咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 1 篇 光学工程
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 21 篇 code patterns
  • 3 篇 github
  • 3 篇 android
  • 2 篇 abuse
  • 2 篇 harm
  • 2 篇 twitter
  • 2 篇 static analysis
  • 2 篇 bots
  • 1 篇 control patterns
  • 1 篇 inspiration sour...
  • 1 篇 profiling
  • 1 篇 compilers
  • 1 篇 test code
  • 1 篇 access control
  • 1 篇 code quality
  • 1 篇 automated progra...
  • 1 篇 deductive code s...
  • 1 篇 software bugs
  • 1 篇 deep learning
  • 1 篇 test case covera...

机构

  • 2 篇 politecn milan v...
  • 2 篇 nanyang technol ...
  • 1 篇 univ coimbra cis...
  • 1 篇 univ firenze flo...
  • 1 篇 alan turing inst...
  • 1 篇 university of te...
  • 1 篇 inesc tec porto
  • 1 篇 natl chiao tung ...
  • 1 篇 acad sinica inst...
  • 1 篇 tsinghua univ ke...
  • 1 篇 univ british col...
  • 1 篇 peking univ mini...
  • 1 篇 north carolina s...
  • 1 篇 univ porto fac e...
  • 1 篇 microsoft res re...
  • 1 篇 univ calif davis...
  • 1 篇 liacc porto
  • 1 篇 nantes univ ls2n...
  • 1 篇 clausthal univer...
  • 1 篇 univ texas dalla...

作者

  • 2 篇 zhang hongyu
  • 2 篇 fu jicheng
  • 2 篇 yen i-ling
  • 2 篇 zhang lu
  • 2 篇 tan hee beng kua...
  • 2 篇 millimaggi andre...
  • 2 篇 fernandes joao p...
  • 2 篇 daniel florian
  • 1 篇 ceccarelli andre...
  • 1 篇 bulmer jeff
  • 1 篇 verma anshuman
  • 1 篇 hui bowen
  • 1 篇 eom tj
  • 1 篇 lin xi
  • 1 篇 feng wu-chun
  • 1 篇 montecchi leonar...
  • 1 篇 barr earl t.
  • 1 篇 gregorio nelson
  • 1 篇 john heaps
  • 1 篇 booth skip

语言

  • 21 篇 英文
检索条件"主题词=code patterns"
21 条 记 录,以下是1-10 订阅
排序:
Checking enforcement of integrity constraints in database applications based on code patterns
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2011年 第12期84卷 2253-2264页
作者: Zhang, Hongyu Tan, Hee Beng Kuan Zhang, Lu Lin, Xi Wang, Xiaoyin Zhang, Chun Mei, Hong Tsinghua Univ Key Lab Informat Syst Secur Minist Educ Beijing 100084 Peoples R China Tsinghua Natl Lab Informat Sci & Technol Beijing 100084 Peoples R China Nanyang Technol Univ Singapore 639798 Singapore Peking Univ Minist Educ Key Lab High Confidence Software Technol Beijing 100871 Peoples R China
Integrity constraints (including key, referential and domain constraints) are unique features of database applications. Integrity constraints are crucial for ensuring accuracy and consistency of data in a database. It... 详细信息
来源: 评论
On Twitter Bots Behaving Badly: A Manual and Automated Analysis of Python code patterns on GitHub
收藏 引用
JOURNAL OF WEB ENGINEERING 2020年 第8期18卷 801-835页
作者: Millimaggi, Andrea Daniel, Florian Politecn Milan Via Ponzio 34-5 I-20133 Milan Italy
Bots, i.e., algorithmically driven entities that behave like humans in online communications, are increasingly infiltrating social conversations on the Web. If not properly prevented, this presence of bots may cause h... 详细信息
来源: 评论
Detecting Infeasible Branches Based on code patterns
Detecting Infeasible Branches Based on Code Patterns
收藏 引用
Software Evolution Week / IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
作者: Ding, Sun Zhang, Hongyu Tan, Hee Beng Kuan Nanyang Technol Univ Singapore 639798 Singapore Tsinghua Univ Beijing 100084 Peoples R China
Infeasible branches are program branches that can never be exercised regardless of the inputs of the program. Detecting infeasible branches is important to many software engineering tasks such as test case generation ... 详细信息
来源: 评论
Visualizing code patterns in Novice Programmers  18
Visualizing Code Patterns in Novice Programmers
收藏 引用
23rd Western Canadian Conference on Computing Education
作者: Bulmer, Jeff Pinchbeck, Angie Hui, Bowen Univ British Columbia Dept Comp Sci Vancouver BC Canada
Many researchers have investigated the difficulties faced by novice programmers. However, these approaches have so far focused primarily on the identification and correction of common syntax errors, or that of topic d... 详细信息
来源: 评论
Deductive glue code synthesis for embedded software systems based on code patterns
Deductive glue code synthesis for embedded software systems ...
收藏 引用
9th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
作者: Liu, Jian Fu, Jicheng Zhang, Yansheng Bastani, Farokh Yen, I-Ling Tai, Ann Chau, Savio Univ Texas Dept Comp Sci Richardson TX 75083 USA
Automated code synthesis is a constructive process that can be used to generate programs from specifications. It can, thus, greatly reduce the software development cost and time. The use of formal code synthesis appro... 详细信息
来源: 评论
On Twitter Bots Behaving Badly: Empirical Study of code patterns on GitHub  19th
On Twitter Bots Behaving Badly: Empirical Study of Code Patt...
收藏 引用
19th International Conference on Web Engineering (ICWE)
作者: Millimaggi, Andrea Daniel, Florian Politecn Milan Via Ponzio 34-5 I-20133 Milan Italy
Bots, i.e., algorithmically driven entities that behave like humans in online communications, are increasingly infiltrating social conversations on the Web. If not properly prevented, this presence of bots may cause h... 详细信息
来源: 评论
code patterns for agent-oriented programming  09
Code patterns for agent-oriented programming
收藏 引用
International Conference on Autonomous Agents and Multiagent Systems
作者: Peter Novak Wojciech Jamroga Clausthal University of Technology
The mainstream approach to design of BDI-inspired agent programming languages is to choose a set of agent-oriented features with a particular semantics and their subsequent implementation in the programming language i... 详细信息
来源: 评论
Advancements in automated program repair: a comprehensive review
收藏 引用
KNOWLEDGE AND INFORMATION SYSTEMS 2025年 1-47页
作者: Dikici, Sena Bilgin, Turgay Tugay Bursa Tech Univ Comp Engn Dept Bursa Turkiye
This review paper presents a comprehensive examination of automated program repair (APR) and its significant contribution to the field of modern software engineering. It elucidates how APR methodologies markedly mitig... 详细信息
来源: 评论
Mining Semantic Loop Idioms
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2018年 第7期44卷 651-668页
作者: Allamanis, Miltiadis Barr, Earl T. Bird, Christian Devanbu, Premkumar Marron, Mark Sutton, Charles Univ Edinburgh Edinburgh EH8 9YL Midlothian Scotland Microsoft Res Cambridge England UCL London WC1E 6BT England Microsoft Res Redmond WA 98052 USA Univ Calif Davis Davis CA 95616 USA Alan Turing Inst London NW1 2DB England
To write code, developers stitch together patterns, like API protocols or data structure traversals. Discovering these patterns can identify inconsistencies in code or opportunities to replace these patterns with an A... 详细信息
来源: 评论
Mining control patterns from Java program corpora
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2004年 第1期20卷 57-83页
作者: Chen, DJ Hwang, CC Huang, SK Chen, DTK Natl Chiao Tung Univ Dept Comp Sci & Informat Engn Hsinchu 300 Taiwan Fordham Univ Dept Comp & Informat Sci Bronx NY USA Acad Sinica Inst Informat Sci Taipei 115 Taiwan
Java programming, based on the Object-Oriented (OO) paradigm, has played a major role in program design and implementation due to the fact that it is extensible, maintainable, and reusable in software system construct... 详细信息
来源: 评论