Results 1 to 10 of about 18,424 (218)

SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network [PDF]

open access: goldApplied Sciences, 2023
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan   +3 more
doaj   +3 more sources

Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools

open access: diamondDataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools
Higo Y. Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools. IEICE Transactions on Information and Systems E107.D, 751 (2024); https://doi.org/10.1587/transinf.2023EDP7268. Modern high-level programming languages have a wide variety of grammar and can implement the required functionality in different ...
Yoshiki Higo
  +6 more sources

Semantic code clone detection using hybrid intermediate representations and BiLSTM networks. [PDF]

open access: yesPLoS ONE
Semantic code clone detection plays an essential role in software maintenance and quality assurance, as it helps uncover fragments of code that express the same logic even when their syntax has been altered or deliberately obfuscated.
M Shahbaz Ismail   +2 more
doaj   +2 more sources

Secure the Clones [PDF]

open access: yesLogical Methods in Computer Science, 2012
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen   +2 more
doaj   +1 more source

Harmfulness of Code Duplication - A Structured Review of the Evidence [PDF]

open access: yes, 2009
Duplication of code has long been thought to decrease changeability of systems, but recently doubts have been expressed whether this is true in general.
Hordijk, Wiebe   +2 more
core   +10 more sources

Source File Set Search for Clone-and-Own Reuse Analysis [PDF]

open access: yes, 2017
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro   +3 more
core   +2 more sources

Morphological Characterization and Identification of Coffea Liberica Callus of Somatic Embryogenesis Propagation. [PDF]

open access: yes, 2015
Compared with other types of coffee, Liberica coffee is more difficult to be propagates using clonal methods. Meanwhile, demand for planting materials and consumption of this type of coffee is increasing lately.
Ardiyani, F. (Fitria)
core   +7 more sources

Several Physiological Changes of Cocoa (Theobroma cacao L.) in Response to Vascular Streak Dieback Diseases

open access: yesAGRIVITA Journal of Agricultural Science, 2019
The physiological response of cocoa plants under VSD infections is still limited because there is no method in artificial inoculation since Oncobasidium theobromae was reported as parasitic obligates.
Teguh Iman Santoso, Fakhrusy Zakariyya
doaj   +1 more source

Efficient Monitoring of Parametric Context Free Patterns [PDF]

open access: yes, 2008
Recent developments in runtime verification and monitoring show that parametric regular and temporal logic specifications can be efficiently monitored against large programs.
Chen, Feng   +3 more
core   +1 more source

Detecting Java Code Clones Based on Bytecode Sequence Alignment

open access: yesIEEE Access, 2019
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones.
Dongjin Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy