peoples R China Peking Univ Sch Elect Engn & Comp Sci Beijing 100871 Peoples R China
Modern software development typically involves composing functionality by reusing existing libraries. This task is difficult due to the gap of abstraction levels between user tasks and APIs. In this paper we propose a... 详细信息
来源: 评论