Results 41 to 50 of about 240,865 (343)
A Large-Gap Clone Detection Approach Using Sequence Alignment via Dynamic Parameter Optimization
Large-gap clones, a kind of clones that reuses code with many edits, are very common in software development practice and widespread in software systems. The detection of such clones is very crucial.
Jinze Liu +4 more
doaj +1 more source
Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
Nowadays most of software contains code duplication that leads to serious problems in software maintenance. A lot of different clone detection approaches have been proposed over the years to deal with this problem, but almost all of them do not consider ...
Marat Akhin, Vladimir Itsykson
doaj +3 more sources
People plagiarize because sometimes it is easier for them to plagiarize then to do the work in the first place. Plagiarism has many forms, it could range from just copy and pasting text found off the internet, to modifying the text so that it appears they wrote the text on their own.
openaire +2 more sources
Survey on Software code clone detection
Software code clones refer to the same part of code that appears in different places. Software clones (with or without edits) may occur during the software development for the same requirements. This copy and paste may be done on different levels (file, class, and method).
Yasir Mohammed Khazaal +1 more
openaire +1 more source
How are functionally similar code clones syntactically different? An empirical study and a benchmark [PDF]
Background. Today, redundancy in source code, so-called “clones” caused by copy&paste can be found reliably using clone detection tools. Redundancy can arise also independently, however, not caused by copy&paste.
Stefan Wagner +4 more
doaj +2 more sources
A Deep Learning Approach for a Source Code Detection Model Using Self-Attention
With the development of deep learning, many approaches based on neural networks are proposed for code clone. In this paper, we propose a novel source code detection model At-biLSTM based on a bidirectional LSTM network with a self-attention layer.
Yao Meng, Long Liu
doaj +1 more source
Robust App Clone Detection Based on Similarity of UI Structure
App clone is a serious threat to the mobile app ecosystem, which not only damages the benefits of original developers, but also contributes to spreading malware.
Yangyu Hu +5 more
doaj +1 more source
Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities.
Zhenhao Luo +3 more
doaj +1 more source
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
Natural Language Generation and Understanding of Big Code for AI-Assisted Programming: A Review
This paper provides a comprehensive review of the literature concerning the utilization of Natural Language Processing (NLP) techniques, with a particular focus on transformer-based large language models (LLMs) trained using Big Code, within the domain ...
Man-Fai Wong +4 more
doaj +1 more source

