咨询与建议

限定检索结果

文献类型

  • 1,969 篇 期刊文献
  • 881 篇 会议
  • 357 篇 学位论文
  • 129 册 图书
  • 1 篇 成果

馆藏范围

  • 3,337 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,888 篇 工学
    • 1,930 篇 计算机科学与技术...
    • 1,403 篇 软件工程
    • 508 篇 仪器科学与技术
    • 258 篇 电气工程
    • 156 篇 信息与通信工程
    • 94 篇 测绘科学与技术
    • 86 篇 机械工程
    • 80 篇 地质资源与地质工...
    • 79 篇 网络空间安全
    • 74 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 17 篇 化学工程与技术
    • 16 篇 交通运输工程
    • 15 篇 公安技术
  • 326 篇 管理学
    • 279 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 17 篇 公共管理
    • 14 篇 工商管理
  • 219 篇 理学
    • 85 篇 地理学
    • 31 篇 生物学
    • 30 篇 物理学
    • 27 篇 数学
    • 23 篇 地球物理学
    • 20 篇 化学
    • 12 篇 天文学
  • 208 篇 教育学
    • 188 篇 教育学
    • 20 篇 心理学(可授教育学...
  • 44 篇 医学
    • 20 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 17 篇 艺术学
  • 16 篇 经济学
    • 15 篇 应用经济学
  • 16 篇 法学
  • 15 篇 文学
  • 14 篇 农学
  • 2 篇 军事学
  • 1 篇 历史学

主题

  • 3,337 篇 javascript
  • 243 篇 ajax
  • 205 篇 html
  • 160 篇 web
  • 158 篇 html5
  • 132 篇 css
  • 118 篇 xml
  • 92 篇 java
  • 84 篇 webgis
  • 78 篇 asp
  • 72 篇 dom
  • 67 篇 浏览器
  • 66 篇 node.js
  • 59 篇 php
  • 55 篇 jquery
  • 51 篇 vrml
  • 51 篇 static analysis
  • 49 篇 网页
  • 46 篇 api
  • 43 篇 数据库

机构

  • 29 篇 电子科技大学
  • 24 篇 吉林大学
  • 23 篇 北京邮电大学
  • 20 篇 山东大学
  • 19 篇 辽宁师范大学
  • 17 篇 northeastern uni...
  • 16 篇 武汉大学
  • 15 篇 华中科技大学
  • 15 篇 四川大学
  • 14 篇 广东工业大学
  • 14 篇 东北大学
  • 13 篇 西南交通大学
  • 12 篇 四川职业技术学院
  • 12 篇 aarhus univ aarh...
  • 11 篇 南京大学
  • 11 篇 西安电子科技大学
  • 10 篇 东南大学
  • 10 篇 同济大学
  • 10 篇 武汉理工大学
  • 10 篇 上海交通大学

作者

  • 22 篇 tip frank
  • 19 篇 mesbah ali
  • 17 篇 ryu sukyoung
  • 14 篇 pattabiraman kar...
  • 12 篇 程晨
  • 12 篇 moon soo-mook
  • 11 篇 bonetta daniele
  • 11 篇 moller anders
  • 10 篇 pradel michael
  • 9 篇 de roover coen
  • 8 篇 binder walter
  • 8 篇 turcotte alexi
  • 8 篇 nicolay jens
  • 8 篇 flanagan cormac
  • 8 篇 krishnamurthi sh...
  • 8 篇 guha arjun
  • 7 篇 bibi stamatia
  • 7 篇 shihab emad
  • 7 篇 abdalkareem rabe
  • 7 篇 serrano manuel

语言

  • 2,021 篇 中文
  • 1,271 篇 英文
  • 43 篇 其他
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"主题词=javaScript"
3337 条 记 录,以下是201-210 订阅
排序:
Collecting Type Information Using Unit Tests for Customizing javascript Virtual Machines  12
Collecting Type Information Using Unit Tests for Customizing...
收藏 引用
14th Workshop on Implementation, Compilation and Optimization of Object-Oriented Languages, Programs and Systems (ICOOOLPS)
作者: Ugawa, Tomoharu Iwasaki, Hideya Kataoka, Takafumi Kochi Univ Technol Kami Kochi Japan Univ Electrocommun Chofu Tokyo Japan
To use javascript for Internet of Things (IoT), it is essential to reduce the size of the virtual machine (VM). Although operators in javascript are polymorphic, many applications apply operators to only a limited set... 详细信息
来源: 评论
Challenging Machine Learning Algorithms in Predicting Vulnerable javascript Functions  7
Challenging Machine Learning Algorithms in Predicting Vulner...
收藏 引用
7th IEEE/ACM International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE)
作者: Ferenc, Rudolf Hegedus, Peter Gyimesi, Peter Antal, Gabor Ban, Denes Gyimothy, Tibor MTA SZTE Res Grp Artificial Intelligence Szeged Hungary Univ Szeged Dept Software Engn Szeged Hungary
The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of all attacks exploit known types of security issues, findi... 详细信息
来源: 评论
Mime Artist: Bypassing Whitelisting for the Web with javascript Mimicry Attacks  24th
Mime Artist: Bypassing Whitelisting for the Web with JavaScr...
收藏 引用
24th European Symposium on Research in Computer Security (ESORICS)
作者: Chaliasos, Stefanos Metaxopoulos, George Argyros, George Mitropoulos, Dimitris Athens Univ Econ & Business Dept Management Sci & Technol Athens Greece Columbia Univ Dept Comp Sci New York NY 10027 USA
Despite numerous efforts to mitigate Cross-Site Scripting (xss) attacks, xss remains one of the most prevalent threats to modern web applications. Recently, a number of novel xss patterns, based on code-reuse and obfu... 详细信息
来源: 评论
An Empirical Study of Prioritizing javascript Engine Crashes via Machine Learning  19
An Empirical Study of Prioritizing JavaScript Engine Crashes...
收藏 引用
ACM Asia Conference on Computer and Communications Security (Asia CCS)
作者: Park, Sunnyeo Kim, Dohyeok Son, Sooel Korea Adv Inst Sci & Technol Daejeon South Korea
The early discovery of security bugs in javascript (JS) engines is crucial for protecting Internet users from adversaries abusing zero-day vulnerabilities. Browser vendors, bug bounty hunters, and security researchers... 详细信息
来源: 评论
Evaluation and Comparison of Dynamic Call Graph Generators for javascript  14
Evaluation and Comparison of Dynamic Call Graph Generators f...
收藏 引用
14th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE)
作者: Herczeg, Zoltan Loki, Gabor Univ Szeged Dept Software Engn Dugon Ter 13 H-6720 Szeged Hungary
javascript is the most popular programming language these days and it is also the core language of the *** environment. Sharing code is a simple task in this environment and the shared code can be easily reused as bui... 详细信息
来源: 评论
Automatic Modeling of Opaque Code for javascript Static Analysis  22nd
Automatic Modeling of Opaque Code for JavaScript Static Anal...
收藏 引用
22nd International Conference on Fundamental Approaches to Software Engineering (FASE) held as part of the Annual European Joint Conferences on Theory and Practice of Software (ETAPS)
作者: Park, Joonyoung Jordan, Alexander Ryu, Sukyoung Oracle Labs Australia Brisbane Qld Australia Korea Adv Inst Sci & Technol Daejeon South Korea
Static program analysis often encounters problems in analyzing library code. Most real-world programs use library functions intensively, and library functions are usually written in different languages. For example, s... 详细信息
来源: 评论
Analyzing the Evolution of javascript Applications  14
Analyzing the Evolution of Javascript Applications
收藏 引用
14th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE)
作者: Chatzimparmpas, Angelos Bibi, Stamatia Zozas, Ioannis Kerren, Andreas Linnaeus Univ Dept Comp Sci & Media Technol Vaxjo Sweden Univ Western Macedonia Dept Informat & Telecommun Engn Kozani Greece
Software evolution analysis can shed light on various aspects of software development and maintenance. Up to date, there is little empirical evidence on the evolution of javascript (JS) applications in terms of mainta... 详细信息
来源: 评论
NL2Type: Inferring javascript Function Types from Natural Language Information  19
NL2Type: Inferring JavaScript Function Types from Natural La...
收藏 引用
41st IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Malik, Rabee Sohail Patra, Jibesh Pradel, Michael Tech Univ Darmstadt Darmstadt Germany
javascript is dynamically typed and hence lacks the type safety of statically typed languages, leading to suboptimal IDE support, difficult to understand APIs, and unexpected run-time behavior. Several gradual type sy... 详细信息
来源: 评论
Clone Detection Techniques for javascript and Language Independence: Review
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2020年 第4期11卷 787-795页
作者: Alfageh, Danyah Alhakami, Hosam Baz, Abdullah Alanazi, Eisa Alsubait, Tahani Umm Al Qura Univ Coll Comp & Informat Syst Mecca Saudi Arabia
Code clone detection is an active field of study in computer science. Despite its rich history, it lacks focus on web scripting languages. Due to the expansion of web applications and web development amongst developer... 详细信息
来源: 评论
Scalable Comparison of javascript V8 Bytecode Traces  11
Scalable Comparison of JavaScript V8 Bytecode Traces
收藏 引用
11th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages (VMIL)
作者: Arteaga, Javier Cabrera Monperrus, Martin Baudry, Benoit KTH Royal Inst Technol Stockholm Sweden
The comparison and alignment of runtime traces are essential, e.g., for semantic analysis or debugging. However, naive sequence alignment algorithms cannot address the needs of the modern web: (i) the bytecode generat... 详细信息
来源: 评论