Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Automating code-related tasks through transformers: The impact of pre-training
Transformers have gained popularity in the software engineering (SE) literature. These deep
learning models are usually pre-trained through a self-supervised objective, meant to …
learning models are usually pre-trained through a self-supervised objective, meant to …
RefactoringMiner 2.0
Refactoring detection is crucial for a variety of applications and tasks:(i) empirical studies
about code evolution,(ii) tools for library API migration,(iii) code reviews and change …
about code evolution,(ii) tools for library API migration,(iii) code reviews and change …
A large-scale study about quality and reproducibility of jupyter notebooks
Jupyter Notebooks have been widely adopted by many different communities, both in
science and industry. They support the creation of literate programming documents that …
science and industry. They support the creation of literate programming documents that …
Accurate and efficient refactoring detection in commit history
N Tsantalis, M Mansouri, LM Eshkevari… - Proceedings of the 40th …, 2018 - dl.acm.org
Refactoring detection algorithms have been crucial to a variety of applications:(i) empirical
studies about the evolution of code, tests, and faults,(ii) tools for library API migration,(iii) …
studies about the evolution of code, tests, and faults,(ii) tools for library API migration,(iii) …
Software documentation: the practitioners' perspective
In theory,(good) documentation is an invaluable asset to any software project, as it helps
stakeholders to use, understand, maintain, and evolve a system. In practice, however …
stakeholders to use, understand, maintain, and evolve a system. In practice, however …
On learning meaningful assert statements for unit test cases
Software testing is an essential part of the software lifecycle and requires a substantial
amount of time and effort. It has been estimated that software developers spend close to …
amount of time and effort. It has been estimated that software developers spend close to …
The secret life of software vulnerabilities: A large-scale empirical study
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …
cause loss or harm. While researchers have been devising a number of methods to deal …
Just-in-time defect identification and localization: A two-phase framework
Defect localization aims to locate buggy program elements (eg, buggy files, methods or lines
of code) based on defect symptoms, eg, bug reports or program spectrum. However, when …
of code) based on defect symptoms, eg, bug reports or program spectrum. However, when …
An empirical study of the long duration of continuous integration builds
Continuous Integration (CI) is a set of software development practices that allow software
development teams to generate software builds more quickly and periodically (eg, daily or …
development teams to generate software builds more quickly and periodically (eg, daily or …
Understanding and improving the quality and reproducibility of Jupyter notebooks
Jupyter Notebooks have been widely adopted by many different communities, both in
science and industry. They support the creation of literate programming documents that …
science and industry. They support the creation of literate programming documents that …