咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 12 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 电气工程
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 17 篇 program dependen...
  • 3 篇 deep learning
  • 2 篇 control flow
  • 2 篇 software mainten...
  • 1 篇 internet of thin...
  • 1 篇 algorithm visual...
  • 1 篇 graph neural net...
  • 1 篇 software code cl...
  • 1 篇 probabilistic ca...
  • 1 篇 software visuali...
  • 1 篇 automatic assess...
  • 1 篇 suspicious code
  • 1 篇 codebert
  • 1 篇 control flow gra...
  • 1 篇 code similarity
  • 1 篇 code representat...
  • 1 篇 program slicing
  • 1 篇 software clone d...
  • 1 篇 code review
  • 1 篇 debugging

机构

  • 1 篇 penn state univ ...
  • 1 篇 univ queensland ...
  • 1 篇 natl taiwan univ...
  • 1 篇 northeastern uni...
  • 1 篇 kagawa univ fac ...
  • 1 篇 leshan normal un...
  • 1 篇 majmaah univ col...
  • 1 篇 guizhou educ uni...
  • 1 篇 natl inst techno...
  • 1 篇 jazan univ fac c...
  • 1 篇 beijing univ pos...
  • 1 篇 bharath univ com...
  • 1 篇 bombardier trans...
  • 1 篇 sichuan univ sch...
  • 1 篇 northeastern uni...
  • 1 篇 near east univ r...
  • 1 篇 northeastern uni...
  • 1 篇 pdeas coem dept ...
  • 1 篇 indian inst info...
  • 1 篇 natl elect & com...

作者

  • 2 篇 zhao yuhai
  • 2 篇 yin ying
  • 1 篇 huang cheng
  • 1 篇 liu shen
  • 1 篇 naeem muhammad r...
  • 1 篇 roy swarup
  • 1 篇 zeng minchuan
  • 1 篇 xu junjie
  • 1 篇 sun cong
  • 1 篇 xiang chengguan
  • 1 篇 indumathi c. p.
  • 1 篇 sheneamer abdull...
  • 1 篇 zhang yumei
  • 1 篇 singh paramvir
  • 1 篇 al-turjman fadi
  • 1 篇 gautam pratiksha
  • 1 篇 meananeatra pani...
  • 1 篇 chen chen
  • 1 篇 zhou qiyun
  • 1 篇 xin yang

语言

  • 17 篇 英文
检索条件"主题词=program dependency graph"
17 条 记 录,以下是1-10 订阅
排序:
Enhancing program dependency graph Based Clone Detection using Approximate Subgraph Matching  11
Enhancing Program Dependency Graph Based Clone Detection usi...
收藏 引用
11th IEEE International Workshop on Software Clones (IWSC)
作者: Kamalpriya, C. M. Singh, Paramvir Bombardier Transportat India Pvt Ltd Vadodara India Natl Inst Technol Jalandhar India
Software code clone detection techniques and tools play a major role in improving the software quality as well as saving maintenance cost and effort. program dependency graph (PDG) based clone detection techniques hav... 详细信息
来源: 评论
Dbux-PDG: An Interactive program dependency graph for Data Structures and Algorithms
Dbux-PDG: An Interactive Program Dependency Graph for Data S...
收藏 引用
10th IEEE Working Conference on Software Visualization (IEEE VISSOFT)
作者: Seifert, Dominik Wan, Michael Hsu, Jane Yeh, Benson Natl Taiwan Univ Comp Sci & Informat Engn Taipei Taiwan Natl Taiwan Univ Math Taipei Taiwan Natl Taiwan Univ Elect Engn Taipei Taiwan
Understanding and debugging of data structures and algorithms (DSA) is one of the most common tasks in computer science. DSA tests have also become a standard threshold that software developers have to cross to "... 详细信息
来源: 评论
Probabilistic reasoning in diagnosing causes of program failures
收藏 引用
SOFTWARE TESTING VERIFICATION & RELIABILITY 2016年 第3期26卷 176-210页
作者: Xu, Junjie Chen, Rong Du, Zhenjun Dalian Maritime Univ Coll Informat Sci & Technol Dalian 116026 Peoples R China
Fault localization is sensitive to program runs, and the pattern of fault propagation and manifestation in real software is extremely complex and uncertain. To accommodate the complexity and uncertainty, this paper pr... 详细信息
来源: 评论
A detection framework for semantic code clones and obfuscated code
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2018年 97卷 405-420页
作者: Sheneamer, Abdullah Roy, Swarup Kalita, Jugal Jazan Univ Fac Comp Sci & Informat Syst Jazan 45142 Saudi Arabia Univ Colorado Coll Engn & Appl Sci Colorado Springs CO 80918 USA Sikkim Univ Dept Comp Applicat Sikkim 737102 Gangtok India North Eastern Hill Univ Dept Informat Technol Shillong 793022 Meghalayn India
Code obfuscation is a staple tool in malware creation where code fragments are altered substantially to make them appear different from the original, while keeping the semantics unaffected. A majority of the obfuscate... 详细信息
来源: 评论
Multi-graph learning-based software defect location
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2024年 第4期36卷
作者: Yin, Ying Shi, Yucen Zhao, Yuhai Wahab, Fazal Northeastern Univ Sch Comp Sci & Technol Shenyang 110819 Peoples R China Northeastern Univ Key Lab Intelligent Comp Med Image Minist Educ Shenyang 110819 Peoples R China
Software quality is key to the success of software systems. Modern software systems are growing in their worth based on industry needs and becoming more complex, which inevitably increases the possibility of more defe... 详细信息
来源: 评论
graph semantic similarity-based automatic assessment for programming exercises
收藏 引用
SCIENTIFIC REPORTS 2024年 第1期14卷 1-14页
作者: Xiang, Chengguan Wang, Ying Zhou, Qiyun Yu, Zhen Cent China Normal Univ Fac Artificial Intelligence Educ Wuhan 430079 Peoples R China Guizhou Educ Univ Sch Math & Big Data Guiyang 550018 Peoples R China
This paper proposes an algorithm for the automatic assessment of programming exercises. The algorithm assigns assessment scores based on the program dependency graph structure and the program semantic similarity, but ... 详细信息
来源: 评论
Extended Differential Control Flow graphs for the Selection of Test Cases in Regression Testing  15
Extended Differential Control Flow Graphs for the Selection ...
收藏 引用
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Akimoto, Shun Nakanishi, Shunta Yaegashi, Rihito Takagi, Tomohiko Kagawa Univ Grad Sch Engn Takamatsu Kagawa Japan Kagawa Univ Fac Engn Takamatsu Kagawa Japan
This paper shows an EDCFG (extended differential control flow graph) to improve the accuracy of UCNs (update complexity numbers) that are utilized for the selection of existing test cases in regression testing.
来源: 评论
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking  21
Sdft: A PDG-based Summarization for Efficient Dynamic Data F...
收藏 引用
21st IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Kan, Xiao Sun, Cong Liu, Shen Huang, Yongzhe Tan, Gang Ma, Siqi Zhang, Yumei Xidian Univ Xian Peoples R China NVIDIA Santa Clara CA USA Penn State Univ University Pk PA 16802 USA Univ Queensland Brisbane Qld Australia
Dynamic taint analysis (DTA) has been widely used in various security-relevant scenarios that need to track the runtime information flow of programs. Dynamic binary instrumentation (DBI) is a prevalent technique in ac... 详细信息
来源: 评论
Various Code Clone Detection Techniques and Tools: A Comprehensive Survey  1st
Various Code Clone Detection Techniques and Tools: A Compreh...
收藏 引用
1st International Conference on Smart Trends for Information Technology and Computer Communications (SmartCom)
作者: Gautam, Pratiksha Saini, Hemraj Jaypee Univ Informat Technol Dept Comp Sci & Engn Waknaghat 173234 Solan India
In this paper, we have discussed several code replication detection methods and tools in different dimensions. This review has provided an extensive survey codec clone detection techniques and tools. Starting from clo... 详细信息
来源: 评论
An Effective Approach Using Dissimilarity Measures To Estimate Software Code Clone
An Effective Approach Using Dissimilarity Measures To Estima...
收藏 引用
International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)
作者: Patil, Ritesh V. Joshi, Shashank. D. Shinde, Sachin V. Khanna, V. Bharath Univ Comp Engn Madras Tamil Nadu India BVDUCOE Comp Engn Pune Maharashtra India PDEAs COEM Dept Comp Engn Pune Maharashtra India Bharath Univ Dept IT Madras Tamil Nadu India
Software based clone detection is in hype as industries demand to such product has risen. Due to code replication means the copy and paste activities, such pattern is recurrent thereby developers can reduce effort and... 详细信息
来源: 评论