咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 12 篇 软件工程
    • 4 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 1 篇 信息与通信工程

主题

  • 14 篇 duplicated code
  • 4 篇 code clone
  • 3 篇 software clones
  • 2 篇 cloning
  • 2 篇 refactoring
  • 1 篇 antlr
  • 1 篇 code similarity
  • 1 篇 object oriented ...
  • 1 篇 maximum satisfia...
  • 1 篇 case tool
  • 1 篇 technical debt
  • 1 篇 redundant code
  • 1 篇 language workben...
  • 1 篇 programming
  • 1 篇 mps
  • 1 篇 program analysis
  • 1 篇 malicio
  • 1 篇 detection tool
  • 1 篇 matching distanc...
  • 1 篇 code smell detec...

机构

  • 1 篇 ecole polytech d...
  • 1 篇 osaka univ grad ...
  • 1 篇 shiraz azad univ...
  • 1 篇 axiv gmbh d-7056...
  • 1 篇 univ saskatchewa...
  • 1 篇 univ bremen brem...
  • 1 篇 school of comput...
  • 1 篇 univ bern inst a...
  • 1 篇 kagoshima coll n...
  • 1 篇 kindai univ higa...
  • 1 篇 wageningen ur wa...
  • 1 篇 massey univ palm...
  • 1 篇 iflytek co. ltd
  • 1 篇 univ bremen d-28...
  • 1 篇 fukuoka inst tec...
  • 1 篇 140 north rd ber...
  • 1 篇 univ kent sch co...
  • 1 篇 osaka univ grad ...
  • 1 篇 beijing univ pos...
  • 1 篇 aalto university

作者

  • 2 篇 koschke rainer
  • 1 篇 inoue k
  • 1 篇 thompson simon
  • 1 篇 berger bernhard
  • 1 篇 chen junliang
  • 1 篇 kusumoto s
  • 1 篇 tabo takeru
  • 1 篇 inoue katsuro
  • 1 篇 roy chanchal k.
  • 1 篇 nierstrasz o
  • 1 篇 kusumoto shinji
  • 1 篇 cheng zhang
  • 1 篇 nadkarni joao
  • 1 篇 nasehi seyyed me...
  • 1 篇 liu chuanchang
  • 1 篇 toda koji
  • 1 篇 krinke jens
  • 1 篇 tsunoda masateru
  • 1 篇 monden akito
  • 1 篇 gong yunzhan

语言

  • 14 篇 英文
检索条件"主题词=duplicated code"
14 条 记 录,以下是1-10 订阅
排序:
duplicated code Pattern Mining in Visual Programming Languages  2021
Duplicated Code Pattern Mining in Visual Programming Languag...
收藏 引用
29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
作者: Terra-Neves, Miguel Nadkarni, Joao Ventura, Miguel Resende, Pedro Veiga, Hugo Alegria, Antonio OutSystems Lisbon Portugal
Visual Programming Languages (VPLs), coupled with the high-level abstractions that are commonplace in visual programming environments, enable users with less technical knowledge to become proficient programmers. Howev... 详细信息
来源: 评论
Source code enhancement using reduction of duplicated code
Source code enhancement using reduction of duplicated code
收藏 引用
International Conference on Software Engineering
作者: Nasehi, Seyyed Mehdi Sotudeh, Gholam Reza Gomrokchi, Maziar Shiraz Univ Technol Dept IT Modarres Blvd Shiraz Iran Shiraz Azad Univ Dept Engn Shiraz Iran
In this paper a novel method is proposed which is capable of detecting code smell incidents of duplicated code in a source code. The proposed method is superior to other methods since it is capable of detecting subtle... 详细信息
来源: 评论
A AST AND CONTEXT BASED duplicated code DETECTING METHOD
A AST AND CONTEXT BASED DUPLICATED CODE DETECTING METHOD
收藏 引用
3rd China-Ireland International Conference on Information and Communications Technologies
作者: Liu, Wei Liu, Chuanchang Gong, Yunzhan Chen, Junliang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
This paper presents a duplicated code detecting method based on AST (Abstract Syntax Tree) and context, and designs a flexible rule-based parameterized matching method which is able to locate the consecutive duplicate... 详细信息
来源: 评论
DT:an upgraded detection tool to automatically detect two kinds of code smell:duplicated code and Feature Envy
DT:an upgraded detection tool to automatically detect two ki...
收藏 引用
作者: Xinghua Liu Cheng Zhang School of Computer Science and Technology Anhui University iflytek Co. Ltd
code smell is unreasonable programming,and is produced when software developers don't have good habits of development and experience of development and other *** becomes more and more chaotic,the code structure be... 详细信息
来源: 评论
A Retrospective on Developing code Clone Detector CCFinder and Its Impact
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2025年 第3期51卷 808-813页
作者: Kamiya, Toshihiro Kusumoto, Shinji Inoue, Katsuro Shimane Univ Interdisciplinary Fac Sci & Engn Dept Math & Comp Sci Matsue Shimane 6908504 Japan Osaka Univ Grad Sch Informat Sci & Technol Dept Comp Sci Suita Osaka 5650871 Japan Nanzan Univ Fac Sci & Technol Dept Software Engn Nagoya Aichi 4668673 Japan
In this retrospective article of our TSE paper "CCFinder: A Multilinguistic Token-Based code Clone Detection System for Large Scale Source code" (Kamiya et al., 2002), we revisit the reasons why we became de... 详细信息
来源: 评论
Finding clones with dup: Analysis of an experiment
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2007年 第9期33卷 608-621页
作者: Baker, Brenda S. 140 North Rd Berkeley Hts NJ 07922 USA
An experiment was carried out by a group of scientists to compare different tools and techniques for detecting duplicated or near-duplicated source code. The overall comparative results are presented elsewhere. This p... 详细信息
来源: 评论
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2002年 第7期28卷 654-670页
作者: Kamiya, T Kusumoto, S Inoue, K Osaka Univ Grad Sch Engn Sci Funct & Configurat Grp RPRESTOJST Toyonaka Osaka 5608531 Japan
A code clone is a code portion in source files that is identical or similar to another. Since code clones are believed to reduce the maintainability of software, several code clone detection techniques and tools have ... 详细信息
来源: 评论
Comparison and evaluation of clone detection tools
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2007年 第9期33卷 577-591页
作者: Bellon, Stefan Koschke, Rainer Antoniol, Giuliano Krinke, Jens Merlo, Ettore Axiv GmbH D-70569 Stuttgart Germany Univ Bremen D-28334 Bremen Germany Ecole Polytech Dept Genie Informat Montreal PQ H3T 1J4 Canada Fernuniv D-58097 Hagen Germany Ecole Polytech Dept Comp Engn Montreal PQ H3C 3A7 Canada
Many techniques for detecting duplicated source code (software clones) have been proposed in the past. However, it is not yet clear how these techniques compare in terms of recall and precision as well as space and ti... 详细信息
来源: 评论
Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis  16
Clone Detection Method Selection Based on Bandit Algorithm: ...
收藏 引用
16th IEEE International Workshop on Software Clones (IWSC)
作者: Tabo, Takeru Kudo, Takuto Tsunoda, Masateru Tahir, Amjed Bennin, Kwabena Ebo Toda, Koji Nakasai, Keitaro Monden, Akito Kindai Univ Higashiosaka Osaka Japan Massey Univ Palmerston North New Zealand Wageningen UR Wageningen Netherlands Fukuoka Inst Technol Fukuoka Japan Kagoshima Coll NIT Kirishima Japan Okayama Univ Okayama Japan
Various clone detection methods have been proposed in the past, with results varying depending on the combination of the methods and parameters setting used (i.e., configurations). To help with the selection of a suit... 详细信息
来源: 评论
A Constraint Programming Approach to Conflict-aware Optimal Scheduling of Prioritized code Clone Refactoring
A Constraint Programming Approach to Conflict-aware Optimal ...
收藏 引用
11th IEEE International Working Conference on Source code Analysis and Manipulation/IEEE International Conference on Software Maintenance/IEEE International Symposium on Web Systems Evolution/VISSOFT/MESOCA
作者: Zibran, Minhaz F. Roy, Chanchal K. Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 5C9 Canada
duplicated code, also known as code clones, are one of the malicious 'code smells' that often need to be removed through refactoring for enhancing maintainability. Among all the potential refactoring opportuni... 详细信息
来源: 评论