Deep search:Searching for "static analysis" in 'ABSTRACTGot 11 items.
index Title
1Hierarchical closed form solutions for plates bent by localized transverse loadings
Author(s):CARRERA E., GIUNTA G., BRISCHETTO S.  Clicked:5816  Download:3290  Cited:16  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.7 P.1026-1037  DOI:10.1631/jzus.2007.A1026
2Optimum design of large span concrete filled steel tubular arch bridge based on static, stability and modal...
Author(s):ZHAO Chang-jun, HU Jun, XU Xing  Clicked:6609  Download:3106  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.166-173  DOI:10.1631/jzus.2002.0166
3A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei J...  Clicked:7630  Download:3159  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
4Comparison of various procedures for progressive collapse analysis of cable-stayed bridges
Author(s):Jian-guo Cai, Yi-xiang Xu, Li-ping...  Clicked:7905  Download:9482  Cited:12  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.5 P.323-334  DOI:10.1631/jzus.A1100296
5Discovering optimal features using static analysis and a genetic search based method for Android malware de...
Author(s):Ahmad Firdaus, Nor Badrul Anuar, A...  Clicked:8465  Download:4404  Cited:0  <Full Text>  <PPT> 1999
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
6A method for the global optimization of the tooth contact pattern and transmission error of spiral bevel an...
Author(s):Yao-bin Zhuo, Xue-yan Xiang, Xiao-...  Clicked:5471  Download:5629  Cited:0  <Full Text>  <PPT> 2123
Journal of Zhejiang University Science A  2017 Vol.18 No.5 P.377-392  DOI:10.1631/jzus.A1600240
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,...  Clicked:6926  Download:2797  Cited:0  <Full Text>  <PPT> 1996
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8A survey of malware behavior description and analysis
Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong...  Clicked:8918  Download:5262  Cited:0  <Full Text>  <PPT> 1735
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.583-603  DOI:10.1631/FITEE.1601745
9Static analysis of a stepped main shaft in a mine hoist by means of the modified 1D higher-order theory
Author(s):Wen-xiang Teng, Zhen-cai Zhu  Clicked:3626  Download:2350  Cited:0  <Full Text>  <PPT> 1941
Journal of Zhejiang University Science A  2018 Vol.19 No.9 P.719-734  DOI:10.1631/jzus.A1700509
10Structural design and analysis of a composite wing with high aspect ratio
Author(s):Yu-shan Meng, Li Yan, Wei Huang, T...  Clicked:6489  Download:2894  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.10 P.781-793  DOI:10.1631/jzus.A1900271
11Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:7544  Download:7918  Cited:0  <Full Text>  <PPT> 590
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE