Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the efficiency of test suite based program repair: A systematic assessment of 16 automated repair systems for java programs
Test-based automated program repair has been a prolific field of research in software
engineering in the last decade. Many approaches have indeed been proposed, which …
engineering in the last decade. Many approaches have indeed been proposed, which …
The best of both worlds: integrating semantic features with expert features for defect prediction and localization
To improve software quality, just-in-time defect prediction (JIT-DP)(identifying defect-
inducing commits) and just-in-time defect localization (JIT-DL)(identifying defect-inducing …
inducing commits) and just-in-time defect localization (JIT-DL)(identifying defect-inducing …
V-SZZ: automatic identification of version ranges affected by CVE vulnerabilities
Vulnerabilities publicly disclosed in the National Vulnerability Database (NVD) are assigned
with CVE (Common Vulnerabilities and Exposures) IDs and associated with specific …
with CVE (Common Vulnerabilities and Exposures) IDs and associated with specific …
Historical spectrum based fault localization
Spectrum-based fault localization (SBFL) techniques are widely studied and have been
evaluated to be effective in locating faults. Recent studies also showed that developers from …
evaluated to be effective in locating faults. Recent studies also showed that developers from …
Where shall we log? studying and suggesting logging locations in code blocks
Developers write logging statements to generate logs and record system execution
behaviors to assist in debugging and software maintenance. However, deciding where to …
behaviors to assist in debugging and software maintenance. However, deciding where to …
Understanding Vulnerability Inducing Commits of the Linux Kernel
The Linux kernel is popular and well-maintained. Over the past decade, around 860
thousand commits were merged with hundreds of vulnerabilities (ie, 223 on average) …
thousand commits were merged with hundreds of vulnerabilities (ie, 223 on average) …
Technical debts and faults in open-source quantum software systems: An empirical study
Quantum computing is a rapidly growing field attracting the interest of both researchers and
software developers. Supported by its numerous open-source tools, developers can now …
software developers. Supported by its numerous open-source tools, developers can now …
How useful is code change information for fault localization in continuous integration?
Continuous integration (CI) is the process in which code changes are automatically
integrated, built, and tested in a shared repository. In CI, developers frequently merge and …
integrated, built, and tested in a shared repository. In CI, developers frequently merge and …
Hunting bugs: Towards an automated approach to identifying which change caused a bug through regression testing
Context Finding code changes that introduced bugs is important both for practitioners and
researchers, but doing it precisely is a manual, effort-intensive process. The perfect test …
researchers, but doing it precisely is a manual, effort-intensive process. The perfect test …
Leveraging structural properties of source code graphs for just-in-time bug prediction
The most common use of data visualization is to minimize the complexity for proper
understanding. A graph is one of the most commonly used representations for …
understanding. A graph is one of the most commonly used representations for …