Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Code cloning in smart contracts on the ethereum platform: An extended replication study
Smart contracts are programs deployed on blockchains that run upon meeting
predetermined conditions. Once deployed, smart contracts are immutable, thus, defects in …
predetermined conditions. Once deployed, smart contracts are immutable, thus, defects in …
Studying duplicate logging statements and their relationships with code clones
Developers rely on software logs for a variety of tasks, such as debugging, testing, program
comprehension, verification, and performance analysis. Despite the importance of logs, prior …
comprehension, verification, and performance analysis. Despite the importance of logs, prior …
Investigating context adaptation bugs in code clones
The identical or nearly similar code fragments in a code-base are called code clones. There
is a common belief that code cloning (copy/pasting code fragments) can introduce bugs in a …
is a common belief that code cloning (copy/pasting code fragments) can introduce bugs in a …
A comparative study of software bugs in micro-clones and regular code clones
Reusing a code fragment through copy/pasting, also known as code cloning, is a common
practice during software development and maintenance. Most of the existing studies on …
practice during software development and maintenance. Most of the existing studies on …
Associating code clones with association rules for change impact analysis
When a programmer makes changes to a target program entity (files, classes, methods), it is
important to identify which other entities might also get impacted. These entities constitute …
important to identify which other entities might also get impacted. These entities constitute …
Guiding log revisions by learning from software evolution history
Despite the importance of log statements in postmortem debugging, developers are difficult
to establish good logging practices. There are mainly two reasons. First, there are no …
to establish good logging practices. There are mainly two reasons. First, there are no …
A first look at duplicate and near-duplicate self-admitted technical debt comments
Self-admitted technical debt (SATD) refers to technical debt that is intentionally introduced
by developers and explicitly documented in code comments or other software artifacts (eg …
by developers and explicitly documented in code comments or other software artifacts (eg …
Clone notifier: Develo** and improving the system to notify changes of code clones
A code clone is a code fragment that is identical or similar to it in the source code. It has
been identified as one of the main problems in software maintenance. When a developer …
been identified as one of the main problems in software maintenance. When a developer …
Comparing bug replication in regular and micro code clones
Copying and pasting source code during software development is known as code cloning.
Clone fragments with a minimum size of 5 LOC were usually considered in previous studies …
Clone fragments with a minimum size of 5 LOC were usually considered in previous studies …
[PDF][PDF] Mining the Relationship between Object-Relational Map** Performance Anti-patterns and Code Clones.
Z Xu, J Zhu, L Yang, C Zuo - SEKE, 2023 - ksiresearch.org
The use of Object-Relational Map** (ORM) in software development has become
increasingly popular due to its superiority to simplify database interactions. Despite the …
increasingly popular due to its superiority to simplify database interactions. Despite the …