Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Decomposition of monolith applications into microservices architectures: A systematic review
Microservices architecture has gained significant traction, in part owing to its potential to
deliver scalable, robust, agile, and failure-resilient software products. Consequently, many …
deliver scalable, robust, agile, and failure-resilient software products. Consequently, many …
Automated grading and feedback tools for programming education: A systematic review
We conducted a systematic literature review on automated grading and feedback tools for
programming education. We analysed 121 research papers from 2017 to 2021 inclusive and …
programming education. We analysed 121 research papers from 2017 to 2021 inclusive and …
Dynamic malware analysis in the modern era—A state of the art survey
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …
the sophistication and innovation of malware has increased over the years. In particular, the …
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning
The enormous popularity of Android in the smartphone market has gained the attention of
malicious actors as well. Also, considering its open system architecture, malicious attacks …
malicious actors as well. Also, considering its open system architecture, malicious attacks …
A systematic survey of program comprehension through dynamic analysis
B Cornelissen, A Zaidman… - IEEE Transactions …, 2009 - ieeexplore.ieee.org
Program comprehension is an important activity in software maintenance, as software must
be sufficiently understood before it can be properly modified. The study of a program's …
be sufficiently understood before it can be properly modified. The study of a program's …
Tracking down software bugs using automatic anomaly detection
S Hangal, MS Lam - Proceedings of the 24th international conference …, 2002 - dl.acm.org
This paper introduces DIDUCE, a practical and effective tool that aids programmers in
detecting complex program errors and identifying their root causes. By instrumenting a …
detecting complex program errors and identifying their root causes. By instrumenting a …
Locating features in source code
T Eisenbarth, R Koschke… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Understanding the implementation of a certain feature of a system requires identification of
the computational units of the system that contribute to this feature. In many cases, the …
the computational units of the system that contribute to this feature. In many cases, the …
Testing: a roadmap
MJ Harrold - Proceedings of the Conference on the Future of …, 2000 - dl.acm.org
Testing is an important process that is performed to support quality assurance. Testing
activities support quality assurance by gathering information about the nature of the software …
activities support quality assurance by gathering information about the nature of the software …
Dynamic neural program embedding for program repair
Neural program embeddings have shown much promise recently for a variety of program
analysis tasks, including program synthesis, program repair, fault localization, etc. However …
analysis tasks, including program synthesis, program repair, fault localization, etc. However …
Smartphone security and privacy: a survey on APTs, sensor-based attacks, side-channel attacks, google play attacks, and defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …