Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Clustering methodologies for software engineering
The size and complexity of industrial strength software systems are constantly increasing.
This means that the task of managing a large software project is becoming even more …
This means that the task of managing a large software project is becoming even more …
Many-objective software remodularization using NSGA-III
Software systems nowadays are complex and difficult to maintain due to continuous
changes and bad design choices. To handle the complexity of systems, software products …
changes and bad design choices. To handle the complexity of systems, software products …
Challenges in visual data analysis
In today's applications data is produced at unprecedented rates. While the capacity to collect
and store new data grows rapidly, the ability to analyze these data volumes increases at …
and store new data grows rapidly, the ability to analyze these data volumes increases at …
Mono2micro: a practical and effective tool for decomposing monolithic java applications to microservices
In migrating production workloads to cloud, enterprises often face the daunting task of
evolving monolithic applications toward a microservice architecture. At IBM, we developed a …
evolving monolithic applications toward a microservice architecture. At IBM, we developed a …
Software architecture reconstruction: A process-oriented taxonomy
To maintain and understand large applications, it is important to know their architecture. The
first problem is that unlike classes and packages, architecture is not explicitly represented in …
first problem is that unlike classes and packages, architecture is not explicitly represented in …
Hierarchical clustering for software architecture recovery
Gaining an architectural level understanding of a software system is important for many
reasons. When the description of a system's architecture does not exist, attempts must be …
reasons. When the description of a system's architecture does not exist, attempts must be …
Fast, scalable detection of" piggybacked" mobile applications
Mobile applications (or apps) are rapidly growing in number and variety. These apps
provide useful features, but also bring certain privacy and security risks. For example …
provide useful features, but also bring certain privacy and security risks. For example …
Identification of high-level concept clones in source code
Source code duplication occurs frequently within large software systems. Pieces of source
code, functions, and data types are often duplicated in part or in whole, for a variety of …
code, functions, and data types are often duplicated in part or in whole, for a variety of …
Information-theoretic software clustering
The majority of the algorithms in the software clustering literature utilize structural
information to decompose large software systems. Approaches using other attributes, such …
information to decompose large software systems. Approaches using other attributes, such …
Supporting program comprehension using semantic and structural information
Focuses on investigating the combined use of semantic and structural information of
programs to support the comprehension tasks involved in the maintenance and …
programs to support the comprehension tasks involved in the maintenance and …