Filters








14,662 Hits in 7.9 sec

Changes of Evaluation Values on Component Rank Model by Taking Code Clones into Consideration

Reishi YOKOMORI, Norihiro YOSHIDA, Masami NORO, Katsuro INOUE
2018 IEICE transactions on information and systems  
This method was realized by using the component rank model and by checking the differences of evaluation values for each component before and after merging components that had similar code fragments.  ...  Based on the proposed approach, we implemented a system to calculate differences of evaluation values for each component, and conducted three evaluation experiments to confirm that our method was useful  ...  We are supervisors of the thesis, and we added all of the experiments and considerations for this paper and [5] .  ... 
doi:10.1587/transinf.2017edp7125 fatcat:4fb2jg7ye5bzfc3swnpkd47ncu

Introduction of static quality analysis in small- and medium-sized software enterprises: experiences from technology transfer

Mario Gleirscher, Dmitriy Golubitskiy, Maximilian Irlbeck, Stefan Wagner
2013 Software quality journal  
By means of the analyses, we could detect multiple defects in production code.  ...  SMEs seem to take little advantage of this opportunity. Instead, they still mainly rely on the dynamic analysis approach of software testing.  ...  The authors owe sincere gratitude to Klaus Lochmann for his advice and support in issues related to quality models.  ... 
doi:10.1007/s11219-013-9217-z fatcat:lt5ztaxhyjb4hnpnofqdi7s5z4

Clone-based and interactive recommendation for modifying pasted code

Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao
2015 Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015  
We implement a proof-of-concept tool CCDemon based on our approach and evaluate its effectiveness based on code clones detected from five open source projects.  ...  Then our approach transfers each clone difference into a modification slot on the pasted code, suggests options for each slot, and further mines modifying regulations from the clone differences.  ...  When the value of an abstract component in one differential multiset is updated by code c, the values of all its equivalent components in other clone differential multiset will be updated to c accordingly  ... 
doi:10.1145/2786805.2786871 dblp:conf/sigsoft/LinPXZZ15 fatcat:zfv5tfe3vjepbkylfx4tlgvu4u

Prototypes with Multiple Dispatch: An Expressive and Dynamic Object Model [chapter]

Lee Salzman, Jonathan Aldrich
2005 Lecture Notes in Computer Science  
These two paradigms appear to be in conflict, however, preventing engineers from realizing the benefits of both technologies in one system.  ...  This paper introduces a novel object model, prototypes with multiple dispatch (PMD), which seamlessly unifies these two approaches.  ...  Acknowledgments We thank Aaron Greenhouse, Jonathan Moody, and the anonymous reviewers for their feedback on earlier drafts of this material.  ... 
doi:10.1007/11531142_14 fatcat:gf6b4sgnize5pdwx7epedlx2xe

Analysis and Prioritization of Design Metrics

Ritu Garg, R.K. Singh
2020 Procedia Computer Science  
The authors have empirically evaluated the results for structural model clone detection.  ...  The authors have empirically evaluated the results for structural model clone detection.  ...  Moreover, after detection of clones at design level, one can extend it with further comparison and detection of clones at code level using code metrics and other allied information that can enhance the  ... 
doi:10.1016/j.procs.2020.03.360 fatcat:adsnt5ngpbf2dom6wyapxbsuwq

Advances in software product quality measurement and its applications in software evolution

Peter Hegedus
2015 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
The manual assessment shed light on the fact that human evaluators tend to take into consideration a range of source code properties that is dierent from the given quality model.  ...  It means that our model interprets the quality on a broader scale than students do, i.e. it takes more factors into consideration.  ... 
doi:10.1109/icsm.2015.7332520 dblp:conf/icsm/Hegedus15 fatcat:ck7nljszirg3xm6p64ascacwpe

Reusing reused code

Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
In the proposed technique, code are suggested at the unit of past reuse. The proposed technique detects reused code by using a fine-grained code clone detection technique.  ...  This is because they suggest code based on the structure of programming languages such as files or classes. In this paper, we propose a new code search technique that considers past reuse.  ...  ) from the Japan Society for the Promotion of Science.  ... 
doi:10.1109/wcre.2013.6671322 dblp:conf/wcre/IshiharaHHK13 fatcat:jnfuf6ty3vczdij7rbgh4jtjde

Refactoring and migration of cascading style sheets: towards optimization and improved maintainability

Davood Mazinanian
2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016  
This thesis aims at developing techniques for safely transforming CSS code (through refactoring, or migration to a preprocessor language), with the goal of optimization and improved maintainability.  ...  Cascading Style Sheets is the standard styling language, and is extensively used for defining the presentation of web, mobile and desktop applications.  ...  these changes are safe (i.e., the technique migrates existing CSS code to take advantage of mixins by removing duplications) [18] .  ... 
doi:10.1145/2950290.2983943 dblp:conf/sigsoft/Mazinanian16 fatcat:imx7nhhkorhmxmfztv63p2tfci

A Cost-based Model for Risk Management in RFID-Enabled Supply Chain Applications [chapter]

Manmeet Mahinderjit-Singh, Xue Li, Zhanhuai Li
2011 Supply Chain Management  
The three main costs: damage, response, and operational cost, must be evaluated and quantified based on factors such as cloning attack types and the RFID system environment.  ...  By applying the Pareto distribution rule, we may eliminate 80% percent of counterfeiting by dealing with the causal factors of the top 20% of the reported RFID cloned and fraud tags.  ...  Cost insensitive learning does not take misclassification costs into consideration.  ... 
doi:10.5772/15067 fatcat:pdbuico6effvpdal7ua2sry7xy

Comparison of similarity metrics for refactoring detection

Benjamin Biegel, Quinten David Soetens, Willi Hornig, Stephan Diehl, Serge Demeyer
2011 Proceeding of the 8th working conference on Mining software repositories - MSR '11  
Many of these techniques rely on similarity measures to identify structurally equivalent code, however, up until now the effect of this similarity measure on the performance of the refactoring identification  ...  ., error detection, capturing intent of change, capturing and replaying changes, and relating refactorings and software metrics).  ...  Fabian Beck gave helpful comments on a draft of this paper.  ... 
doi:10.1145/1985441.1985452 dblp:conf/msr/BiegelSHDD11 fatcat:ua3gr4q3kjfxvdz5ehcul6g5he

Fault Localization Using Textual Similarities [article]

Zachary P. Fry, Westley Weimer
2012 arXiv   pre-print
In an empirical evaluation of 5345 historical defects from programs totaling 6.5 million lines of code, our approach reduced the number of files inspected per defect by over 91%.  ...  The approach represents reports and code as separate structured documents and ranks source files based on a document similarity metric that leverages inter-document relationships.  ...  Additionally, large projects often contain many code clones, and while not all cloning is harmful [25] , much of it is inconsistent: for example, code clones are changed consistently a mere 45-55% of  ... 
arXiv:1211.2858v1 fatcat:zjmwj5ll5ndfpmxxshlq5xcxsu

DeepClone: Modeling Clones to Generate Code Predictions [article]

Muhammad Hammad, Önder Babur, Hamid Abdul Basit, Mark van den Brand
2020 arXiv   pre-print
To facilitate code clone reuse, we propose DeepClone, a novel approach utilizing a deep learning algorithm for modeling code clones to predict the next set of tokens (possibly a complete clone method body  ...  ) based on the code written so far.  ...  Sohaib Khan (CEO at Hazen.ai) for providing us valuable feedback on the experimentation part of neural networks. We acknowledge SURFsara of providing us credits to perform experiments.  ... 
arXiv:2007.11671v2 fatcat:xh2rl2b5lrcnhbfbirlgtuqppu

Research on B Cell Algorithm for Learning to Rank Method Based on Parallel Strategy

Yuling Tian, Hongxian Zhang, Quan Zou
2016 PLoS ONE  
For the purposes of information retrieval, users must find highly relevant documents from within a system (and often a quite large one comprised of many individual documents) based on input query.  ...  Ranking the documents according to their relevance within the system to meet user needs is a challenging endeavor, and a hot research topic-there already exist several rank-learning methods based on machine  ...  Antibody Cloning After an antibody Ab i 2 P is evaluated by the affinity function, the antibody is cloned to produce a clone pool C i .  ... 
doi:10.1371/journal.pone.0157994 pmid:27487242 pmcid:PMC4972358 fatcat:nbxpmvhbcrbpbawm6435w2czfq

Context-Sensitive Code Completion Tool for Better API Usability

Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Daqing Hou
2014 2014 IEEE International Conference on Software Maintenance and Evolution  
Developers depend on APIs of frameworks and libraries to support the development process.  ...  Compared to other existing code completion tools, CSCC uses new sources of contextual information together with lightweight source code analysis to better recommend API method calls.  ...  Users can change this number to a different value (ranging from one to ten) by accessing the first combo-box.  ... 
doi:10.1109/icsme.2014.110 dblp:conf/icsm/AsaduzzamanRSH14a fatcat:f46jdvyukzfa5iog4s3ywxhm3y

A novel approach to optimize clone refactoring activity

Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Markus Neteler
2006 Proceedings of the 8th annual conference on Genetic and evolutionary computation - GECCO '06  
In this paper, we describe different components of the testing architecture.  ...  We focus on the developed tools performing mutation testing for JAVA code at method-level and the coveragebased testing for C code at function-level.  ...  Clone Refactoring Effort Model The effort required to refactor clones is modeled by the four following components: system understanding, clone modification, called context understanding, and calling context  ... 
doi:10.1145/1143997.1144312 dblp:conf/gecco/BouktifAMN06 fatcat:veegi4ov4rcgdf4x5hv7xfb65e
« Previous Showing results 1 — 15 out of 14,662 results