Filters








137,755 Hits in 3.1 sec

Insights into system-wide code duplication

M. Rieger, S. Ducasse, M. Lanza
11th Working Conference on Reverse Engineering  
Duplication of code is a common phenomenon in the development and maintenance of large software systems.  ...  In this paper we propose a number of visualizations of duplicated source elements that support reengineers in answering questions, e.g., which parts of the system are connected by copied code or which  ...  This means that in a system of 1 million lines of code, 50'000 to 100'000 lines of code are involved in duplication.  ... 
doi:10.1109/wcre.2004.25 dblp:conf/wcre/RiegerDL04 fatcat:4rjxbnpmurfxfe2arvwpv3ogdy

SQuAVisiT: A Software Quality Assessment and Visualisation Toolset

Serguei Roubtsov, Alexandru Telea, Danny Holten
2007 Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)  
First, it allows a fully automatic extraction of metrics, call information, and code duplication from COBOL source code.  ...  We illustrate the usage of our toolset with an industrial case study on a COBOL system comprising about 3000 modules and 1.7 million lines of code.  ...  Visualization with Gemx ( Fig. 3) showed widely spread code duplication, especially at the 'Data' and 'Business rules' layers.  ... 
doi:10.1109/scam.2007.4362907 fatcat:wiuipoweszdlzimj4jr3ipkgkm

SQuAVisiT: A Software Quality Assessment and Visualisation Toolset

Serguei Roubtsov, Alexandru Telea, Danny Holten
2007 Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)  
First, it allows a fully automatic extraction of metrics, call information, and code duplication from COBOL source code.  ...  We illustrate the usage of our tool with an industrial case study on a COBOL system comprising about 3000 modules and 1.7 million lines of code.  ...  Widely spread black spots show code duplication  ... 
doi:10.1109/scam.2007.16 dblp:conf/scam/RoubtsovTH07 fatcat:5kxexntcqbh4tosq7hjjhfsp2q

Software maintenance research that is empirically valid and useful in practice

Elmar Juergens
2016 it - Information Technology  
AbstractFor successful software system, maintenance efforts dominate initial development costs by far.  ...  In consequence, companies suffer mission-critical systems that are extremely hard to maintain.To better support practitioners in writing maintainable software, we both need an empirically sound understanding  ...  Figure 2 displays a duplicated code fragment from a Java open-source system.  ... 
doi:10.1515/itit-2016-0014 fatcat:orcmha7adna4djhxalsw67kpgy

Sequencing of the sea lamprey (Petromyzon marinus) genome provides insights into vertebrate evolution

Jeramiah J Smith, Shigehiro Kuraku, Carson Holt, Tatjana Sauka-Spengler, Ning Jiang, Michael S Campbell, Mark D Yandell, Tereza Manousaki, Axel Meyer, Ona E Bloom, Jennifer R Morgan, Joseph D Buxbaum (+47 others)
2013 Nature Genetics  
DISCUSSION The lamprey genome provides unique insight into the origin and evolution of the vertebrate lineage.  ...  Given the critical phylogenetic position of the lamprey as an outgroup to the gnathostomes (Fig. 1) , comparing the lamprey genome to gnathostome genomes holds the promise of providing insights into the  ... 
doi:10.1038/ng.2568 pmid:23435085 pmcid:PMC3709584 fatcat:gcs3dnkhfzgs5c2vvx7vxtmwl4

Update on the genetic architecture of schizophrenia

Franziska Degenhardt
2020 Medizinische Genetik  
Since this initial reporting of deletions in the chromosomal region 22q11.2, nearly two decades passed until substantial insights into schizophrenia's genetic architecture were gained.  ...  These deletions and duplications are also associated with a range of neurodevelopmental disorders.  ...  Supplementing the available genetic data with genome-wide methylation data will provide further insights into the biological mechanisms underlying schizophrenia.  ... 
doi:10.1515/medgen-2020-2009 fatcat:ieg6ftiahffalo3v7hqcnqlwrq

New Insights into the Genomic Organization and Origin of the Major Histocompatibility Complex: Role of Chromosomal (genome) Duplication in the Emergence of the Adaptive Immune System

Masanori Kasahara
2004 Hereditas  
Taking this and others into account, I suggest that the duplication(s) involving the MHC region probably took place as a part of the genome-wide duplication(s).  ...  Accumulating evidence indicates that (a) genome-wide duplication(s) took place close to the origins of vertebrates.  ...  there any evidence suggesting that the genome-wide duplication facilitated the emergence of TCR and Ig, the other key molecules of the adaptive immune system?  ... 
doi:10.1111/j.1601-5223.1997.t01-1-00059.x pmid:9420471 fatcat:i4fhxy6m7bflpbd3m6fduehw4m

miRNA-mRNA integrative expression mapping during mouse embryonic stem cell to Neuron progenitor differentiation

Rakhee Nayak, Vanita Uppada, Sreenivasulu Kurukuti
2017 Canadian Journal of Biotechnology  
Genome-wide transcriptome profiling of mammalian cells has given more insight into complexity of RNA world.  ...  Vast majority of RNAs are falling under non-coding category, among which ~22 nucleotides RNA is known as microRNA.  ...  Genome-wide transcriptome profiling of mammalian cells has given more insight into complexity of RNA world.  ... 
doi:10.24870/cjb.2017-a166 fatcat:zmyfvg55sfgsnj6ojfvx6qmgry

Modeling redundancy: Quantitative and qualitative models

A. Mili, Lan Wu, F.T. Sheldon, M. Shereshevsky, J. Desharnais
2006 IEEE International Conference on Computer Systems and Applications, 2006.  
Redundancy is a system property that generally refers to duplication of state information or system function.  ...  While redundancy is usually investigated in the context of fault tolerance, one can argue that it is in fact an intrinsic feature of a system that can be analyzed on its own without reference to fault  ...  If contains 8 states that are equally likely to occur and are coded on 6 bits where the code of each state is duplicated, then ¦ © ¢ Tame Distribution.  ... 
doi:10.1109/aiccsa.2006.205060 dblp:conf/aiccsa/MiliWSSD06 fatcat:fssfjlgz25fxvaysvr6r3tumxe

Genome-wide and molecular evolution analysis of the Poplar KT/HAK/KUP potassium transporter gene family

Caiyun He, Kai Cui, Aiguo Duan, Yanfei Zeng, Jianguo Zhang
2012 Ecology and Evolution  
This study might provide more insights into the underlying evolution mechanisms of trees acclimating to their natural habitat. 1996  ...  In this study, with genome-wide in-depth investigation, 31 Poplar KT/HAK/KUP transporter genes including six pairs of tandem duplicated and eight pairs of segmental duplicated paralogs have been identified  ...  To gain more insight into evolution of the KT/HAK/ KUP gene family in P. trichocarpa, the previously genome-wide identified amino acid sequences of 13 KT/HAK/KUP genes in dicotyledonous Arabidopsis thaliana  ... 
doi:10.1002/ece3.299 pmid:22957200 pmcid:PMC3434002 fatcat:szckesw7ezej3g6bbsgld7bvkq

The Delta Maintainability Model: Measuring Maintainability of Fine-Grained Code Changes

Marco Di Biase, Ayushi Rastogi, Magiel Bruntink, Arie Van Deursen
2019 Zenodo  
The Delta Maintainability Model: Measuring Maintainability of Fine-Grained Code Changes - 2nd International Conference on Technical Debt (TechDebt 2019) - Montréal, Canada - May 26–27, 2019 Technical Report  ...  We derived additional insights into the DMM scores from the experiences of the two authors who did the manual assessment. They collectively expressed difficulty in identifying duplicates.  ...  FIGURE 1 . 1 SIG-MM APPROACH TO MOVE FROM SOURCE CODE MEASUREMENTS TO SYSTEM-WIDE RATINGS ( 3 ) 3 Measurements are taken in lines of code according to the specifications of the SIG-MM [19] .(4) Next,  ... 
doi:10.5281/zenodo.2606632 fatcat:xlazrjqozjclxecyuttexjdh6e

An evaluation of lazy fault detection based on Adaptive Redundant Multithreading

Saurabh Hukerikar, Keita Teranishi, Pedro C. Diniz, Robert F. Lucas
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
While the use of redundant computing can provide detection and possible correction of errors, its system-wide use in future extreme-scale HPC systems will incur considerable overheads to application performance  ...  The computation contained in the programmer directive is executed by duplicate threads.  ...  The compiler inserts code for the allocation of buffer space into which the duplicate threads can commit their respective outputs. Each buffer entry contains a pair of elements.  ... 
doi:10.1109/hpec.2014.7040999 dblp:conf/hpec/HukerikarTDL14 fatcat:iepgbfyqnrcfzkbnjiu36gcrwm

Hot clones: Combining search-driven development, clone management, and code provenance

Niko Schwarz
2012 2012 34th International Conference on Software Engineering (ICSE)  
Code duplication is common in current programming-practice: programmers search for snippets of code, incorporate them into their projects and then modify them to their needs.  ...  of their code snippets, and researchers could gather information on clone usage.  ...  But oversights in consistently applying changes to clones may introduce bugs into the system [3] .  ... 
doi:10.1109/icse.2012.6227221 dblp:conf/icse/Schwarz12 fatcat:gqkwdqwi2zbdvc5b22wvqqvhx4

The Delta Maintainability Model: Measuring Maintainability of Fine-Grained Code Changes

Marco di Biase, Ayushi Rastogi, Magiel Bruntink, Arie van Deursen
2019 2019 IEEE/ACM International Conference on Technical Debt (TechDebt)  
DMM categorizes changed lines of code into low and high risk, and then uses the proportion of low risk change to calculate a delta score.  ...  Existing maintainability models are used to identify technical debt of software systems.  ...  We derived additional insights into the DMM scores from the experiences of the two authors who did the manual assessment. They collectively expressed difficulty in identifying duplicates.  ... 
doi:10.1109/techdebt.2019.00030 dblp:conf/icse/BiaseRBD19 fatcat:fxdgjekztrcp3bp6mp2y4nofue

Case study: Visual analytics in software product assessments

Alexandru Telea, Lucian Voinea
2009 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis  
All in all, the conclusion drawn was that external duplication is not a serious problem for system-wide refactoring or testing. The bottom image in Figure 9 shows internal duplication.  ...  Second, code modifications caused by insight found during testing and debugging should be done consistently across duplicated code.  ... 
doi:10.1109/vissof.2009.5336417 dblp:conf/vissoft/TeleaV09 fatcat:ag5ptgxxyrezxdsp5owggov2tu
« Previous Showing results 1 — 15 out of 137,755 results