派博傳思國際中心

標題: Titlebook: Code Clone Analysis; Research, Tools, and Katsuro Inoue,Chanchal K. Roy Book 2021 The Editor(s) (if applicable) and The Author(s), under ex [打印本頁]

作者: 詞源法    時間: 2025-3-21 18:40
書目名稱Code Clone Analysis影響因子(影響力)




書目名稱Code Clone Analysis影響因子(影響力)學(xué)科排名




書目名稱Code Clone Analysis網(wǎng)絡(luò)公開度




書目名稱Code Clone Analysis網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Code Clone Analysis被引頻次




書目名稱Code Clone Analysis被引頻次學(xué)科排名




書目名稱Code Clone Analysis年度引用




書目名稱Code Clone Analysis年度引用學(xué)科排名




書目名稱Code Clone Analysis讀者反饋




書目名稱Code Clone Analysis讀者反饋學(xué)科排名





作者: 書法    時間: 2025-3-21 21:58

作者: 浪費時間    時間: 2025-3-22 02:05
CCLearner: Clone Detection via Deep Learning, NiCad, and Deckard. CCL. outperformed existing tools by achieving a better trade-off between precision and recall. To further investigate whether other machine learning algorithms can perform comparatively as deep learning, we replaced deep learning with five alternative machine learning algorithm
作者: 頭盔    時間: 2025-3-22 07:33
BigCloneBenchse-case. We have used BigCloneBench in a number of studies that demonstrate its value, as well as show where it has been used by the research community. In this chapter, we discuss the clone benchmarking theory and the existing benchmarks, describe the BigCloneBench creation process, and overview th
作者: 啜泣    時間: 2025-3-22 11:03
Source Code Clone Searchof the internals of such an engine. Finally, we discuss how to benchmark and evaluate the performance of clone search engines. The discussion includes a set of measures that are helpful in evaluating clone search engines.
作者: Pcos971    時間: 2025-3-22 14:26
Is Late Propagation a Harmful Code Clone Evolutionary Pattern? An?Empirical Studyproneness. Our results confirm that late propagation is the more harmful clone evolution pattern and that some specific cases of late propagations are more harmful than others. We trained machine learning models using 18 clone evolution related features to predict the evolution of late propagation a
作者: Pcos971    時間: 2025-3-22 17:39

作者: 凹室    時間: 2025-3-22 21:40

作者: 瑣事    時間: 2025-3-23 04:29

作者: 聯(lián)邦    時間: 2025-3-23 08:17

作者: FOVEA    時間: 2025-3-23 13:30

作者: 夸張    時間: 2025-3-23 16:15

作者: 切掉    時間: 2025-3-23 19:45

作者: nitroglycerin    時間: 2025-3-24 01:25

作者: FATAL    時間: 2025-3-24 04:14

作者: 銼屑    時間: 2025-3-24 09:43
Konstantinos Markantonakis,Keith Mayesimpacts and can get benefited from their positive impacts. This document provides a brief summary of our study on clone stability. It also discusses the studies that were done mostly after the publication of our study. Finally, it mentions some possible future works on the basis of the findings of t
作者: 付出    時間: 2025-3-24 11:20

作者: Headstrong    時間: 2025-3-24 16:04
Secure System Design and Trustable Computinglone instances should be evaluated along a number of criteria—such as developer intent, likely risk, and mitigation strategies—before any refactoring action is taken. Also, after some years of reflection on our original studies, we further suggest that instead of concentrating only on source code an
作者: 濃縮    時間: 2025-3-24 20:37
mputer language, and software metrics. Consequently, code clone analysis can be applied to a variety of real-world tasks in software development and maintenance such as bug finding a978-981-16-1929-8978-981-16-1927-4
作者: Trypsin    時間: 2025-3-25 02:32

作者: 狂熱語言    時間: 2025-3-25 06:29
Book 2021ts that are important to the progress of the field and updates them with new results and future directions.?..The first chapter provides an introduction for readers who are inexperienced in the foundation of code clone analysis, defines clones and related terms, and discusses the classification of c
作者: Feigned    時間: 2025-3-25 11:06
ew results and future directions.This is the first book organized around code clone analysis. To cover the broad studies of code clone analysis, this book selects past research results that are important to the progress of the field and updates them with new results and future directions.?..The firs
作者: arthrodesis    時間: 2025-3-25 14:39

作者: 低三下四之人    時間: 2025-3-25 18:47
https://doi.org/10.1007/978-981-13-2312-6 and source text, for applying to large code bodies. This chapter describes the features of these views, such as the display content, operations for coordination between views, metrics for files and clone classes, and the revamped code clone detection algorithm.
作者: 桉樹    時間: 2025-3-25 22:44
Vimal Kumar,Amartya Sen,Sanjay Madria state of the art in visualizing software clones, along with a classification of visualizations according to the supported user goals, and the relevant information needs to achieve the user goals. Moreover, it further presents an assessment of clone visualizations on the basis of clone relations and clone granularity.
作者: PLAYS    時間: 2025-3-26 04:03
Introduction to Code Clone Analysisave been performed, and many tools for code clone analysis have been developed. In this chapter, we will explain some of the terms that are important for understanding code clones, such as definition, type, analysis granularity, and analysis domain. We will also outline the approaches and applications of code clone analysis.
作者: 泛濫    時間: 2025-3-26 05:09

作者: 注意力集中    時間: 2025-3-26 09:27
Visualization of Clones state of the art in visualizing software clones, along with a classification of visualizations according to the supported user goals, and the relevant information needs to achieve the user goals. Moreover, it further presents an assessment of clone visualizations on the basis of clone relations and clone granularity.
作者: 不吉祥的女人    時間: 2025-3-26 13:38
SECURE: A Simulation Tool for PKI Designluding clone analysis, refactoring, and tracking. One of those that has been widely used and investigated is NiCad [., .]. What follows is a brief overview of the NiCad detection mechanism and its application in various studies of code clones.
作者: allude    時間: 2025-3-26 20:19

作者: Keratectomy    時間: 2025-3-26 22:54
NiCad: A Modern Clone Detectorluding clone analysis, refactoring, and tracking. One of those that has been widely used and investigated is NiCad [., .]. What follows is a brief overview of the NiCad detection mechanism and its application in various studies of code clones.
作者: demote    時間: 2025-3-27 04:23
Code Similarity in Clone Detectionws that simple similarity measurements like Kondrak’s distance using .-grams over tokenised source code usually outperform specialised tools for the detection of similar, cloned, plagiarised or duplicated code.
作者: 陰險    時間: 2025-3-27 08:38
Introduction to Code Clone Analysissue on software maintenance and a clue to understanding the structure and evolution of software systems. A large number of researches on code clones have been performed, and many tools for code clone analysis have been developed. In this chapter, we will explain some of the terms that are important
作者: 闖入    時間: 2025-3-27 13:22
CCFinderX: An Interactive Code Clone Analysis Environmentn and analysis. CCFinderX is designed as an interactive analysis environment that allows users to switch between views of scatter plot, file, metrics, and source text, for applying to large code bodies. This chapter describes the features of these views, such as the display content, operations for c
作者: 阻礙    時間: 2025-3-27 16:23

作者: 開玩笑    時間: 2025-3-27 21:06

作者: 上釉彩    時間: 2025-3-27 22:52
Oreo: Scaling Clone Detection Beyond Near-Miss Clonescurate clone detection, however, was limited to Type-1, Type-2, and near-miss Type-3 clones. Most clone detectors fail to detect clones beyond the near-miss Type-3 category as it becomes hard to detect such clones in a scalable manner. There are two main challenges in identifying clones beyond the T
作者: archenemy    時間: 2025-3-28 02:21

作者: Mirage    時間: 2025-3-28 09:59

作者: 共同給與    時間: 2025-3-28 13:34

作者: alcoholism    時間: 2025-3-28 14:56
Source Code Clone Searchresearch branch in clone detection, aiming to provide similarity search functionality for code snippets. While clone search shares its fundamentals with clone detection, both its objective and requirements differ significantly. Clone search focuses on search engines that are designed to find clones
作者: Inclement    時間: 2025-3-28 20:33

作者: 節(jié)約    時間: 2025-3-29 01:32

作者: 摘要    時間: 2025-3-29 04:44

作者: 冒失    時間: 2025-3-29 09:40

作者: 潰爛    時間: 2025-3-29 15:21
Sometimes, Cloning Is a Sound Design Decision!ode bloat, creeping system fragility and design drift, increased bugginess, and inconsistent maintenance are all possible side effects of code cloning. Early research into this practice often tacitly assumed that it was always problematic, and sought to identify instances of it (“clone detection”) f
作者: 分解    時間: 2025-3-29 17:46

作者: Canopy    時間: 2025-3-29 23:47
http://image.papertrans.cn/c/image/228809.jpg
作者: malign    時間: 2025-3-30 00:30
Hardware IP Watermarking and FingerprintingOur research group has been working on code clones for more than 20 years. In this chapter, I review our work on merging clones published in 2008?(Higo et al. in J Soft Mainten Evolut 20:435–461, 2008 [3]), introduce two subsequent studies, and discuss prospects for future research.
作者: 爵士樂    時間: 2025-3-30 04:03

作者: Hiatus    時間: 2025-3-30 08:33

作者: 新義    時間: 2025-3-30 14:48

作者: 食草    時間: 2025-3-30 20:07

作者: 天文臺    時間: 2025-3-30 22:57

作者: 人工制品    時間: 2025-3-31 02:00

作者: 小蟲    時間: 2025-3-31 08:19
Quantum Network Coding Based on Repeater, in particular for detecting near-miss clones where significant editing activities may take place in the cloned code. SourcererCC was developed as an attempt to fill this gap. It is a widely used token-based clone detector that targets three clone types, and exploits an index to achieve scalability
作者: 陪審團每個人    時間: 2025-3-31 09:15
Continuous-Variable Quantum Network Codingcurate clone detection, however, was limited to Type-1, Type-2, and near-miss Type-3 clones. Most clone detectors fail to detect clones beyond the near-miss Type-3 category as it becomes hard to detect such clones in a scalable manner. There are two main challenges in identifying clones beyond the T
作者: 無效    時間: 2025-3-31 15:10

作者: 不能平靜    時間: 2025-3-31 21:03
Vimal Kumar,Amartya Sen,Sanjay Madriaon, inter-project clone detection, large-scale clone detection and search, and so on. While a few clone benchmarks are available, none target this breadth of usage. BigCloneBench is a clone benchmark designed to evaluate clone detection tools across a variety of use-cases. It was built by mining a l
作者: projectile    時間: 2025-4-1 00:49





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
太仆寺旗| 翼城县| 连城县| 朝阳县| 苏尼特左旗| 镇雄县| 沁阳市| 宾川县| 稻城县| 丽水市| 安顺市| 卢龙县| 平乡县| 响水县| 呼玛县| 象州县| 南陵县| 苍溪县| 呼和浩特市| 盘山县| 太和县| 永昌县| 扎囊县| 西青区| 上犹县| 湛江市| 区。| 舟曲县| 卓资县| 安溪县| 泰和县| 瑞安市| 玉林市| 鸡西市| 土默特右旗| 利川市| 临桂县| 当阳市| 肥城市| 尤溪县| 双辽市|