Deep search:Searching for "static analysis" in 'ABSTRACT and KEYWORDGot 11 items.
index Title
1Hierarchical closed form solutions for plates bent by localized transverse loadings
Author(s):CARRERA E., GIUNTA G., BRISCHETTO S.  Clicked:4773  Download:2393  Cited:16  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.7 P.1026-1037  DOI:10.1631/jzus.2007.A1026
2Optimum design of large span concrete filled steel tubular arch bridge based on static, stability and modal...
Author(s):ZHAO Chang-jun, HU Jun, XU Xing  Clicked:5277  Download:2200  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.166-173  DOI:10.1631/jzus.2002.0166
3A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei J...  Clicked:4833  Download:2313  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
4Comparison of various procedures for progressive collapse analysis of cable-stayed bridges
Author(s):Jian-guo Cai, Yi-xiang Xu, Li-ping...  Clicked:5948  Download:8133  Cited:12  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.5 P.323-334  DOI:10.1631/jzus.A1100296
5Discovering optimal features using static analysis and a genetic search based method for Android malware de...
Author(s):Ahmad Firdaus, Nor Badrul Anuar, A...  Clicked:4579  Download:2980  Cited:0  <Full Text>  <PPT> 1544
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
6A method for the global optimization of the tooth contact pattern and transmission error of spiral bevel an...
Author(s):Yao-bin Zhuo, Xue-yan Xiang, Xiao-...  Clicked:3406  Download:2719  Cited:0  <Full Text>  <PPT> 1471
Journal of Zhejiang University Science A  2017 Vol.18 No.5 P.377-392  DOI:10.1631/jzus.A1600240
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,...  Clicked:3882  Download:1722  Cited:0  <Full Text>  <PPT> 1402
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8A survey of malware behavior description and analysis
Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong...  Clicked:5479  Download:4121  Cited:0  <Full Text>  <PPT> 1230
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.583-603  DOI:10.1631/FITEE.1601745
9Static analysis of a stepped main shaft in a mine hoist by means of the modified 1D higher-order theory
Author(s):Wen-xiang Teng, Zhen-cai Zhu  Clicked:2316  Download:1392  Cited:0  <Full Text>  <PPT> 1245
Journal of Zhejiang University Science A  2018 Vol.19 No.9 P.719-734  DOI:10.1631/jzus.A1700509
10Structural design and analysis of a composite wing with high aspect ratio
Author(s):Yu-shan Meng, Li Yan, Wei Huang, T...  Clicked:3805  Download:1654  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.10 P.781-793  DOI:10.1631/jzus.A1900271
11Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:3177  Download:2144  Cited:0  <Full Text>  <PPT> 72
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2022 Journal of Zhejiang University-SCIENCE