Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Usability: lessons learned… and yet to be learned
JR Lewis - International Journal of Human-Computer Interaction, 2014 - Taylor & Francis
The philosopher of science JW Grove (1989) once wrote,“There is, of course, nothing
strange or scandalous about divisions of opinion among scientists. This is a condition for …
strange or scandalous about divisions of opinion among scientists. This is a condition for …
A general software defect-proneness prediction framework
Q Song, Z Jia, M Shepperd, S Ying… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
BACKGROUND-Predicting defect-prone software components is an economically important
activity and so has received a good deal of attention. However, making sense of the many …
activity and so has received a good deal of attention. However, making sense of the many …
Software cost estimation with incomplete data
K Strike, K El Emam, N Madhavji - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
The construction of software cost estimation models remains an active topic of research. The
basic premise of cost modeling is that a historical database of software project cost data can …
basic premise of cost modeling is that a historical database of software project cost data can …
Rcapture: loglinear models for capture-recapture in R
This article introduces Rcapture, an R package for capture-recapture experiments. The data
for analysis consists of the frequencies of the observable capture histories over the t capture …
for analysis consists of the frequencies of the observable capture histories over the t capture …
What types of defects are really discovered in code reviews?
Research on code reviews has often focused on defect counts instead of defect types, which
offers an imperfect view of code review benefits. In this paper, we classified the defects of …
offers an imperfect view of code review benefits. In this paper, we classified the defects of …
Forgotten books: The application of unseen species models to the survival of culture
The study of ancient cultures is hindered by the incomplete survival of material artifacts, so
we commonly underestimate the diversity of cultural production in historic societies. To …
we commonly underestimate the diversity of cultural production in historic societies. To …
State‐of‐the‐art: software inspections after 25 years
A Aurum, H Petersson, C Wohlin - Software Testing, Verification …, 2002 - Wiley Online Library
Software inspections, which were originally developed by Michael Fagan in 1976, are an
important means to verify and achieve sufficient quality in many software projects today …
important means to verify and achieve sufficient quality in many software projects today …
A taxonomy and an initial empirical study of bad smells in code
This paper presents research in progress, as well as tentative findings related to the
empirical study of so called bad code smells. We present a taxonomy that categorizes …
empirical study of so called bad code smells. We present a taxonomy that categorizes …
Software defect association mining and defect correction effort prediction
Q Song, M Shepperd, M Cartwright… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Much current software defect prediction work focuses on the number of defects remaining in
a software system. In this paper, we present association rule mining based methods to …
a software system. In this paper, we present association rule mining based methods to …
[KNIHA][B] Guide to the de-identification of personal health information
K El Emam - 2013 - books.google.com
Offering compelling practical and legal reasons why de-identification should be one of the
main approaches to protecting patients' privacy, this book outlines a proven, risk-based …
main approaches to protecting patients' privacy, this book outlines a proven, risk-based …