咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 6 篇 data dependency ...
  • 1 篇 visualisation
  • 1 篇 control flow gra...
  • 1 篇 program module s...
  • 1 篇 deep learning
  • 1 篇 code representat...
  • 1 篇 loop program syn...
  • 1 篇 ddg
  • 1 篇 and/or process m...
  • 1 篇 data dependency
  • 1 篇 and parallelism
  • 1 篇 information flow
  • 1 篇 recurrence relat...
  • 1 篇 vulnerability de...
  • 1 篇 data flow
  • 1 篇 parallel program...
  • 1 篇 abstract syntax ...
  • 1 篇 defect predictio...
  • 1 篇 cnn
  • 1 篇 angr analysis

机构

  • 1 篇 wuhan text univ ...
  • 1 篇 sungshin womens ...
  • 1 篇 arizona state un...
  • 1 篇 department of in...
  • 1 篇 school of inform...
  • 1 篇 information scie...
  • 1 篇 institute of mat...
  • 1 篇 engn res ctr hub...
  • 1 篇 department of in...
  • 1 篇 hubei prov engn ...
  • 1 篇 univ of south au...
  • 1 篇 department of co...

作者

  • 1 篇 jiang minghua
  • 1 篇 he ruhan
  • 1 篇 choe km
  • 1 篇 oinonen j
  • 1 篇 fanfan shen
  • 1 篇 lee sh
  • 1 篇 yong chen
  • 1 篇 trichina e
  • 1 篇 čyras vytautas
  • 1 篇 liu junping
  • 1 篇 lv xinghang
  • 1 篇 hu xinrong
  • 1 篇 jing selena he
  • 1 篇 kim dh
  • 1 篇 haveraaen magne
  • 1 篇 sheng xiao
  • 1 篇 cao wenli
  • 1 篇 chen jia
  • 1 篇 capuano bailey
  • 1 篇 peng tao

语言

  • 6 篇 英文
检索条件"主题词=data dependency graph"
6 条 记 录,以下是1-10 订阅
排序:
PATH FOR AND-PARALLEL EXECUTION OF LOGIC PROGRAMS
收藏 引用
INFORMATION PROCESSING LETTERS 1994年 第4期52卷 191-199页
作者: LEE, SH KIM, DH CHOE, KM SUNGSHIN WOMENS UNIV DEPT COMP SCISEOUL 136742SOUTH KOREA
An efficient backward execution method for AND-parallelism in logic programs is proposed. It is devised through a close examination of some relation over literals, which can be represented by paths in the data depende... 详细信息
来源: 评论
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
收藏 引用
APPLIED INTELLIGENCE 2023年 第12期53卷 15204-15221页
作者: Lv, Xinghang Peng, Tao Chen, Jia Liu, Junping Hu, Xinrong He, Ruhan Jiang, Minghua Cao, Wenli Wuhan Text Univ Sch Comp Sci & Artificial Intelligence Wuhan 430200 Hubei Peoples R China Hubei Prov Engn Res Ctr Intelligent Text & Fash Wuhan 430200 Hubei Peoples R China Engn Res Ctr Hubei Prov Clothing Informat Wuhan 430200 Hubei Peoples R China
Automatically detecting buffer overflow vulnerabilities is an important research topic in software security. Recent studies have shown that vulnerability detection performance utilizing deep learning-based techniques ... 详细信息
来源: 评论
Compiler IR-Based Program Encoding Method for Software Defect Prediction
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 5251-5272页
作者: Yong Chen Chao Xu Jing Selena He Sheng Xiao Fanfan Shen School of Information Engineering Nanjing Audit UniversityNanjing211815China Department of Computer Science Kennesaw State UniversityKennesaw30144-5588USA Information Science and Engineering Department Hunan First Normal UniversityChangsha410205China
With the continuous expansion of software applications,people’s requirements for software quality are *** defect prediction is an important technology to improve software *** often encodes the software into several f... 详细信息
来源: 评论
Modular programming of recurrences: A comparison of two approaches
收藏 引用
Informatica (Netherlands) 1995年 第4期6.0卷 397-444页
作者: Čyras, Vytautas Haveraaen, Magne Department of Informatics Vilnius University Vilnius 2600 Naugarduko St. 24 Lithuania Institute of Mathematics and Informatics Vilnius 2600 Akademijos St. 4 Lithuania Department of Informatics University of Bergen Bergen N-5020 Hø Yteknologisenteret Norway
We present two methods for expressing computations based on recurrence relations and discuss their relative merits. One method, the structural blanks approach, is built on top of traditional programming languages like... 详细信息
来源: 评论
Parallel program design in visual environment
Parallel program design in visual environment
收藏 引用
4th International Conference on High-Performance Computing (HiPC 97)
作者: Trichina, E Oinonen, J Univ of South Australia The Levels
The great challenge in parallel computing is to make a task of programming parallel machines easy while not sacrificing the efficiency of target code. One of the successful methodologies is to start from a high-level ... 详细信息
来源: 评论
Visualizing Information Flow graph-Based Approach to Tracing data Dependencies for Binary Analysis
Visualizing Information Flow Graph-Based Approach to Tracing...
收藏 引用
作者: Capuano, Bailey Arizona State University
学位级别:M.S., Master of Science/Master of Surgery
Binary analysis and software debugging are critical tools in the modern software security ecosystem. With the security arms race between attackers discovering and exploiting vulnerabilities and the development teams p... 详细信息
来源: 评论