Results 1 to 10 of about 18,424 (218)
SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network [PDF]
Code clone detection is an important research topic in the field of software engineering. It is significant in developing software and solving software infringement disputes to discover code clone phenomenon effectively in and between software systems ...
Bangrui Wan +3 more
doaj +3 more sources
Higo Y. Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools. IEICE Transactions on Information and Systems E107.D, 751 (2024); https://doi.org/10.1587/transinf.2023EDP7268. Modern high-level programming languages have a wide variety of grammar and can implement the required functionality in different ...
Yoshiki Higo
+6 more sources
Semantic code clone detection using hybrid intermediate representations and BiLSTM networks. [PDF]
Semantic code clone detection plays an essential role in software maintenance and quality assurance, as it helps uncover fragments of code that express the same logic even when their syntax has been altered or deliberately obfuscated.
M Shahbaz Ismail +2 more
doaj +2 more sources
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying
Thomas Jensen +2 more
doaj +1 more source
Harmfulness of Code Duplication - A Structured Review of the Evidence [PDF]
Duplication of code has long been thought to decrease changeability of systems, but recently doubts have been expressed whether this is true in general.
Hordijk, Wiebe +2 more
core +10 more sources
Source File Set Search for Clone-and-Own Reuse Analysis [PDF]
Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version
Inoue, Katsuro +3 more
core +2 more sources
Morphological Characterization and Identification of Coffea Liberica Callus of Somatic Embryogenesis Propagation. [PDF]
Compared with other types of coffee, Liberica coffee is more difficult to be propagates using clonal methods. Meanwhile, demand for planting materials and consumption of this type of coffee is increasing lately.
Ardiyani, F. (Fitria)
core +7 more sources
The physiological response of cocoa plants under VSD infections is still limited because there is no method in artificial inoculation since Oncobasidium theobromae was reported as parasitic obligates.
Teguh Iman Santoso, Fakhrusy Zakariyya
doaj +1 more source
Efficient Monitoring of Parametric Context Free Patterns [PDF]
Recent developments in runtime verification and monitoring show that parametric regular and temporal logic specifications can be efficiently monitored against large programs.
Chen, Feng +3 more
core +1 more source
Detecting Java Code Clones Based on Bytecode Sequence Alignment
When the source code is copied and pasted or modified, there will be a lot of identical or similar code snippets in the software system, which are called code clones.
Dongjin Yu +3 more
doaj +1 more source

