Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Neural Library Recommendation by Embedding Project-Library Knowledge Graph
The prosperity of software applications brings fierce market competition to developers.
Employing third-party libraries (TPLs) to add new features to projects under development …
Employing third-party libraries (TPLs) to add new features to projects under development …
[HTML][HTML] API usage templates via structural generalization
APIs matter in software development, but determining how to use them can be challenging.
Developers often refer to a small set of API usage examples, analysing the information there …
Developers often refer to a small set of API usage examples, analysing the information there …
Animation2API: API recommendation for the implementation of android UI animations
Y Wang, H Liu, S Gao, X Tang - IEEE Transactions on Software …, 2023 - ieeexplore.ieee.org
UI animations, such as card movement and menu slide in/out, provide appealing user
experience and enhance the usability of mobile applications. In the process of UI animation …
experience and enhance the usability of mobile applications. In the process of UI animation …
High-order complementary cloud application programming interface recommendation with logical reasoning for incremental development
Z Chen, D ** app developers more quickly
implement the callback functions of complex Android GUI components by recommending …
implement the callback functions of complex Android GUI components by recommending …
PyScribe–Learning to describe python code
Code comment generation, which attempts to summarize the functionality of source code in
textual descriptions, plays an important role in automatic software development research …
textual descriptions, plays an important role in automatic software development research …
ASParseV3: Auto-Static Parser and Customizable Visualizer
As hackers create and develop new malware daily, defensive methods and tools are
needed to prevent such attacks. Static analysis is one of the most common techniques used …
needed to prevent such attacks. Static analysis is one of the most common techniques used …