共 50 条
- [1] Analysis and Code Model Extraction for C/C plus plus Source Code [J]. 2009 14TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2009, : 110 - +
- [2] A C/C plus plus Code Vulnerability Dataset with Code Changes and CVE Summaries [J]. 2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2020, : 508 - 512
- [4] C plus plus EDSL for parallel code generation [J]. PROCEEDINGS 2015 8TH ROMANIA TIER 2 FEDERATION GRID, CLOUD & HIGH PERFORMANCE COMPUTING IN SCIENCE (RO-LCG), 2015,
- [5] Vulnerable C/C plus plus Code Usage in IoT Software Systems [J]. 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 348 - 352
- [6] Parsing C/C plus plus Code without Pre-processing [J]. COMPILER CONSTRUCTION, PROCEEDINGS, 2009, 5501 : 109 - 125
- [7] MegaVul: A C/C plus plus Vulnerability Dataset with Comprehensive Code Representations [J]. 2024 IEEE/ACM 21ST INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2024, : 738 - 742
- [8] Interactive C plus plus code development using C plus plus Explorer and GitHub classroom for educational purposes [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (18):
- [9] Enforcing Techniques and Transformation of C/C plus plus Source Code to Heterogeneous Hardware [J]. 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 1173 - 1180
- [10] Techniques for Memory-Efficient Model Checking of C and C plus plus Code [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, 2015, 9276 : 268 - 282