咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 293 篇 期刊文献
  • 232 册 图书
  • 22 篇 学位论文
  • 3 件 标准

馆藏范围

  • 1,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 693 篇 工学
    • 451 篇 计算机科学与技术...
    • 317 篇 软件工程
    • 206 篇 电气工程
    • 41 篇 信息与通信工程
    • 37 篇 机械工程
    • 33 篇 控制科学与工程
    • 31 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 材料科学与工程(可...
    • 10 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
    • 5 篇 交通运输工程
    • 4 篇 水利工程
    • 4 篇 航空宇航科学与技...
  • 100 篇 理学
    • 44 篇 生物学
    • 15 篇 化学
    • 12 篇 数学
    • 11 篇 物理学
    • 10 篇 地球物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 4 篇 科学技术史(分学科...
  • 41 篇 管理学
    • 37 篇 管理科学与工程(可...
  • 32 篇 农学
    • 29 篇 作物学
  • 20 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 7 篇 药学(可授医学、理...
  • 18 篇 教育学
    • 16 篇 教育学
  • 8 篇 法学
    • 5 篇 社会学
  • 4 篇 文学
  • 4 篇 历史学
  • 3 篇 经济学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 1,002 篇 source code
  • 146 篇 program
  • 133 篇 software
  • 89 篇 disk
  • 82 篇 data
  • 71 篇 code
  • 68 篇 computer softwar...
  • 62 篇 hard disk
  • 58 篇 file
  • 49 篇 ibm
  • 46 篇 codes
  • 43 篇 turbo pascal
  • 42 篇 power supply
  • 41 篇 operating system
  • 40 篇 programming
  • 38 篇 software enginee...
  • 35 篇 turbo
  • 34 篇 source
  • 34 篇 open source soft...
  • 34 篇 disk drive

机构

  • 8 篇 inria
  • 8 篇 brno university ...
  • 5 篇 univ trento tren...
  • 4 篇 hebei univ sch c...
  • 4 篇 charles universi...
  • 4 篇 inria rmod team ...
  • 4 篇 univ paris
  • 3 篇 osaka univ grad ...
  • 3 篇 univ fed minas g...
  • 3 篇 innopolis univ i...
  • 3 篇 budapest univ te...
  • 3 篇 concordia univ d...
  • 3 篇 duke nus med sch...
  • 3 篇 delft univ techn...
  • 3 篇 free univ tbilis...
  • 3 篇 heidelberg univ ...
  • 3 篇 univ zurich dept...
  • 2 篇 univ waterloo wa...
  • 2 篇 mit lincoln lab ...
  • 2 篇 yangzhou univ sc...

作者

  • 11 篇 zacchiroli stefa...
  • 7 篇 sharif bonita
  • 6 篇 li zhen
  • 6 篇 inoue katsuro
  • 5 篇 peterson cole s.
  • 5 篇 gupta atul
  • 5 篇 ducasse stephane
  • 5 篇 haiduc sonia
  • 5 篇 rai sawan
  • 4 篇 yu willie
  • 4 篇 huebner paul
  • 4 篇 lanza michele
  • 4 篇 paech barbara
  • 4 篇 belwal ramesh ch...
  • 4 篇 spinellis diomid...
  • 4 篇 ali nasir
  • 4 篇 gueheneuc yann-g...
  • 4 篇 marchetto alessa...
  • 4 篇 anquetil nicolas
  • 4 篇 pietri antoine

语言

  • 972 篇 英文
  • 17 篇 其他
  • 11 篇 中文
  • 1 篇 德文
  • 1 篇 塞尔维亚文
检索条件"主题词=source code"
1002 条 记 录,以下是21-30 订阅
排序:
Sequence-to-Sequence Learning-Based Conversion of Pseudo-code to source code Using Neural Translation Approach
收藏 引用
IEEE ACCESS 2022年 10卷 26730-26742页
作者: Acharjee, Uzzal Kumar Arefin, Minhazul Hossen, Kazi Mojammel Uddin, Mohammed Nasir Uddin, Md Ashraf Islam, Linta Jagannath Univ Dept Comp Sci & Engn Dhaka 1100 Bangladesh Federat Univ Internet Commerce Secur Lab Ctr Informat & Appl Optimisat Ballarat Vic 3350 Australia
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using... 详细信息
来源: 评论
BiAn: Smart Contract source code Obfuscation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2023年 第9期49卷 4456-4476页
作者: Zhang, Pengcheng Yu, Qifan Xiao, Yan Dong, Hai Luo, Xiapu Wang, Xiao Zhang, Meng Hohai Univ Coll Comp & Informat Nanjing 210000 Peoples R China Sun Yat Sen Univ Sch Cyber Sci & Technol Shenzhen 518000 Peoples R China RMIT Univ Sch Comp Technol Melbourne Vic 3000 Australia Hong Kong Polytech Univ Dept Comp Hong Kong 999077 Peoples R China
With the rising prominence of smart contracts, security attacks targeting them have increased, posing severe threats to their security and intellectual property rights. Existing simplistic datasets hinder effective vu... 详细信息
来源: 评论
Reducing the Impact of Time Evolution on source code Authorship Attribution via Domain Adaptation
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第6期33卷 1-27页
作者: Li, Zhen Zhao, Shasha Chen, Chen Chen, Qian Hebei Univ Sch Cyber Secur & Comp Baoding 071002 Peoples R China Univ Cent Florida Ctr Res Comp Vis Orlando FL 32816 USA Univ Texas San Antonio San Antonio TX 78249 USA Huazhong Univ Sci & Technol Sch Cyber Sci & Engn Wuhan 430074 Peoples R China
source code authorship attribution is an important problem in practical applications such as plagiarism detection, software forensics, and copyright disputes. Recent studies show that existing methods for source code ... 详细信息
来源: 评论
Comparing techniques for authorship attribution of source code
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2014年 第1期44卷 1-32页
作者: Burrows, Steven Uitdenbogerd, Alexandra L. Turpin, Andrew RMIT Univ Sch Comp Sci & Informat Technol Melbourne Vic 3001 Australia
Attributing authorship of documents with unknown creators has been studied extensively for natural language text such as essays and literature, but less so for non-natural languages such as computer source code. Previ... 详细信息
来源: 评论
source code Verification Tools for Software Security Bugs
Source Code Verification Tools for Software Security Bugs
收藏 引用
5th International Conference on Software Methodologies, Tools and Techniques (SoMeT 2006)
作者: Michaud, Frederic Painchaud, Frederic Def Res & Dev Canada Valcartier Quebec City PQ G3J 1X5 Canada
We investigated errors and vulnerabilities that emerge from software defects in C/C++ and Java programs. This allowed us to create a meaningful testbench in order to evaluate best-of-breed automatic source code verifi... 详细信息
来源: 评论
ASAP: A source code Authorship Program
收藏 引用
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER 2019年 第4期21卷 471-484页
作者: Tennyson, Matthew F. Murray State Univ Murray KY 42071 USA
source code authorship attribution is the task of determining who wrote a computer program, based on its source code, usually when the author is either unknown or under dispute. Areas where this can be applied include... 详细信息
来源: 评论
How to Succeed in the Software Business While Giving Away the source code The AdaCore Experience
收藏 引用
IEEE SOFTWARE 2019年 第6期36卷 17-22页
作者: Brosgol, Benjamin M. AdaCore New York NY 10001 USA
Open source software or, more accurately, freely licensed open source software (FLOSS) at first appears to present a dilemma when adopted as part of a business model. If users are allowed to access, modify, and/or red... 详细信息
来源: 评论
source code Based Component Recognition in Software Stacks for Embedded Systems
Source Code Based Component Recognition in Software Stacks f...
收藏 引用
IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications
作者: Schreiner, Dietmar Schordan, Markus Barany, Gergoe Goeschka, Karl M. Vienna Univ Technol Compilers & Languages Grp Argentinierstr 8 A-1040 Vienna Austria Vienna Univ Technol Distributed Syst Grp A-1040 Vienna Austria
Current trends in embedded systems software aim at an increase of reusability, exchangeability and maintainability and thus at a significant reduction of time- and costs-to-market. One way to reach these goals is the ... 详细信息
来源: 评论
source code Transformation for Software-Based On-Line Error Detection
Source Code Transformation for Software-Based On-Line Error ...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Tsai, Tsung-Yen Huang, Jiun-Lang Natl Taiwan Univ Grad Inst Elect Engn Taipei 106 Taiwan Natl Taiwan Univ Dept Elect Engn Taipei 106 Taiwan
With the widespread deployment of ICs into safetycritical systems, ensuring in-field reliability for the expected IC life span becomes a serious challenge. One solution to improving reliability is software-based on-li... 详细信息
来源: 评论
Detecting vulnerability in source code using CNN and LSTM network
收藏 引用
SOFT COMPUTING 2023年 第2期27卷 1131-1141页
作者: Guo, Junjun Wang, Zhengyuan Li, Haonan Xue, Yang Xian Technol Univ Sch Comp Sci & Engn Xian Shanxi Peoples R China
Automated vulnerability detection has become a research hot spot because it is beneficial for improving software quality and security. The code metric (CM) is one class of important representations of vulnerability in... 详细信息
来源: 评论