Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of software refactoring
T Mens, T Tourwé - IEEE Transactions on software engineering, 2004 - ieeexplore.ieee.org
We provide an extensive overview of existing research in the field of software refactoring.
This research is compared and discussed based on a number of different criteria: the …
This research is compared and discussed based on a number of different criteria: the …
Deckard: Scalable and accurate tree-based detection of code clones
Detecting code clones has many software engineering applications. Existing approaches
either do not scale to large code bases or are not robust against minor code modifications. In …
either do not scale to large code bases or are not robust against minor code modifications. In …
Sha** program repair space with existing patches and similar code
Automated program repair (APR) has great potential to reduce bug-fixing effort and many
approaches have been proposed in recent years. APRs are often treated as a search …
approaches have been proposed in recent years. APRs are often treated as a search …
[PDF][PDF] A survey on software clone detection research
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …
modifications is a well known code smell in software maintenance. Several studies show …
Behind the intent of extract method refactoring: A systematic literature review
Background: Code refactoring is widely recognized as an essential software engineering
practice to improve the understandability and maintainability of the source code. The Extract …
practice to improve the understandability and maintainability of the source code. The Extract …
Using slicing to identify duplication in source code
Programs often have a lot of duplicated code, which makes both understanding and
maintenance more difficult. This problem can be alleviated by detecting duplicated code …
maintenance more difficult. This problem can be alleviated by detecting duplicated code …
Droidchameleon: evaluating android anti-malware against transformation attacks
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
SOA-based integration of the internet of things in enterprise services
Advances in the areas of embedded systems, computing, and networking are leading to an
infrastructure composed of millions of heterogeneous devices. These devices will not simply …
infrastructure composed of millions of heterogeneous devices. These devices will not simply …
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs.
These similar fragments, referred to as code clones, can be used to identify redundant code …
These similar fragments, referred to as code clones, can be used to identify redundant code …
Catch me if you can: Evaluating android anti-malware against transformation attacks
Mobile malware threats (eg, on Android) have recently become a real concern. In this paper,
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …