Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Computer Applications in Engineering Education"
DOI: 10.1002/cae.22066
Abstract: Source code plagiarism detection using Running‐Karp‐Rabin Greedy‐String‐Tiling (RKRGST) is a common practice in academic environment. However, such approach is time‐inefficient (due to RKRGST's cubic time complexity) and insensitive (toward token subsequence rearrangement). This paper proposes…
read more here.
Keywords:
code plagiarism;
plag;
plagiarism;
source code ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "Journal of Software: Evolution and Process"
DOI: 10.1002/smr.2398
Abstract: Although architectural smells are one of the most studied type of architectural technical debt, their impact on maintenance effort has not been thoroughly investigated. Studying this impact would help to understand how much technical debt…
read more here.
Keywords:
architectural smells;
smells source;
source;
source code ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "SoftwareX"
DOI: 10.1016/j.softx.2018.07.002
Abstract: Abstract Team members do not always review, or understand, all source code and the decisions that are made in it. Code developers and maintainers should have tools available to easily write, maintain, collate and share…
read more here.
Keywords:
code;
code diary;
diary automatic;
source code ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "SoftwareX"
DOI: 10.1016/j.softx.2021.100711
Abstract: Abstract The Big Code and Mining Software Repositories research lines analyze large amounts of source code to improve software engineering practices. Massive codebases are used to train machine learning models aimed at improving the software…
read more here.
Keywords:
stochastic generation;
python application;
cnerator python;
code ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3034932
Abstract: Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright? Source Code Authorship Attribution is done by…
read more here.
Keywords:
authorship attribution;
code;
source code;
source ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3127499
Abstract: Big-data processing systems such as Hadoop, which usually utilize distributed file systems (DFSs), require data reduction schemes to maximize storage space efficiency. These schemes have different tradeoffs, and there are no all-purpose schemes applicable to…
read more here.
Keywords:
reduction;
hadoop;
data reduction;
dfs ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3144598
Abstract: Predicting defective software modules before testing is a useful operation that ensures that the time and cost of software testing can be reduced. In recent years, several models have been proposed for this purpose, most…
read more here.
Keywords:
source code;
defect prediction;
source;
code ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3151395
Abstract: Source code analysis is one of the important activities during the software maintenance phase that focuses on performing the tasks including bug localization, feature location, bug/feature assignment, and so on. However, handling the aforementioned tasks…
read more here.
Keywords:
software;
source code;
code analysis;
code ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3155558
Abstract: Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language. Generally, researchers can…
read more here.
Keywords:
sequence;
conversion;
pseudo code;
source code ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3265731
Abstract: Software bug localization is an important step in the software maintenance process. Automatic bug localization can reduce the time consumed in the process of localization. Some techniques are applied in the bug localization process, but…
read more here.
Keywords:
localization;
bug localization;
source code;
phase ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3271992
Abstract: Code summarization is the process of automatically generating brief and informative summaries of source code to aid in software comprehension and maintenance. In this paper, we propose a novel model called READSUM, REtrieval-augmented ADaptive transformer…
read more here.
Keywords:
readsum retrieval;
source code;
code summarization;
code ... See more keywords