Results 261 to 270 of about 47,712 (289)
Some of the next articles are maybe not open access.
Instructions for the CLONING program
Gene, 1988These instructions for CLONING were developed to assist the user in understanding the operation of the program [Aldea and Kushner, Gene 65 (1988) 111-116]. The program provides a computational tool that performs cloning simulations using IBM PC/XT/AT or compatible microcomputers. The design of new recombinant molecules is a totally interactive process.
M, Aldea, S R, Kushner
openaire +2 more sources
Program Slice Based Vulnerable Code Clone Detection
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020Vulnerabilities in software will not only lead to security problems of the software itself, but also cause the spread of vulnerabilities through code clones. It is important to detect and locate vulnerabilities among the source code to facilitate the fix.
Xiaonan Song +6 more
openaire +1 more source
On Detecting Semantic Clones in Constraint Logic Programs
2022 IEEE 16th International Workshop on Software Clones (IWSC), 2022Deciding whether two code fragments are semantic clones, or type-4 clones, is a problem with many ramifications. Current research often focuses on the problem in an imperative or object-oriented setting and most existing work uses abstract syntax trees, program dependency graphs, program metrics or text-based, token-based and machine learning-based ...
Yernaux, Gonzague, Vanhoof, Wim
openaire +1 more source
Cloning and identification of porcine programmed death 1
Veterinary Immunology and Immunopathology, 2010Programmed death 1 (PD-1) is a member of the immunoglobulin (Ig) superfamily, which is expressed on activated T cells, B cells and monocytes. Many researches have demonstrated that a high level of PD-1 expression is closely related to persistent infection and immune evasion in some human infections.
Jin-Mei, Peng +9 more
openaire +2 more sources
Identifying Clones in Functional Programs for Refactoring
2010Clone detection is well established for imperative programs. It works mostly on the statement level and therefore is ill-suited for functional programs, whose main constituents are expressions and types. In this paper we introduce clone detection for functional programs using a new intermediate program representation, dubbed Functional Control Tree. We
F. Rodrigues, Nuno, Vilaça, João L.
openaire +2 more sources
Frankencode: Creating Diverse Programs Using Code Clones
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016In this paper, we present an approach to detectingnovel cyber attacks though a form of program diversification, similar to the use of n-version programming forfault tolerant systems. Building on extensive previousand ongoing work by others on the use of code clonesin a wide variety of areas, our Functionally EquivalentVariants using Information ...
Hayley Borck +7 more
openaire +1 more source
Semantic Code Clones in Logic Programs
2013In this paper, we study what is a semantic code clone pair in a logic program. Unlike our earlier work, that focused on simple syntactic equivalence for defining clones, we propose a more general approximation based on operational semantics and transformation rules.
Dandois, Céline, Vanhoof, Wim
openaire +1 more source
Clone detection through srcClone: A program slicing based approach
Journal of Systems and Software, 2022Abstract Software clone detection is an often used approach to understand and maintain software systems. One category of clones that is challenging to detect but very useful is semantic clones, which are similar in semantics but differ in syntax significantly. Semantic clone detectors have trouble scaling to larger systems and sometimes struggle with
Hakam W. Alomari, Matthew Stephan
openaire +1 more source
Code clones in program test sequence identification
2011 World Congress on Information and Communication Technologies, 2011In this work, we have emphasized the need for software clones in test sequence identification. We have provided some relevant features of code clones which make them apt in assisting test sequence identification. In this paper, we have pointed out the relevance of automated test sequence generation in software development life cycle and we have also ...
Poulose Jacob,K +2 more
openaire +1 more source
Reusability based program clone detection
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015A novel process for identifying reusable program clones is described in this work. The process is applied to a very demanding context, a large-scale closed source healthcare software system. As results, the applicability and maturity of the clone detection system are discussed but also the results of the study are summarized. In this, especial care has
Petri Pulkkinen +3 more
openaire +2 more sources

