Results 41 to 50 of about 67 (67)
Some of the next articles are maybe not open access.

CLONING: a microcomputer program for cloning simulations

Gene, 1988
A comprehensive computational tool is presented that performs cloning simulations using IBM PC/XT/AT or compatible microcomputers. The CLONING program contains a specific data base for restriction sites, gene markers, fragment sources and reference comments.
Sidney R. Kushner, Martí Aldea
openaire   +2 more sources

Cloning and identification of porcine programmed death 1

Veterinary Immunology and Immunopathology, 2010
Programmed death 1 (PD-1) is a member of the immunoglobulin (Ig) superfamily, which is expressed on activated T cells, B cells and monocytes. Many researches have demonstrated that a high level of PD-1 expression is closely related to persistent infection and immune evasion in some human infections.
Yao Wang   +10 more
openaire   +3 more sources

Identifying Clones in Functional Programs for Refactoring

2010
Clone detection is well established for imperative programs. It works mostly on the statement level and therefore is ill-suited for functional programs, whose main constituents are expressions and types. In this paper we introduce clone detection for functional programs using a new intermediate program representation, dubbed Functional Control Tree. We
João L. Vilaça   +3 more
openaire   +3 more sources

Code clones in program test sequence identification

2011 World Congress on Information and Communication Technologies, 2011
In this work, we have emphasized the need for software clones in test sequence identification. We have provided some relevant features of code clones which make them apt in assisting test sequence identification. In this paper, we have pointed out the relevance of automated test sequence generation in software development life cycle and we have also ...
Poulose Jacob,K   +2 more
openaire   +2 more sources

Unifying clones with a generative programming technique: a case study

Journal of Software Maintenance and Evolution: Research and Practice, 2006
AbstractSoftware clones—similar program structures repeated in variant forms—increase the risk of update anomalies, blow up the program size and complexity, possibly contributing to high maintenance costs. Yet, programs are often polluted by clones. In this paper, we present a case study of cloning in the Java Buffer library, JDK 1.5.
Jarzabek, S., Li, S.
openaire   +2 more sources

Program Slice Based Vulnerable Code Clone Detection

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020
Vulnerabilities in software will not only lead to security problems of the software itself, but also cause the spread of vulnerabilities through code clones. It is important to detect and locate vulnerabilities among the source code to facilitate the fix.
Liu Shirun   +6 more
openaire   +2 more sources

Clone detection through srcClone: A program slicing based approach

Journal of Systems and Software, 2022
Abstract Software clone detection is an often used approach to understand and maintain software systems. One category of clones that is challenging to detect but very useful is semantic clones, which are similar in semantics but differ in syntax significantly. Semantic clone detectors have trouble scaling to larger systems and sometimes struggle with
Matthew Stephan, Hakam W. Alomari
openaire   +2 more sources

Semantic Code Clones in Logic Programs

2013
In this paper, we study what is a semantic code clone pair in a logic program. Unlike our earlier work, that focused on simple syntactic equivalence for defining clones, we propose a more general approximation based on operational semantics and transformation rules.
Celine Dandois, Wim Vanhoof
openaire   +2 more sources

Frankencode: Creating Diverse Programs Using Code Clones

2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016
In this paper, we present an approach to detectingnovel cyber attacks though a form of program diversification, similar to the use of n-version programming forfault tolerant systems. Building on extensive previousand ongoing work by others on the use of code clonesin a wide variety of areas, our Functionally EquivalentVariants using Information ...
Mary Southern   +7 more
openaire   +2 more sources

Clones in Logic Programs and How to Detect Them

2012
In this paper, we propose a theoretical framework that allows us to capture, by program analysis, the notion of code clone in the context of logic programming. Informally, two code fragments are considered as cloned if they implement the same functionality.
Wim Vanhoof, Celine Dandois
openaire   +3 more sources

Home - About - Disclaimer - Privacy