Results 21 to 30 of about 18,424 (218)
Quantifying cross-language code reuse via function-level clone detection
Code reuse through cloning is common in software development, yet excessive or unchecked cloning can harm maintainability and raise plagiarism concerns.
Yi Rong, Yan Zhou
doaj +1 more source
Code fragments with identical or similar functionality are called code clones. This study aims to detect semantic clones in Java-based programs, focusing on the method-level granularity.
Aditi Gupta, Rinkaj Goyal
doaj +1 more source
RoboMic is an automated confocal microscopy pipeline for high‐throughput functional imaging in living cells. Demonstrated with fluorescence recovery after photobleaching (FRAP), it integrates AI‐driven nuclear segmentation, ROI selection, bleaching, and analysis.
Selçuk Yavuz +6 more
wiley +1 more source
Code duplication, commonly referred to as code cloning, is not inherent in software systems but arises due to various factors, such as time constraints in meeting project deadlines.
Thanoshan Vijayanandan +4 more
doaj +1 more source
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc +8 more
wiley +1 more source
Insect communities are vital to the ecological and economic success of cocoa agroforestry systems, providing essential functions such in pollination, pest control, and nutrient cycling. Their presence and performance are shaped by field structure,
Sisko Budianto +3 more
doaj +1 more source
Clone Removal in Java Programs as a Process of Stepwise Unification [PDF]
Cloned code is one of the most important obstacles against consistent software maintenance and evolution. Although today's clone detection tools find a variety of clones, they do not offer any advice how to remove such clones.
Bremm, Andri, Speicher, Daniel
core
Active Learning of Points-To Specifications
When analyzing programs, large libraries pose significant challenges to static points-to analysis. A popular solution is to have a human analyst provide points-to specifications that summarize relevant behaviors of library code, which can substantially ...
Ali Karim +4 more
core +1 more source
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
ABSTRACT Aims This study aimed to explore the relationship between stress‐induced hyperglycemia (SIH) and in‐hospital medical complications in patients with acute stroke. Methods We enrolled 865,765 patients with acute stroke from the Chinese Stroke Center Alliance cohort.
Xintong Song +6 more
wiley +1 more source

