Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on bad smells–5 w's: which, when, what, who, where
EV de Paulo Sobrinho, A De Lucia… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Bad smells are sub-optimal code structures that may represent problems needing attention.
We conduct an extensive literature review on bad smells relying on a large body of …
We conduct an extensive literature review on bad smells relying on a large body of …
A survey of model comparison approaches and applications
This survey paper presents the current state of model comparison as it applies to Model-
Driven Engineering. We look specifically at how model matching is accomplished, the …
Driven Engineering. We look specifically at how model matching is accomplished, the …
Denial-of-service attacks on battery-powered mobile computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders
a pervasive computing device inoperable by draining the battery more quickly than it would …
a pervasive computing device inoperable by draining the battery more quickly than it would …
Models are code too: Near-miss clone detection for Simulink models
MH Alalfi, JR Cordy, TR Dean… - 2012 28th IEEE …, 2012 - ieeexplore.ieee.org
While graph-based techniques show good results in finding exactly similar subgraphs in
graphical models, they have great difficulty in finding near-miss matches. Text-based clone …
graphical models, they have great difficulty in finding near-miss matches. Text-based clone …
Metamodel clone detection with SAMOS
Wider adoption of model-driven engineering leads to an abundance of models and
metamodels in academic and industrial practice. One of the key techniques for the …
metamodels in academic and industrial practice. One of the key techniques for the …
A survey of model transformation design patterns in practice
K Lano, S Kolahdouz-Rahimi… - Journal of Systems and …, 2018 - Elsevier
Abstract Model transformation design patterns have been proposed by a number of
researchers, but their usage appears to be sporadic and sometimes patterns are applied …
researchers, but their usage appears to be sporadic and sometimes patterns are applied …
[HTML][HTML] SeByte: Scalable clone and similarity search for bytecode
While source code clone detection is a well-established research area, finding similar code
fragments in binary and other intermediate code representations has been not yet that …
fragments in binary and other intermediate code representations has been not yet that …
Java bytecode clone detection via relaxation on code fingerprint and semantic web reasoning
While finding clones in source code has drawn considerable attention, there has been only
very little work in finding similar fragments in binary code and intermediate languages, such …
very little work in finding similar fragments in binary code and intermediate languages, such …
On the use of LLMs to support the development of domain-specific modeling languages
In Model-Driven Engineering (MDE), domain-specific modeling languages (DSMLs) play a
key role to model systems within specific application domains. Creating DSMLs is a …
key role to model systems within specific application domains. Creating DSMLs is a …
Method-level code clone detection through LWH (Light Weight Hybrid) approach
Background Many researchers have investigated different techniques to automatically detect
duplicate code in programs exceeding thousand lines of code. These techniques have …
duplicate code in programs exceeding thousand lines of code. These techniques have …