Results 121 to 130 of about 597,262 (308)

A Topic Modeling approach for Code Clone Detection [PDF]

open access: yes, 2019
In this thesis work, the potential benefits of Latent Dirichlet Allocation (LDA) as a technique for code clone detection has been described. The objective is to propose a language-independent, effective, and scalable approach for identifying similar code
Khan, Mohammed Salman
core   +1 more source

Inhibition of acyl‐CoA synthetase long‐chain isozymes decreases multiple myeloma cell proliferation and causes mitochondrial dysfunction

open access: yesMolecular Oncology, EarlyView.
Triacsin C inhibition of the acyl‐CoA synthetase long chain (ACSL) family decreases multiple myeloma cell survival, proliferation, mitochondrial respiration, and membrane potential. Made with Biorender.com. Multiple myeloma (MM) is an incurable cancer of plasma cells with a 5‐year survival rate of 59%.
Connor S. Murphy   +12 more
wiley   +1 more source

Twin-Finder: Integrated Reasoning Engine for Pointer-related Code Clone Detection [PDF]

open access: yesarXiv, 2019
Detecting code clones is crucial in various software engineering tasks. In particular, code clone detection can have significant uses in the context of analyzing and fixing bugs in large scale applications. However, prior works, such as machine learning-based clone detection, may cause a considerable amount of false positives. In this paper, we propose
arxiv  

Exploring Code Clones in Programmable Logic Controller Software [PDF]

open access: yes, 2017
The reuse of code fragments by copying and pasting is widely practiced in software development and results in code clones. Cloning is considered an anti-pattern as it negatively affects program correctness and increases maintenance efforts. Programmable Logic Controller (PLC) software is no exception in the code clone discussion as reuse in development
arxiv   +1 more source

Molecular and functional profiling unravels targetable vulnerabilities in colorectal cancer

open access: yesMolecular Oncology, EarlyView.
We used whole exome and RNA‐sequencing to profile divergent genomic and transcriptomic landscapes of microsatellite stable (MSS) and microsatellite instable (MSI) colorectal cancer. Alterations were classified using a computational score for integrative cancer variant annotation and prioritization.
Efstathios‐Iason Vlachavas   +15 more
wiley   +1 more source

Stochastic variation in the FOXM1 transcription program mediates replication stress tolerance

open access: yesMolecular Oncology, EarlyView.
Cellular heterogeneity is a major cause of drug resistance in cancer. Segeren et al. used single‐cell transcriptomics to investigate gene expression events that correlate with sensitivity to the DNA‐damaging drugs gemcitabine and prexasertib. They show that dampened expression of transcription factor FOXM1 and its target genes protected cells against ...
Hendrika A. Segeren   +4 more
wiley   +1 more source

An evaluation of clone detection techniques for identifying crosscutting concerns [PDF]

open access: yes, 2004
Code implementing a crosscutting concern is often spread over many different parts of an application. Identifying such code automatically greatly improves both the maintainability and the evolvability of the application.
Bruntink, M. (Magiel)   +3 more
core  

CircCCNB1 inhibits vasculogenic mimicry by sequestering NF90 to promote miR‐15b‐5p and miR‐7‐1‐3p processing in nasopharyngeal carcinoma

open access: yesMolecular Oncology, EarlyView.
CircCCNB1 expression is down‐regulated in nasopharyngeal carcinoma (NPC); thus, less NF90 protein is bound to circCCNB1 and more binds to pri‐miRNAs, blocking their (pri‐miRNAs) binding to DGCR8 and inhibiting the processing and generation of miR‐15b‐5p/miR‐7‐1‐3p. Furthermore, decreased miR‐15b‐5p/miR‐7‐1‐3p promotes the expression of the target genes
Chunmei Fan   +6 more
wiley   +1 more source

Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems

open access: yesIEEE Access
The prevalence and impact of code clones in software systems have been widely studied in the past few decades. However, the focus has primarily been on intra-project clones.
Wenqing Zhu   +3 more
doaj   +1 more source

Clone Detection using Textual and Metric Analysis to figure out all Types of Clones [PDF]

open access: yes, 2020
-A Clone Detection approach is to find out the reused fragment of code in any application to maintain .Various types of clones are being identified by clone detection techniques.
Kanmani S, Kodhai E, Perumal A
core  

Home - About - Disclaimer - Privacy