Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of API evolution literature
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …
application programming interfaces (APIs). From millions of Android packages (APKs) …
Automated API property inference techniques
Frameworks and libraries offer reusable and customizable functionality through Application
Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …
Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …
Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration
Third-party library reuse has become common practice in contemporary software
development, as it includes several benefits for developers. Library dependencies are …
development, as it includes several benefits for developers. Library dependencies are …
Accurate and efficient refactoring detection in commit history
N Tsantalis, M Mansouri, LM Eshkevari… - Proceedings of the 40th …, 2018 - dl.acm.org
Refactoring detection algorithms have been crucial to a variety of applications:(i) empirical
studies about the evolution of code, tests, and faults,(ii) tools for library API migration,(iii) …
studies about the evolution of code, tests, and faults,(ii) tools for library API migration,(iii) …
An empirical study of usages, updates and risks of third-party libraries in java projects
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …
of the heavy burden of re-implementing common functionalities. However, third-party …
Can automated pull requests encourage software developers to upgrade out-of-date dependencies?
Developers neglect to update legacy software dependencies, resulting in buggy and
insecure software. One explanation for this neglect is the difficulty of constantly checking for …
insecure software. One explanation for this neglect is the difficulty of constantly checking for …
Understanding software-2.0: A study of machine learning library usage and evolution
Enabled by a rich ecosystem of Machine Learning (ML) libraries, programming using
learned models, ie, Software-2.0, has gained substantial adoption. However, we do not …
learned models, ie, Software-2.0, has gained substantial adoption. However, we do not …
A comprehensive review and synthesis of open source research
The open source movement has grown steadily and matured in recent years, and this
growth has been mirrored by a rise in open source related research. The objective of this …
growth has been mirrored by a rise in open source related research. The objective of this …
Template-based reconstruction of complex refactorings
K Prete, N Rachatasumrit, N Sudan… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Knowing which types of refactoring occurred between two program versions can help
programmers better understand code changes. Our survey of refactoring identification …
programmers better understand code changes. Our survey of refactoring identification …
Automating dependency updates in practice: An exploratory study on github dependabot
Dependency management bots automatically open pull requests to update software
dependencies on behalf of developers. Early research shows that developers are …
dependencies on behalf of developers. Early research shows that developers are …