咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 17 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 5 篇 电气工程
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 20 篇 source code mini...
  • 2 篇 software visuali...
  • 2 篇 c-means
  • 2 篇 data mining
  • 2 篇 kfcmalgorithm
  • 1 篇 pattern mining
  • 1 篇 web services dis...
  • 1 篇 clustering algor...
  • 1 篇 multiple sources
  • 1 篇 diff analysis
  • 1 篇 clustering
  • 1 篇 indexing
  • 1 篇 source code exam...
  • 1 篇 mining software ...
  • 1 篇 api usages minin...
  • 1 篇 reference archit...
  • 1 篇 programming
  • 1 篇 component
  • 1 篇 api usage as a s...
  • 1 篇 program analysis

机构

  • 2 篇 tongji univ sch ...
  • 2 篇 univ potsdam dig...
  • 1 篇 univ western aus...
  • 1 篇 univ colorado bo...
  • 1 篇 univ dhaka dhaka...
  • 1 篇 univ saskatchewa...
  • 1 篇 st petersburg un...
  • 1 篇 de montfort univ...
  • 1 篇 uclouvain icteam...
  • 1 篇 hust peoples r c...
  • 1 篇 univ castilla la...
  • 1 篇 oregon state uni...
  • 1 篇 hse univ jetbrai...
  • 1 篇 indian inst tech...
  • 1 篇 concordia univ m...
  • 1 篇 hasselt univ dat...
  • 1 篇 univ svizzera it...
  • 1 篇 uber technol inc...
  • 1 篇 aristotle univ t...
  • 1 篇 eindhoven univ t...

作者

  • 2 篇 limberger daniel
  • 2 篇 zhao jitong
  • 2 篇 liu yan
  • 2 篇 diamantopoulos t...
  • 2 篇 atzberger daniel
  • 2 篇 scheibel willy
  • 2 篇 cech tim
  • 1 篇 yu yijun
  • 1 篇 ieva carlo
  • 1 篇 hoang-son pham
  • 1 篇 hayashi shinpei
  • 1 篇 khatoon shaheen
  • 1 篇 bryksin timofey
  • 1 篇 karanikiotis tho...
  • 1 篇 de la haye merli...
  • 1 篇 doellner jurgen
  • 1 篇 gotlieb arnaud
  • 1 篇 li guohui
  • 1 篇 roy chanchal k.
  • 1 篇 doellner juergen

语言

  • 20 篇 英文
检索条件"主题词=source code mining"
20 条 记 录,以下是1-10 订阅
排序:
Comparison and evaluation of source code mining tools and techniques: A qualitative approach
收藏 引用
INTELLIGENT DATA ANALYSIS 2013年 第3期17卷 459-484页
作者: Khatoon, Shaheen Li, Guohui Mahmood, Azhar HUST Wuhan Hubei Peoples R China
Program source code substantially is structured and contains semantically rich programming constructs such as variables, functions, data structures, and program structures which indicate patterns. mining source code b... 详细信息
来源: 评论
Android Botnet Detection An Integrated source code mining Approach  12
Android Botnet Detection An Integrated Source Code Mining Ap...
收藏 引用
12th International Conference on Internet Technology and Secured Transactions (ICITST)
作者: Alothman, Basil Rattadilok, Prapa De Montfort Univ Fac Technol Leicester LE1 9BH Leics England
Android is one of the most popular smartphone operating systems. This makes it one of the default targets for malicious cyber-attacks. Android's Play Store is not very restrictive which makes installing malicious ... 详细信息
来源: 评论
KFCM algorithm based on the source code mining method study  5
KFCM algorithm based on the source code mining method study
收藏 引用
5th International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
作者: Wang, Xun Hebei Software Inst Human Resources Dept Baoding City Peoples R China
This paper provides a algorithm, which is based on that kernelized fuzzy C-means uses on the study of source code mining, to solve the problem that the large number of quantities, multiple attributes and most of them ... 详细信息
来源: 评论
Declarative Visitors to Ease Fine-grained source code mining with Full History on Billions of AST Nodes  13
Declarative Visitors to Ease Fine-grained Source Code Mining...
收藏 引用
12th International Conference on Generative Programming: Concepts and Experiences
作者: Dyer, Robert Rajan, Hridesh Nguyen, Tien N. Iowa State Univ Ames IA 50011 USA
Software repositories contain a vast wealth of information about software development. mining these repositories has proven useful for detecting patterns in software development, testing hypotheses for new software en... 详细信息
来源: 评论
A Study on Applying KFCM Algorithm to source code mining
A Study on Applying KFCM Algorithm to Source Code Mining
收藏 引用
2012 National Conference on Information Technology and Computer Science
作者: Liu Yonghui Computer and Information Engineering Dept.Baoding Vocational and Technical College Baoding,China Tian Jingjing Computer and Information Engineering Dept.Baoding Vocational and Technical College Baoding,China Zhang Lei Modern Education Dept.Baoding Vocational and Technical College Baoding,China
This paper provides a algorithm,which is based on that kernelized fuzzy C-means uses on the study of source code mining,to solve the problem that the large number of quantities,multiple attributes and most of them dis... 详细信息
来源: 评论
The Good, the Bad, and the Ugly: mining for Patterns in Student source code  3
The Good, the Bad, and the Ugly: Mining for Patterns in Stud...
收藏 引用
3rd International Workshop on Education through Advanced Software Engineering and Artificial Intelligence (EASEAI)
作者: Mens, Kim Nijssen, Siegfried Hoang-Son Pham UCLouvain ICTEAM Inst Louvain La Neuve Belgium Hasselt Univ Data Sci Inst Hasselt Belgium
Research on source code mining has been explored to discover interesting structural regularities, API usage patterns, refactoring opportunities, bugs, crosscutting concerns, code clones and systematic changes. In this... 详细信息
来源: 评论
Discovering Program Topoi via Hierarchical Agglomerative Clustering
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2018年 第3期67卷 758-770页
作者: Ieva, Carlo Gotlieb, Arnaud Kaci, Souhila Lazaar, Nadjib Simula Res Lab Dept Software Engn N-1364 Oslo Norway Univ Montpellier Lab Informat Robot & Microelect Montpellier F-34090 Montpellier France
In long lifespan software systems, specification documents can be outdated or even missing. Developing new software releases or checking whether some user requirements are still valid becomes challenging in this conte... 详细信息
来源: 评论
A Defect Estimator for source code: Linking Defect Reports with Programming Constructs Usage Metrics
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2020年 第2期29卷 1–35页
作者: Kapur, Ritu Sodhi, Balwinder Indian Inst Technol Ropar Dept Comp Sci & Engn Rupnagar 140001 Punjab India
An important issue faced during software development is to identify defects and the properties of those defects, if found, in a given source file. Determining defectiveness of source code assumes significance due to i... 详细信息
来源: 评论
APIUaaS: a reference architecture for facilitating API usage from a data analytics perspective
收藏 引用
IET SOFTWARE 2019年 第5期13卷 466-478页
作者: Zhao, Jitong Liu, Yan Tongji Univ Sch Software Engn Caoan Rd 4800 Shanghai Peoples R China
source code examples are key resources for software developers to learn application programming interfaces (APIs) and to understand corresponding usage patterns. Developers usually have to utilise, evaluate and unders... 详细信息
来源: 评论
WSDL term tokenization methods for IR-style Web services discovery
收藏 引用
SCIENCE OF COMPUTER PROGRAMMING 2012年 第3期77卷 355-374页
作者: Wu, Chen Univ Western Australia ICRAR Nedlands WA 6009 Australia
The IR-style Web services discovery represents an important approach that applies proven techniques developed in the field of Information Retrieval (IR). Many studies exploited the Web Services Description Language (W... 详细信息
来源: 评论