Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
The vision of software clone management: Past, present, and future (keynote paper)
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …
negative impacts on the development and maintenance of software systems. Software clone …
Conflict‐aware optimal scheduling of prioritised code clone refactoring
Duplicated or similar source code, also known as code clones, are possible malicious 'code
smells' that may need to be removed through refactoring to enhance maintainability. Among …
smells' that may need to be removed through refactoring to enhance maintainability. Among …
A survey on clone refactoring and tracking
Code clones, identical or nearly similar code fragments in a software system's code-base,
have mixed impacts on software evolution and maintenance. Focusing on the issues of …
have mixed impacts on software evolution and maintenance. Focusing on the issues of …
A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring
Duplicated code, also known as code clones, are one of the malicious ‘ code smells' that
often need to be removed through refactoring for enhancing maintainability. Among all the …
often need to be removed through refactoring for enhancing maintainability. Among all the …
Exposing I/O concurrency with informed prefetching
RH Patterson, GA Gibson - Proceedings of 3rd International …, 1994 - ieeexplore.ieee.org
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
[PDF][PDF] The road to software clone management: A survey
1 Yearly number of distinct authors contributing to clone research... 5 2 Categories of
publications on software clone research in different years 5 3 Proportion of publications in …
publications on software clone research in different years 5 3 Proportion of publications in …
[HTML][HTML] A naturally protective epitope of limited variability as an influenza vaccine target
CP Thompson, J Lourenço, AA Walters… - Nature …, 2018 - nature.com
Current antigenic targets for influenza vaccine development are either highly immunogenic
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …
Prioritizing code clone detection results for clone management
RD Venkatasubramanyam, S Gupta… - 2013 7th International …, 2013 - ieeexplore.ieee.org
Clone detection through tools is a common practice in the software industry. Associated with
clone detection is code clone management, which includes taking informed decisions for …
clone detection is code clone management, which includes taking informed decisions for …