Results 11 to 20 of about 67 (67)

Custom-tailored clone detection for IEC 61131-3 programming languages [PDF]

open access: yesJournal of Systems and Software, 2021
JSS: Special Issue on Clone ...
Kamil Rosiak   +4 more
openaire   +3 more sources

META-HEURISTIC CLONAL SELECTION ALGORITHM FOR OPTIMIZATION OF FOREST PLANNING

open access: yesRevista Árvore, 2018
It is important to evaluate the application of new technologies in the field of computational science to forest science. The goal of this study was to test a different kind of metaheuristic, namely Clonal Selection Algorithm, in a forest planning problem.
Carlos Alberto Araújo Júnior   +5 more
doaj   +1 more source

A large-scale study on human-cloned changes for automated program repair [PDF]

open access: yes2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), 2021
Research in automatic program repair has shown that real bugs can be automatically fixed. However, there are several challenges involved in such a task that are not yet fully addressed. As an example, consider that a test-suite-based repair tool performs a change in a program to fix a bug spotted by a failing test case, but then the same or another ...
Thomas Durieux, Fernanda Madeiral
openaire   +3 more sources

the impact of programming languages in code cloning [PDF]

open access: yes, 2012
Code cloning is a duplication of source code fragments that frequently occurs in large software systems. Although different studies exist that evidence cloning benefits, several others expose its harmfulness, specifically upon inconsistent clone management.
Jorge, Jaime Filipe   +1 more
openaire   +2 more sources

Incremental Clone Detection and Elimination for Erlang Programs [PDF]

open access: yes, 2011
A well-known bad code smell in refactoring and software maintenance is the existence of code clones, which are code fragments that are identical or similar to one another. This paper describes an approach to incrementally detecting 'similar' code based on the notion of least-general common abstraction, or anti-unification, as well as a framework for ...
Li H., Thompson S.
openaire   +2 more sources

An Example of Cloning Graph Transformation Rules for Programming

open access: yesElectronic Notes in Theoretical Computer Science, 2008
AbstractGraphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of graphs and graph transformation for programming graph-based systems. Our case study, the flattening of hierarchical statecharts, reveals that cloning, a recently proposed ...
Mark Minas, Berthold Hoffmann
openaire   +2 more sources

Detecting Clones Across Microsoft .NET Programming Languages [PDF]

open access: yes2012 19th Working Conference on Reverse Engineering, 2012
The Microsoft .NET framework and its language family focus on multi-language development to support interoperability across several programming languages. The framework allows for the development of similar applications in different languages through the reuse of core libraries.
Farouq Al-Omari   +3 more
openaire   +2 more sources

Improved transgene expression in doxycycline-inducible embryonic stem cells by repeated chemical selection or cell sorting

open access: yesStem Cell Research, 2016
Transgene-mediated programming is a preeminent strategy to direct cellular identity. To facilitate cell fate switching, lineage regulating genes must be efficiently and uniformly induced.
Renáta Bencsik   +6 more
doaj   +1 more source

Code Clone Detection Based on Program Vector Tree

open access: yesJisuanji kexue yu tansuo, 2020
Code cloning facilitates software development but also causes recurring bugs and software quality problems. Some types of code clones have very low similarity in literal, leading to difficulty of detection. Aiming at this pro-blem, this paper proposes one method of code clone detection based on the program vector tree.
Zhou Quan   +4 more
openaire   +2 more sources

ChIPpeakAnno: a Bioconductor package to annotate ChIP-seq and ChIP-chip data

open access: yesBMC Bioinformatics, 2010
Background Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) or ChIP followed by genome tiling array analysis (ChIP-chip) have become standard technologies for genome-wide identification of DNA-binding protein target ...
Pagès Hervé   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy