Results 11 to 20 of about 7,941 (270)

Search of clones in program code [PDF]

open access: diamondScientific and Technical Journal of Information Technologies, Mechanics and Optics, 2020
A.O. Osadchaya, Igor Isaev
openalex   +3 more sources

Pyrite cloning: a single tube and programmed reaction cloning with restriction enzymes [PDF]

open access: goldPlant Methods, 2018
Insertion of engineered DNA fragments into bacterial vectors is the foundation of recombinant DNA technology, yet existing methods are still laborious, require many steps, depend on specific vector configuration, or require expensive reagents.We have developed a method, called "Pyrite" cloning that combines the traditional restriction enzyme digestion ...
Matthew D. Fischer   +2 more
openalex   +6 more sources

Molecular cloning and expression analysis of bovine programmed death-1 [PDF]

open access: bronzeMicrobiology and Immunology, 2010
Recent work has shown that PD-1, an immune inhibitory receptor, is involved in mechanisms for down-regulating immune responses during tumor progression or chronic viral infection. However, in the case of bovine diseases, there have been no reports on this molecule due to lack of information about bovine PD-1.
Ryoyo Ikebuchi   +4 more
openalex   +4 more sources

Incremental Clone Detection and Elimination for Erlang Programs [PDF]

open access: bronze, 2011
A well-known bad code smell in refactoring and software maintenance is the existence of code clones, which are code fragments that are identical or similar to one another. This paper describes an approach to incrementally detecting 'similar' code based on the notion of least-general common abstraction, or anti-unification, as well as a framework for ...
Huiqing Li, Simon Thompson
openalex   +3 more sources

Experimental alternatives for evaluation of progenies and clones in eucalyptus breeding programs [PDF]

open access: goldRevista Árvore, 2003
The feasibility of using augmented block designs and spatial analysis methods for early stage selection in eucalyptus breeding programs was tested. A total of 113 half-sib progenies of Eucalyptus urophylla and eight clones were evaluated in an 11 x 11 triple lattice experiment at two locations: Posto da Mata (Bahia, Brazil) and São Mateus (Minas Gerais,
Elaine Aparecida de Souza   +3 more
openalex   +7 more sources

Custom-Tailored Clone Detection for IEC 61131-3 Programming Languages [PDF]

open access: greenJournal of Systems and Software, 2021
JSS: Special Issue on Clone ...
Kamil Rosiak   +4 more
openalex   +5 more sources

An Example of Cloning Graph Transformation Rules for Programming

open access: goldElectronic Notes in Theoretical Computer Science, 2008
AbstractGraphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of graphs and graph transformation for programming graph-based systems. Our case study, the flattening of hierarchical statecharts, reveals that cloning, a recently proposed ...
Mark Minas, Berthold Hoffmann
openalex   +3 more sources

Scalable Program Clone Search through Spectral Analysis

open access: yesProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applications in terms of reverse engineering, program clustering, malware lineage and software theft detection ...
Benoit, Tristan   +2 more
openaire   +3 more sources

Genetic diversity of parental clones used in breeding programs of sugarcane

open access: diamondELECTRONIC JOURNAL OF PLANT BREEDING, 2021
The present investigation aimed to assess the nature and magnitude of genetic divergence available in the Hybridization Block (E1) and National Hybridization Garden (E2) of ICAR-Sugarcane Breeding Institute, Coimbatore and to select the suitable diverse genotypes as parents for further utilization.
A. Anna Durai S. Alarmelu
openalex   +4 more sources

Building a Cybersecurity Engineering Program? Begin by Cloning Your Computer Engineering Program [PDF]

open access: bronze2020 ASEE Virtual Annual Conference Content Access Proceedings, 2020
The nation is facing an increasing need for a workforce trained in elements of cyber security. The demand for workers in computer and information technology occupations is well-documented. The Bureau of Labor Statistics has projected a 12 percent growth in the number of job offerings from 2018 to 2028[1].
Doug Jacobson, Julie A. Rursch
openalex   +3 more sources

Home - About - Disclaimer - Privacy