Results 41 to 50 of about 67 (67)
Some of the next articles are maybe not open access.
CLONING: a microcomputer program for cloning simulations
Gene, 1988A comprehensive computational tool is presented that performs cloning simulations using IBM PC/XT/AT or compatible microcomputers. The CLONING program contains a specific data base for restriction sites, gene markers, fragment sources and reference comments.
Sidney R. Kushner, Martí Aldea
openaire +2 more sources
Cloning and identification of porcine programmed death 1
Veterinary Immunology and Immunopathology, 2010Programmed death 1 (PD-1) is a member of the immunoglobulin (Ig) superfamily, which is expressed on activated T cells, B cells and monocytes. Many researches have demonstrated that a high level of PD-1 expression is closely related to persistent infection and immune evasion in some human infections.
Yao Wang+10 more
openaire +3 more sources
Identifying Clones in Functional Programs for Refactoring
2010Clone detection is well established for imperative programs. It works mostly on the statement level and therefore is ill-suited for functional programs, whose main constituents are expressions and types. In this paper we introduce clone detection for functional programs using a new intermediate program representation, dubbed Functional Control Tree. We
João L. Vilaça+3 more
openaire +3 more sources
Code clones in program test sequence identification
2011 World Congress on Information and Communication Technologies, 2011In this work, we have emphasized the need for software clones in test sequence identification. We have provided some relevant features of code clones which make them apt in assisting test sequence identification. In this paper, we have pointed out the relevance of automated test sequence generation in software development life cycle and we have also ...
Poulose Jacob,K+2 more
openaire +2 more sources
Unifying clones with a generative programming technique: a case study
Journal of Software Maintenance and Evolution: Research and Practice, 2006AbstractSoftware clones—similar program structures repeated in variant forms—increase the risk of update anomalies, blow up the program size and complexity, possibly contributing to high maintenance costs. Yet, programs are often polluted by clones. In this paper, we present a case study of cloning in the Java Buffer library, JDK 1.5.
Jarzabek, S., Li, S.
openaire +2 more sources
Program Slice Based Vulnerable Code Clone Detection
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020Vulnerabilities in software will not only lead to security problems of the software itself, but also cause the spread of vulnerabilities through code clones. It is important to detect and locate vulnerabilities among the source code to facilitate the fix.
Liu Shirun+6 more
openaire +2 more sources
Clone detection through srcClone: A program slicing based approach
Journal of Systems and Software, 2022Abstract Software clone detection is an often used approach to understand and maintain software systems. One category of clones that is challenging to detect but very useful is semantic clones, which are similar in semantics but differ in syntax significantly. Semantic clone detectors have trouble scaling to larger systems and sometimes struggle with
Matthew Stephan, Hakam W. Alomari
openaire +2 more sources
Semantic Code Clones in Logic Programs
2013In this paper, we study what is a semantic code clone pair in a logic program. Unlike our earlier work, that focused on simple syntactic equivalence for defining clones, we propose a more general approximation based on operational semantics and transformation rules.
Celine Dandois, Wim Vanhoof
openaire +2 more sources
Frankencode: Creating Diverse Programs Using Code Clones
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016In this paper, we present an approach to detectingnovel cyber attacks though a form of program diversification, similar to the use of n-version programming forfault tolerant systems. Building on extensive previousand ongoing work by others on the use of code clonesin a wide variety of areas, our Functionally EquivalentVariants using Information ...
Mary Southern+7 more
openaire +2 more sources
Clones in Logic Programs and How to Detect Them
2012In this paper, we propose a theoretical framework that allows us to capture, by program analysis, the notion of code clone in the context of logic programming. Informally, two code fragments are considered as cloned if they implement the same functionality.
Wim Vanhoof, Celine Dandois
openaire +3 more sources