Deep search:Searching for "static analysis" in 'ABSTRACTGot 11 items.
index Title
1Hierarchical closed form solutions for plates bent by localized transverse loadings
Author(s):CARRERA E., GIUNTA G., BRISCHETTO S.  Clicked:5440  Download:3009  Cited:16  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.7 P.1026-1037  DOI:10.1631/jzus.2007.A1026
2Optimum design of large span concrete filled steel tubular arch bridge based on static, stability and modal...
Author(s):ZHAO Chang-jun, HU Jun, XU Xing  Clicked:6133  Download:2837  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.166-173  DOI:10.1631/jzus.2002.0166
3A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei J...  Clicked:6777  Download:2907  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
4Comparison of various procedures for progressive collapse analysis of cable-stayed bridges
Author(s):Jian-guo Cai, Yi-xiang Xu, Li-ping...  Clicked:7187  Download:9021  Cited:12  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.5 P.323-334  DOI:10.1631/jzus.A1100296
5Discovering optimal features using static analysis and a genetic search based method for Android malware de...
Author(s):Ahmad Firdaus, Nor Badrul Anuar, A...  Clicked:7326  Download:4005  Cited:0  <Full Text>  <PPT> 1845
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
6A method for the global optimization of the tooth contact pattern and transmission error of spiral bevel an...
Author(s):Yao-bin Zhuo, Xue-yan Xiang, Xiao-...  Clicked:4657  Download:5213  Cited:0  <Full Text>  <PPT> 1859
Journal of Zhejiang University Science A  2017 Vol.18 No.5 P.377-392  DOI:10.1631/jzus.A1600240
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,...  Clicked:6055  Download:2452  Cited:0  <Full Text>  <PPT> 1718
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8A survey of malware behavior description and analysis
Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong...  Clicked:7947  Download:4945  Cited:0  <Full Text>  <PPT> 1541
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.583-603  DOI:10.1631/FITEE.1601745
9Static analysis of a stepped main shaft in a mine hoist by means of the modified 1D higher-order theory
Author(s):Wen-xiang Teng, Zhen-cai Zhu  Clicked:3148  Download:2051  Cited:0  <Full Text>  <PPT> 1677
Journal of Zhejiang University Science A  2018 Vol.19 No.9 P.719-734  DOI:10.1631/jzus.A1700509
10Structural design and analysis of a composite wing with high aspect ratio
Author(s):Yu-shan Meng, Li Yan, Wei Huang, T...  Clicked:5487  Download:2485  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.10 P.781-793  DOI:10.1631/jzus.A1900271
11Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:6418  Download:6496  Cited:0  <Full Text>  <PPT> 392
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE