Results 61 to 70 of about 2,645 (89)
Efficient Java implementation of image cloning method based on gradient processing
In the processing of photographic images, it is common to manipulate them to include objects that are not present in the original image, to make them more appealing or to change the environment. Therefore, they are manually edited and the object to be included is cut out of a source image, to join it to the destination and then, through the use of ...
Andrés F. Navarro, Manuel G. Forero
openaire +3 more sources
Comparing Quality Metrics for Cloned and Non Cloned Java Methods: A Large Scale Empirical Study
In this paper, we conduct a large scale statistical study to explore if there exists any difference between the quality of cloned methods and non cloned methods. The dataset consists of 4,421 open source Java projects containing 644,830 cloned and 842,052 non cloned methods.
Hitesh Sajnani+2 more
openaire +3 more sources
Cloned and non-cloned Java methods: a comparative study
Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring.
Vaibhav Saini+2 more
openaire +3 more sources
A function level Java code clone detection method
In this article, we mainly propose a method of function level code clone detection for Java language. The method includes a source code preprocessing strategy which unifies some Java grammatical features such as lambda expressions, anonymous classes and generics through code preprocessing.
Yu Xiong, Jun Yang, Jinxin Ma
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A New Method of Predicting US and State-Level Cancer Mortality Counts for the Current Calendar Year
Ca-A Cancer Journal for Clinicians, 2004Ahmedin Jemal, Eric J Feuer
exaly
Detecting Semantic Method Clones In Java Code Using Method Ioe-behavior
Rochelle Elva
openalex