Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
The vision of software clone management: Past, present, and future (keynote paper)
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …
negative impacts on the development and maintenance of software systems. Software clone …
A survey on clone refactoring and tracking
Code clones, identical or nearly similar code fragments in a software system's code-base,
have mixed impacts on software evolution and maintenance. Focusing on the issues of …
have mixed impacts on software evolution and maintenance. Focusing on the issues of …
Conflict‐aware optimal scheduling of prioritised code clone refactoring
Duplicated or similar source code, also known as code clones, are possible malicious 'code
smells' that may need to be removed through refactoring to enhance maintainability. Among …
smells' that may need to be removed through refactoring to enhance maintainability. Among …
A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring
Duplicated code, also known as code clones, are one of the malicious ‘ code smells' that
often need to be removed through refactoring for enhancing maintainability. Among all the …
often need to be removed through refactoring for enhancing maintainability. Among all the …
Exposing I/O concurrency with informed prefetching
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
[PDF][PDF] The road to software clone management: A survey
1 Yearly number of distinct authors contributing to clone research... 5 2 Categories of
publications on software clone research in different years 5 3 Proportion of publications in …
publications on software clone research in different years 5 3 Proportion of publications in …
A naturally protective epitope of limited variability as an influenza vaccine target
Current antigenic targets for influenza vaccine development are either highly immunogenic
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …
An empirical study of code clones: Density, entropy, and patterns
In recent years, there has been a growing consensus among researchers regarding the dual
nature of code clones. While some instances of code are valuable for reuse or extraction as …
nature of code clones. While some instances of code are valuable for reuse or extraction as …
Prioritizing code clone detection results for clone management
Clone detection through tools is a common practice in the software industry. Associated with
clone detection is code clone management, which includes taking informed decisions for …
clone detection is code clone management, which includes taking informed decisions for …