Results 111 to 120 of about 597,262 (308)

Towards Clone Detection in UML Domain Models [PDF]

open access: yes, 2013
Code clones (i.e., duplicate fragments of code) have been studied for long, and there is strong evidence that they are a major source of software faults.
Störrle, Harald
core   +1 more source

Addressing persistent challenges in digital image analysis of cancer tissue: resources developed from a hackathon

open access: yesMolecular Oncology, EarlyView.
Large multidimensional digital images of cancer tissue are becoming prolific, but many challenges exist to automatically extract relevant information from them using computational tools. We describe publicly available resources that have been developed jointly by expert and non‐expert computational biologists working together during a virtual hackathon
Sandhya Prabhakaran   +16 more
wiley   +1 more source

Incremental Detection of Parameterized Code Clones [PDF]

open access: yesSoftwaretechnik-Trends, 2013
This paper presents a new approach to incremental code clone detection that is based on a special clone representation model. The algorithm detects parameterized clones with parameters of arbitrary size. It can be used for cross-system and cross-revision clone detection.
openaire   +2 more sources

Kamino: Dynamic Approach to Semantic Code Clone Detection [PDF]

open access: yes, 2014
Discovering code clones in a runtime environment helps software engineers identify hard to find logic-based bugs. Yet most research in the area of code clone discovery deals with source code due to the complexity of finding clones in a dynamic ...
Neubauer, Lindsay Anne
core   +2 more sources

Detection rate for ESR1 mutations is higher in circulating‐tumor‐cell‐derived genomic DNA than in paired plasma cell‐free DNA samples as revealed by ddPCR

open access: yesMolecular Oncology, EarlyView.
Analysis of ESR1 mutations in plasma cell‐free DNA (cfDNA) is highly important for the selection of treatment in patients with breast cancer. Using multiplex‐ddPCR and identical blood draws, we investigated whether circulating tumor cells (CTCs) and cfDNA provide similar or complementary information for ESR1 mutations.
Stavroula Smilkou   +11 more
wiley   +1 more source

Test-Based Clone Detection: an Initial Try on Semantically Equivalent Methods

open access: yesIEEE Access, 2018
Most code clone detection approaches identify clones via static source code analysis. Such approaches are effective and efficient in detecting lexically similar clones.
Guangjie Li   +3 more
doaj   +1 more source

Detecting Code Clones with Graph Neural Networkand Flow-Augmented Abstract Syntax Tree [PDF]

open access: yesarXiv, 2020
Code clones are semantically similar code fragments pairs that are syntactically similar or different. Detection of code clones can help to reduce the cost of software maintenance and prevent bugs. Numerous approaches of detecting code clones have been proposed previously, but most of them focus on detecting syntactic clones and do not work well on ...
arxiv  

Large-Scale Clone Detection and Benchmarking [PDF]

open access: yes, 2018
Code clones are pairs of code fragments that are similar. They are created when developers re-use code by copy and paste, although clones are known to occur for a variety of reasons.
Svajlenko, Jeff Thomas 1987-
core  

Targeted metabolomics reveals novel diagnostic biomarkers for colorectal cancer

open access: yesMolecular Oncology, EarlyView.
This study employed targeted metabolomic profiling to identify 302 distinct metabolites present in platelet‐rich plasma (PRP), revealing aberrant metabolic profiles amongst individuals diagnosed with colorectal cancer (CRC). Compared to carcinoembryonic antigen (CEA) and cancer antigen 19‐9 (CA199), our metabolite panel showed improved sensitivity ...
Zuojian Hu   +7 more
wiley   +1 more source

MSSA: multi-stage semantic-aware neural network for binary code similarity detection [PDF]

open access: yesPeerJ Computer Science
Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection.
Bangrui Wan   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy