Results 111 to 120 of about 42,100 (284)

Analysis of the impact of refactoring on code quality – comparative analysis of two cases

open access: yesJournal of Computer Sciences Institute, 2017
In agile methods, one of the techniques for improving code quality is refactoring. This is a process that employs a number of techniques, modifying the code without changing its functionality, aiming to improve its transparency and reduce vulnerability ...
Mariusz Łukasik, Marek Miłosz
doaj   +1 more source

Using Modularity Metrics to assist Move Method Refactoring of Large System

open access: yes, 2013
For large software systems, refactoring activities can be a challenging task, since for keeping component complexity under control the overall architecture as well as many details of each component have to be considered.
Napoli, Christian   +2 more
core   +1 more source

Clone Detection and Elimination for Haskell [PDF]

open access: yes, 2010
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code makes maintenance and code understanding more complex and time consuming.
Brown, Christopher, Thompson, Simon
core   +1 more source

Boosting Dibenzothiophene Biodesulfurization Through Implantation of a Refactored DBT Pathway in a Tailored Pseudomonas putida Chassis

open access: yesMicrobial Biotechnology, Volume 18, Issue 9, September 2025.
This study engineered a Pseudomonas putida strain to efficiently remove sulfur from dibenzothiophene (DBT) by reordering and optimising the dsz operon from Rhodococcus qingshengii IGTS8, enhancing catalytic activity and stability. The modified strain, P. putida DS006, showed high desulfurization efficiency in model biodesulfurization systems.
Panayiotis D. Glekas   +6 more
wiley   +1 more source

A heuristic-based approach to code-smell detection [PDF]

open access: yes, 2007
Encapsulation and data hiding are central tenets of the object oriented paradigm. Deciding what data and behaviour to form into a class and where to draw the line between its public and private details can make the difference between a class that is an ...
Kirk, D., Roper, M., Wood, M.
core  

An approach for coherent periodogram averaging of tilt‐series data for improved contrast transfer function estimation

open access: yesFEBS Open Bio, Volume 15, Issue 8, Page 1209-1218, August 2025.
The contrast transfer function (CTF) is an imaging aberration that is a major resolution‐limiting factor in cryo‐electron microscopy (cryo‐EM). Precise CTF estimation is key to overcoming this limitation, but is particularly challenging in cryo‐electron tomography (cryo‐ET) data. Here, we present an approach for using geometric information to assist in
Sagar Khavnekar, William Wan
wiley   +1 more source

NoCodeGPT: A No‐Code Interface for Building Web Apps With Language Models

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1408-1424, August 2025.
ABSTRACT Background Language models are increasingly used by software developers. However, it remains unclear whether their standard chat‐based interfaces are suitable for software development—especially for users with limited programming experience.
Mauricio Monteiro   +4 more
wiley   +1 more source

An Automated Refactoring Approach to Improve IoT Software Quality

open access: yesApplied Sciences, 2020
Internet of Things (IoT) software should provide good support for IoT devices as IoT devices are growing in quantity and complexity. Communication between IoT devices is largely realized in a concurrent way.
Yang Zhang   +6 more
doaj   +1 more source

Verification and Refactoring

open access: yes, 2018
Part of overall tutorial on better scientific software presented at SC18.
openaire   +1 more source

Refactoring of a Database

open access: yes, 2009
The technique of database refactoring is all about applying disciplined and controlled techniques to change an existing database schema. The problem is to successfully create a Database Refactoring Framework for databases. This paper concentrates on the feasibility of adapting this concept to work as a generic template.
Dsousa, Ayeesha, Bhatia, Shalini
openaire   +2 more sources

Home - About - Disclaimer - Privacy