咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 232 册 图书
  • 209 篇 期刊文献
  • 7 篇 学位论文
  • 3 件 标准

馆藏范围

  • 903 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 624 篇 工学
    • 406 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 178 篇 电气工程
    • 41 篇 生物工程
    • 39 篇 信息与通信工程
    • 36 篇 机械工程
    • 32 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 6 篇 网络空间安全
    • 5 篇 交通运输工程
    • 3 篇 航空宇航科学与技...
  • 78 篇 理学
    • 45 篇 生物学
    • 9 篇 系统科学
    • 7 篇 数学
    • 7 篇 地球物理学
    • 5 篇 物理学
    • 5 篇 化学
    • 3 篇 科学技术史(分学科...
    • 3 篇 统计学(可授理学、...
  • 42 篇 农学
    • 41 篇 作物学
  • 38 篇 管理学
    • 35 篇 管理科学与工程(可...
  • 18 篇 教育学
    • 16 篇 教育学
  • 8 篇 医学
    • 4 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 7 篇 法学
    • 4 篇 社会学
  • 4 篇 文学
    • 3 篇 新闻传播学
  • 4 篇 历史学
    • 3 篇 考古学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 903 篇 source code
  • 148 篇 program
  • 134 篇 software
  • 89 篇 disk
  • 83 篇 data
  • 72 篇 code
  • 65 篇 computer softwar...
  • 62 篇 hard disk
  • 58 篇 file
  • 48 篇 ibm
  • 44 篇 turbo pascal
  • 43 篇 power supply
  • 43 篇 operating system
  • 42 篇 codes
  • 37 篇 programming
  • 35 篇 turbo
  • 35 篇 disk drive
  • 34 篇 source
  • 34 篇 open source soft...
  • 34 篇 magazine

机构

  • 8 篇 inria
  • 5 篇 univ trento tren...
  • 4 篇 hebei univ sch c...
  • 4 篇 inria rmod team ...
  • 4 篇 univ paris
  • 3 篇 osaka univ grad ...
  • 3 篇 innopolis univ i...
  • 3 篇 budapest univ te...
  • 3 篇 duke nus med sch...
  • 3 篇 delft univ techn...
  • 3 篇 free univ tbilis...
  • 3 篇 heidelberg univ ...
  • 3 篇 univ zurich dept...
  • 2 篇 univ waterloo wa...
  • 2 篇 mit lincoln lab ...
  • 2 篇 yangzhou univ sc...
  • 2 篇 univ texas san a...
  • 2 篇 hong kong polyte...
  • 2 篇 tomsk state univ...
  • 2 篇 univ fed minas g...

作者

  • 11 篇 zacchiroli stefa...
  • 7 篇 sharif bonita
  • 6 篇 li zhen
  • 6 篇 inoue katsuro
  • 5 篇 peterson cole s.
  • 5 篇 gupta atul
  • 5 篇 ducasse stephane
  • 5 篇 haiduc sonia
  • 5 篇 rai sawan
  • 4 篇 yu willie
  • 4 篇 huebner paul
  • 4 篇 lanza michele
  • 4 篇 paech barbara
  • 4 篇 belwal ramesh ch...
  • 4 篇 ali nasir
  • 4 篇 gueheneuc yann-g...
  • 4 篇 marchetto alessa...
  • 4 篇 anquetil nicolas
  • 4 篇 pietri antoine
  • 4 篇 kakushadze zura

语言

  • 881 篇 英文
  • 11 篇 中文
  • 9 篇 其他
  • 1 篇 德文
  • 1 篇 塞尔维亚文
检索条件"主题词=source code"
903 条 记 录,以下是1-10 订阅
排序:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension
收藏 引用
COMPUTERS & SECURITY 2024年 141卷
作者: Tang, Gaigai Yang, Lin Zhang, Long Kuang, Hongyu Wang, Huiqiang Henan Univ Sch Software Kaifeng 475004 Peoples R China Harbin Engn Univ Sch Comp Sci & Technol Harbin 150000 Peoples R China Acad Mil Sci Inst Syst Engn Natl Key Lab Sci & Technol Informat Syst Secur Beijing 100000 Peoples R China
Recently, automatic vulnerability detection approaches based on machine learning (ML) have outperformed traditional rule -based approaches in terms of detection performance. Existing ML -based approaches typically con... 详细信息
来源: 评论
Comparing the Pretrained Models of source code by Re-pretraining Under a Unified Setup
收藏 引用
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024年 第12期35卷 17768-17778页
作者: Niu, Changan Li, Chuanyi Ng, Vincent Luo, Bin Nanjing Univ Software Inst State Key Lab Novel Software Technol Nanjing 210093 Peoples R China Univ Texas Dallas Human Language Technol Res Inst Richardson TX 75083 USA
Recent years have seen the successful application of large pretrained models of source code (codePTMs) to code representation learning, which have taken the field of software engineering (SE) from task-specific soluti... 详细信息
来源: 评论
Reducing the Impact of Time Evolution on source code Authorship Attribution via Domain Adaptation
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第6期33卷 1-27页
作者: Li, Zhen Zhao, Shasha Chen, Chen Chen, Qian Hebei Univ Sch Cyber Secur & Comp Baoding 071002 Peoples R China Univ Cent Florida Ctr Res Comp Vis Orlando FL 32816 USA Univ Texas San Antonio San Antonio TX 78249 USA Huazhong Univ Sci & Technol Sch Cyber Sci & Engn Wuhan 430074 Peoples R China
source code authorship attribution is an important problem in practical applications such as plagiarism detection, software forensics, and copyright disputes. Recent studies show that existing methods for source code ... 详细信息
来源: 评论
Discovering and exploring cases of educational source code plagiarism with Dolos
收藏 引用
SOFTWAREX 2024年 26卷
作者: Maertens, Rien Van Neyghem, Maarten Geldhof, Maxiem Van Petegem, Charlotte Strijbol, Niko Dawyndt, Peter Mesuere, Bart Univ Ghent Dept Appl Math Comp Sci & Stat Ghent Belgium
source code plagiarism is a significant issue in educational practice, and educators need user-friendly tools to cope with such academic dishonesty. This article introduces the latest version of Dolos, a state-of-thea... 详细信息
来源: 评论
On the compressibility of large-scale source code datasets
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2025年 227卷
作者: Boffa, Antonio Di Cosmo, Roberto Ferragina, Paolo Guerra, Andrea Manzini, Giovanni Vinciguerra, Giorgio Zacchiroli, Stefano Ecole Polytech Fed Lausanne EPFL Lausanne Switzerland Inria Paris France Univ Paris Cite Paris France St Anna Sch Adv Studies Dept EMbeDS Pisa Italy Univ Pisa Dept Comp Sci Pisa Italy Inst Polytech Paris LTCI Telecom Paris Palaiseau France
Storing ultra-large amounts of unstructured data (often called objects or blobs) is a fundamental task for several object-based storage engines, data warehouses, data-lake systems, and key-value stores. These systems ... 详细信息
来源: 评论
Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in source code: A Systematic Review
收藏 引用
COMPUTERS 2025年 第4期14卷 131-131页
作者: Lopez, Leonardo Juan Ramirez Ledezma, Genesis Gabriela Morillo Univ El Bosque Engn Fac Osiris & Bioaxis Res Grp Bogota 111321 Colombia
In higher education, especially in programming-intensive fields like computer science, safeguarding students' source code is crucial to prevent theft that could impact learning and future careers. Traditional stor... 详细信息
来源: 评论
Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java source code
收藏 引用
IEEE ACCESS 2023年 11卷 141657-141673页
作者: Al-Ahmad, Bilal Al-Madi, Nailah Alzaqebah, Abdullah Alkhawaldeh, Rami S. Aldebei, Khaled Kabir, Md. Faisal Altaharwa, Ismail Abu-Faraj, Mua'ad Aljarah, Ibrahim Univ Jordan Aqaba 77110 Jordan St Cloud State Univ Dept Comp Sci & Informat Technol St Cloud MN 56301 USA Princess Sumaya Univ Technol Amman 11941 Jordan Al Ahliyya Amman Univ Fac Informat Technol Comp Sci Dept Amman 19628 Jordan Penn State Univ Harrisburg Sch Sci Engn & Technol Middletown PA 17057 USA Univ Jordan Amman 11942 Jordan
source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects suc... 详细信息
来源: 评论
Sharing practices of software artefacts and source code for reproducible research
收藏 引用
INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS 2024年 1-12页
作者: Jean-Quartier, Claire Jeanquartier, Fleur Stryeck, Sarah Simon, Joerg Soeser, Birgit Hasani-Mavriqi, Ilire Graz Univ Technol Res Data Management Graz Austria Univ Nat Resources & Life Sci Dept Forest & Soil Sci Human Ctr AI Lab Vienna Austria Res Ctr Pharmaceut Engn GmbH Graz Austria Graz Univ Technol Inst Interact Syst & Data Sci Graz Austria
While source code of software and algorithms depicts an essential component in all fields of modern research involving data analysis and processing steps, it is uncommonly shared upon publication of results throughout... 详细信息
来源: 评论
A comparative study of adversarial training methods for neural models of source code
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2023年 第1期142卷 165-181页
作者: Li, Zhen Huang, Xiang Li, Yangrui Chen, Guenevere Hebei Univ Sch Cyber Secur & Comp Baoding 071002 Hebei Peoples R China Huazhong Univ Sci & Technol Sch Cyber Sci & Engn Wuhan 430074 Hubei Peoples R China Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX 78249 USA
Adversarial training has been employed by researchers to protect AI models of source code. However, it is still unknown how adversarial training methods in this field compare to each other in effectiveness and robustn... 详细信息
来源: 评论
BiAn: Smart Contract source code Obfuscation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第9期49卷 4456-4476页
作者: Zhang, Pengcheng Yu, Qifan Xiao, Yan Dong, Hai Luo, Xiapu Wang, Xiao Zhang, Meng Hohai Univ Coll Comp & Informat Nanjing 210000 Peoples R China Sun Yat Sen Univ Sch Cyber Sci & Technol Shenzhen 518000 Peoples R China RMIT Univ Sch Comp Technol Melbourne Vic 3000 Australia Hong Kong Polytech Univ Dept Comp Hong Kong 999077 Peoples R China
With the rising prominence of smart contracts, security attacks targeting them have increased, posing severe threats to their security and intellectual property rights. Existing simplistic datasets hinder effective vu... 详细信息
来源: 评论