Search of clones in program code [PDF]
A.O. Osadchaya, Igor Isaev
openalex +3 more sources
Pyrite cloning: a single tube and programmed reaction cloning with restriction enzymes [PDF]
Insertion of engineered DNA fragments into bacterial vectors is the foundation of recombinant DNA technology, yet existing methods are still laborious, require many steps, depend on specific vector configuration, or require expensive reagents.We have developed a method, called "Pyrite" cloning that combines the traditional restriction enzyme digestion ...
Matthew D. Fischer+2 more
openalex +6 more sources
Molecular cloning and expression analysis of bovine programmed death-1 [PDF]
Recent work has shown that PD-1, an immune inhibitory receptor, is involved in mechanisms for down-regulating immune responses during tumor progression or chronic viral infection. However, in the case of bovine diseases, there have been no reports on this molecule due to lack of information about bovine PD-1.
Ryoyo Ikebuchi+4 more
openalex +4 more sources
Incremental Clone Detection and Elimination for Erlang Programs [PDF]
A well-known bad code smell in refactoring and software maintenance is the existence of code clones, which are code fragments that are identical or similar to one another. This paper describes an approach to incrementally detecting 'similar' code based on the notion of least-general common abstraction, or anti-unification, as well as a framework for ...
Huiqing Li, Simon Thompson
openalex +3 more sources
Experimental alternatives for evaluation of progenies and clones in eucalyptus breeding programs [PDF]
The feasibility of using augmented block designs and spatial analysis methods for early stage selection in eucalyptus breeding programs was tested. A total of 113 half-sib progenies of Eucalyptus urophylla and eight clones were evaluated in an 11 x 11 triple lattice experiment at two locations: Posto da Mata (Bahia, Brazil) and São Mateus (Minas Gerais,
Elaine Aparecida de Souza+3 more
openalex +7 more sources
Custom-Tailored Clone Detection for IEC 61131-3 Programming Languages [PDF]
JSS: Special Issue on Clone ...
Kamil Rosiak+4 more
openalex +5 more sources
An Example of Cloning Graph Transformation Rules for Programming
AbstractGraphical notations are already popular for the design of software, as witnessed by the success of the Uniform Modeling Languages (UML). In this paper, we advocate the use of graphs and graph transformation for programming graph-based systems. Our case study, the flattening of hierarchical statecharts, reveals that cloning, a recently proposed ...
Mark Minas, Berthold Hoffmann
openalex +3 more sources
Scalable Program Clone Search through Spectral Analysis
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applications in terms of reverse engineering, program clustering, malware lineage and software theft detection ...
Benoit, Tristan+2 more
openaire +3 more sources
Genetic diversity of parental clones used in breeding programs of sugarcane
The present investigation aimed to assess the nature and magnitude of genetic divergence available in the Hybridization Block (E1) and National Hybridization Garden (E2) of ICAR-Sugarcane Breeding Institute, Coimbatore and to select the suitable diverse genotypes as parents for further utilization.
A. Anna Durai S. Alarmelu
openalex +4 more sources
Building a Cybersecurity Engineering Program? Begin by Cloning Your Computer Engineering Program [PDF]
The nation is facing an increasing need for a workforce trained in elements of cyber security. The demand for workers in computer and information technology occupations is well-documented. The Bureau of Labor Statistics has projected a 12 percent growth in the number of job offerings from 2018 to 2028[1].
Doug Jacobson, Julie A. Rursch
openalex +3 more sources