Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A/B testing: A systematic literature review
A/B testing, also referred to as online controlled experimentation or continuous
experimentation, is a form of hypothesis testing where two variants of a piece of software are …
experimentation, is a form of hypothesis testing where two variants of a piece of software are …
SEGRESS: Software engineering guidelines for reporting secondary studies
Context: Several tertiary studies have criticized the reporting of software engineering
secondary studies. Objective: Our objective is to identify guidelines for reporting software …
secondary studies. Objective: Our objective is to identify guidelines for reporting software …
Software engineering for AI-based systems: a survey
AI-based systems are software systems with functionalities enabled by at least one AI
component (eg, for image-, speech-recognition, and autonomous driving). AI-based systems …
component (eg, for image-, speech-recognition, and autonomous driving). AI-based systems …
Supporting self-regulated learning with learning analytics interventions–a systematic literature review
During the past years scholars have shown an increasing interest in supporting students'
self-regulated learning (SRL). Learning analytics (LA) can be applied in various ways to …
self-regulated learning (SRL). Learning analytics (LA) can be applied in various ways to …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
[KNIHA][B] Experimentation in software engineering
Have you ever had a need to evaluate software engineering methods or techniques against
each other? This book presents experimentation as one way of evaluating new methods and …
each other? This book presents experimentation as one way of evaluating new methods and …
Software security patch management-A systematic literature review of challenges, approaches, tools and practices
Context: Software security patch management purports to support the process of patching
known software security vulnerabilities. Patching security vulnerabilities in large and …
known software security vulnerabilities. Patching security vulnerabilities in large and …
Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study
Background: Various works investigated microservice anti-patterns and bad smells in the
past few years. We identified seven secondary publications that summarize these, but they …
past few years. We identified seven secondary publications that summarize these, but they …
Women's participation in open source software: A survey of the literature
Women are underrepresented in Open Source Software (OSS) projects, as a result of which,
not only do women lose career and skill development opportunities, but the projects …
not only do women lose career and skill development opportunities, but the projects …
On the usage, co-usage and migration of CI/CD tools: A qualitative analysis
Continuous integration, delivery and deployment (CI/CD) is used to support the collaborative
software development process. CI/CD tools automate a wide range of activities in the …
software development process. CI/CD tools automate a wide range of activities in the …