Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
How to manage change-induced incidents? lessons from the study of incident life cycle
Y Zhao, L Jiang, Y Tao, S Zhang, C Wu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
In online service systems, software changes cause a majority of incidents (ie, unplanned
interruptions and outages). Managing change-induced incidents efficiently is crucial for …
interruptions and outages). Managing change-induced incidents efficiently is crucial for …
Application of the law of minimum and dissimilarity analysis to Regression Test Case Prioritization
E Ufuktepe, T Tuglular - IEEE Access, 2023 - ieeexplore.ieee.org
Regression testing is one of the most expensive processes in testing. Prioritizing test cases
in regression testing is critical for the goal of detecting the faults sooner within a large set of …
in regression testing is critical for the goal of detecting the faults sooner within a large set of …
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature
Recent years have seen the development of LLM-based code generation. Compared to
generating code in a software project, incremental code edits are empirically observed to be …
generating code in a software project, incremental code edits are empirically observed to be …
Detecting software code vulnerabilities using 2D convolutional neural networks with program slicing feature maps
A Watson, E Ufuktepe… - 2022 IEEE Applied …, 2022 - ieeexplore.ieee.org
Throughout the post-PC world, IoT devices and real-time embedded systems have
integrated themselves into every aspect of our lives. However, as technology integrates …
integrated themselves into every aspect of our lives. However, as technology integrates …
Predicting Change-Proneness with a Deep Learning Model: Incorporating Structural Dependencies
Change-proneness prediction aims to identify source files that deserve developers' attention
for early quality improvement, ultimately reducing future maintenance costs. Existing studies …
for early quality improvement, ultimately reducing future maintenance costs. Existing studies …
Log4shell Investigate Based On Generic Computer Forensic Investigation Model
U Changsan, P Boonyopakorn - 2023 20th International …, 2023 - ieeexplore.ieee.org
Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is
loophole from JAVA application which is a ubiquitous library of Log4j for logging framework …
loophole from JAVA application which is a ubiquitous library of Log4j for logging framework …
An Empirical Study on Code Smell Introduction and Removal in Deep Learning Software Projects
J Kim, E Lee - International Journal of Software Engineering and …, 2023 - World Scientific
With increasing popularity of Deep Learning (DL) software development, code quality issues
arise in DL software development. Code smell is one of the factors which reduce the quality …
arise in DL software development. Code smell is one of the factors which reduce the quality …
A novel transformer-based multi-step approach for predicting common vulnerability severity score
S Bahmanisangesari - 2024 - unbscholar.lib.unb.ca
The timely prediction of Common Vulnerability Severity Scores (CVSS) following the release
of Common Vulnerabilities and Exposures (CVE) announcements is crucial for enhancing …
of Common Vulnerabilities and Exposures (CVE) announcements is crucial for enhancing …