A systematic literature review on bad smells–5 w's: which, when, what, who, where

EV de Paulo Sobrinho, A De Lucia… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Bad smells are sub-optimal code structures that may represent problems needing attention.
We conduct an extensive literature review on bad smells relying on a large body of …

A survey of model comparison approaches and applications

M Stephan, JR Cordy - … on Model-Driven Engineering and Software …, 2013 - scitepress.org
This survey paper presents the current state of model comparison as it applies to Model-
Driven Engineering. We look specifically at how model matching is accomplished, the …

Denial-of-service attacks on battery-powered mobile computers

T Martin, M Hsiao, D Ha… - Second IEEE Annual …, 2004 - ieeexplore.ieee.org
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders
a pervasive computing device inoperable by draining the battery more quickly than it would …

Models are code too: Near-miss clone detection for Simulink models

MH Alalfi, JR Cordy, TR Dean… - 2012 28th IEEE …, 2012 - ieeexplore.ieee.org
While graph-based techniques show good results in finding exactly similar subgraphs in
graphical models, they have great difficulty in finding near-miss matches. Text-based clone …

Metamodel clone detection with SAMOS

Ö Babur, L Cleophas, M Van Den Brand - Journal of Computer Languages, 2019 - Elsevier
Wider adoption of model-driven engineering leads to an abundance of models and
metamodels in academic and industrial practice. One of the key techniques for the …

A survey of model transformation design patterns in practice

K Lano, S Kolahdouz-Rahimi… - Journal of Systems and …, 2018 - Elsevier
Abstract Model transformation design patterns have been proposed by a number of
researchers, but their usage appears to be sporadic and sometimes patterns are applied …

[HTML][HTML] SeByte: Scalable clone and similarity search for bytecode

I Keivanloo, CK Roy, J Rilling - Science of Computer Programming, 2014 - Elsevier
While source code clone detection is a well-established research area, finding similar code
fragments in binary and other intermediate code representations has been not yet that …

Java bytecode clone detection via relaxation on code fingerprint and semantic web reasoning

I Keivanloo, CK Roy, J Rilling - 2012 6th International …, 2012 - ieeexplore.ieee.org
While finding clones in source code has drawn considerable attention, there has been only
very little work in finding similar fragments in binary code and intermediate languages, such …

On the use of LLMs to support the development of domain-specific modeling languages

C Di Sipio, R Rubei, J Di Rocco, D Di Ruscio… - Proceedings of the …, 2024 - dl.acm.org
In Model-Driven Engineering (MDE), domain-specific modeling languages (DSMLs) play a
key role to model systems within specific application domains. Creating DSMLs is a …

Method-level code clone detection through LWH (Light Weight Hybrid) approach

E Kodhai, S Kanmani - Journal of Software Engineering Research and …, 2014 - Springer
Background Many researchers have investigated different techniques to automatically detect
duplicate code in programs exceeding thousand lines of code. These techniques have …