Results 21 to 30 of about 6,692,619 (327)

Linear Dependent Type Theory for Quantum Programming Languages [PDF]

open access: yesLogical Methods in Computer Science, 2022
Modern quantum programming languages integrate quantum resources and classical control. They must, on the one hand, be linearly typed to reflect the no-cloning property of quantum resources.
Peng Fu, Kohei Kishida, Peter Selinger
doaj   +1 more source

Detecting Refactorable Clones by Slicing Program Dependence Graphs

open access: green, 2015
Code duplication in a program can make understanding and maintenance difficult. The problem can be reduced by detecting duplicated code, refactoring it into a separate procedure, and replacing all the clones by appropriate calls to the new procedure.
Hamid, A., Zaytsev, V.
openaire   +3 more sources

Linear Dependent Type Theory for Quantum Programming Languages: Extended Abstract [PDF]

open access: yesLogic in Computer Science, 2020
Modern quantum programming languages integrate quantum resources and classical control. They must, on the one hand, be linearly typed to reflect the no-cloning property of quantum resources.
Peng Fu, K. Kishida, P. Selinger
semanticscholar   +1 more source

Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey [PDF]

open access: yesarXiv.org, 2023
Code cloning, the duplication of code fragments, is common in software development. While some reuse aids productivity, excessive cloning hurts maintainability and introduces bugs. Hence, automatic code clone detection is vital. Meanwhile, large language
Shihan Dou   +9 more
semanticscholar   +1 more source

Scalable Program Clone Search through Spectral Analysis

open access: yesProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target program - with potential applications in terms of reverse engineering, program clustering, malware lineage and software theft detection ...
Benoit, Tristan   +2 more
openaire   +2 more sources

Location decision of low-altitude service station for transfer flight based on modified immune algorithm [PDF]

open access: yesPeerJ Computer Science, 2023
The location of Low-Altitude Flight Service Station (LAFSS) is a comprehensive decision work, and it is also a multi-objective optimization problem (MOOP) with constraints. As a swarm intelligence search algorithm for solving constrained MOOP, the Immune
Huaqun Chen   +5 more
doaj   +2 more sources

TCCCD: Triplet-Based Cross-Language Code Clone Detection

open access: yesApplied Sciences, 2023
Code cloning is a common practice in software development, where developers reuse existing code to accelerate programming speed and enhance work efficiency. Existing clone-detection methods mainly focus on code clones within a single programming language.
Yong Fang   +3 more
doaj   +1 more source

Robot Programming from a Single Demonstration for High Precision Industrial Insertion

open access: yesSensors, 2023
We propose a novel approach for robotic industrial insertion tasks using the Programming by Demonstration technique. Our method allows robots to learn a high-precision task by observing human demonstration once, without requiring any prior knowledge of ...
Kaimeng Wang   +2 more
doaj   +1 more source

Update on the state of play of Animal Health and Welfare and Environmental Impact of Animals derived from SCNT Cloning and their Offspring, and Food Safety of Products Obtained from those Animals [PDF]

open access: yesEFSA Journal, 2012
<p>The European Food Safety Authority (EFSA) received in December 2011, a request from the European Commission for an update on the possible scientific developments for cloning of farmed animals for food production purposes.
European Food Safety Authority
doaj   +1 more source

Efficient Quantum Network Communication Using Optimized Entanglement Swapping Trees

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum network communication is challenging, as the no-cloning theorem in the quantum regime makes many classical techniques inapplicable; in particular, the direct transmission of qubit states over long distances is infeasible due to unrecoverable ...
Mohammad Ghaderibaneh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy