Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects
Technical debt refers to decisions made during the design and development of software that
postpone the resolution of technical problems or the enhancement of the software's features …
postpone the resolution of technical problems or the enhancement of the software's features …
Self-admitted technical debt in ethereum smart contracts: a large-scale exploratory study
AM Ebrahimi, GA Oliva… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Programmable blockchain platforms such as Ethereum offer unique benefits to application
development, including a decentralized infrastructure, tamper-proof transactions, and …
development, including a decentralized infrastructure, tamper-proof transactions, and …
From SATD Recognition to an Interpretation Method Based on the Dataset
Y Meng, B Tie, D Lin - International Journal of Software Engineering …, 2023 - World Scientific
Technical debt describes a trade-off between short-term goals and long-term code quality
during software development. Self-admitted technical debt (SATD), a type of technical debt …
during software development. Self-admitted technical debt (SATD), a type of technical debt …
A Multiple Case Study on Executive IT Manager Experience of Technical Debt
AL Creech - 2024 - search.proquest.com
Poor technical debt management processes negatively impact development teams and can
severely impact the quality of work. However, how executive IT leadership of software …
severely impact the quality of work. However, how executive IT leadership of software …
[PDF][PDF] Self-Admitted Scientific Debt: Navigating Cross-Domain Challenges in Scientific Software
AM Awon - 2024 - dspace.library.uvic.ca
Scientific software development faces unique cross-domain challenges, requiring expertise
from both scientific and software engineering disciplines. These challenges often manifest …
from both scientific and software engineering disciplines. These challenges often manifest …
A Network Traffic Anomaly Detection Method Based on Shapelet and KNN
S Yu, X **e, Z Li, W Zhen, T Cai - International Conference on Artificial …, 2023 - Springer
Network traffic anomaly detection is the foundation for discovering malicious attacks and
securing network security. With the emergence of new technologies such as port …
securing network security. With the emergence of new technologies such as port …
A Stealthy Backdoor Attack for Code Models
Recent studies have shown that code models are susceptible to backdoor attacks. When
injected with a backdoor, the victim code model can function normally on benign samples …
injected with a backdoor, the victim code model can function normally on benign samples …