检测代码错。
It shows code samples illustrating the problem and also gives detailed information on avoiding, detecting, and fixing the problem.
它显示了阐明问题的代码样例,也给出了关于避免、检测和修复问题的详细信息。
Detecting problems in the development phase of a project significantly reduces the cost of fixing defects, increases the quality of produced code, and helps the team deliver the application on time.
在项目的开发阶段发现问题显著地降低了修补缺陷的成本,增加了生产代码的质量,并且有助于团队按时交付应用程序。
One of the most effective techniques for detecting software defects is through code inspections and reviews.
最有效的探测软件缺陷的技术之一是通过代码检查及复审。
Listing 6 shows the beer-poll analysis code for detecting changing preferences.
清单6显示了用于检测偏好变化的啤酒民意测验分析代码。
Stopping unnecessary builds by automatically detecting when code has changed is a capability that is native to Build Forge that will reduce the resource load on the hardware.
在代码发生变更时,BuildForge通过自动检测来停止不必要的构建的这种功能,将减少硬件的资源负载。
Here are some tips for viewing source code while detecting memory leaks in.net applications.
此处介绍了一些在. NET应用程序中检测到内存泄漏时查看源代码的技巧。
As for the difficulty in detecting Web Trojans on the ground of traditional feature matching, a Web Trojan detecting model is proposed based on statistics and analysis of code characteristics.
采用传统的基于特征码比对的方式检测网页木马比较困难,为此提出了一种基于统计与代码特征分析的网页木马检测模型。
The software design of touching key controller is composed of detecting program of touch sense key, key code transmitting program and monitoring program of battery voltage.
触摸按键控制器程序主要设计了触摸按键的检测程序、键码发送程序和锂电池的电压监控程序。
However currently, most of the source code auditing tools have limitation in detecting integer flaws, which can only detect integer overflow.
目前大多数的源码安全审计工具在整型错误的检测上具有局限性,往往只能检测整型溢出类型的漏洞。
The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
应用推荐