• No results found

Source Code

Source Code Summarization of Context for Java Source Code

Source Code Summarization of Context for Java Source Code

... The findings that result from this proposal would most directly affect automatic source code summarization. This paper cites several source code summarization tools. Haiduc et al. [7] used a ...

6

Source code plagiarism : a UK Academic Perspective

Source code plagiarism : a UK Academic Perspective

... constitute source- code plagiarism in an undergraduate ...constitute source-code plagiarism, some academics have expressed important issues concerned with source-code reuse, and ...

6

SCALE: Source Code Analyzer for Locating Errors

SCALE: Source Code Analyzer for Locating Errors

... (Source Code Analyzer for Locating Errors), a tool for systematic software testing multi-threaded Unix/Linux applications written in C using the pthread ...

82

Source Code Comparison of DOS and CP/M

Source Code Comparison of DOS and CP/M

... the code copyrighted by Digital Research in ...of code, and cutting out the stamp removed source code text, the underlying text was rebuilt using characters copied from other sections of ...

38

Archetypal Internet-Scale Source Code Searching

Archetypal Internet-Scale Source Code Searching

... While selecting which component to reuse, the most important single criterion was functionality. The type of software license came in second. Help from a local expert, an electronic forum, a mailing list archive, or ...

8

Source code plagiarism : a UK academic perspective

Source code plagiarism : a UK academic perspective

... on source-code reuse ...reuse code for assessments where possible!’ and another was clear that it was ‘not an academic offence’, and emphasised “I find it hard to assume that students were not ...

75

Style analysis for source code plagiarism detection

Style analysis for source code plagiarism detection

... executable code is possible in addition to source code, as demonstrated in (2), and in (10) an optimisation approach allows the analysis of large data ...

10

A New Model for Semiautomatic Student Source Code Assessment

A New Model for Semiautomatic Student Source Code Assessment

... 8 source code pools, and saved the respective attribute representation of each combination in a sepa- rate ...the source code ...respective source code ...

10

Facilitating Configurability by Separation of Concerns in the Source Code

Facilitating Configurability by Separation of Concerns in the Source Code

... at a particular point in time could be computed dynamically, based on the concerns associated with them, necessarily including their creation and removal time instead of being stored ex- plicitly. We hoped to be able to ...

16

Language Composition Using Source Code Annotations

Language Composition Using Source Code Annotations

... examine source code annotations from the viewpoint of formal languages – we discuss their abstract syntax, concrete syntax, and seman- tics, thus showing the correspondence between annotations and formal ...

24

DISCOVERY OF MODEL IMPLEMENTATION PATTERNS IN SOURCE CODE

DISCOVERY OF MODEL IMPLEMENTATION PATTERNS IN SOURCE CODE

... sing source code, building an abstract representation of it and then either directly working on that repre- sentation [41–43] or building a set of predicates [39, 40], or computing code metrics and ...

9

Obscuring Mobile Agents by  Source Code Obfuscation

Obscuring Mobile Agents by Source Code Obfuscation

... the code is on the way to the destination ...the code itself, for example java byte ...makes code less understandable without changing its ...converts source code of a mobile agent into ...

5

Source Code Plagiarism Detection 'SCPDet': A Review

Source Code Plagiarism Detection 'SCPDet': A Review

... to Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis, in this Research Paper Authors Georgina Cosma, Mike Joy used the two different tools PlaGate, a novel tool that can be ...

8

The Effectiveness of Source Code Obfuscation: an Experimental Assessment

The Effectiveness of Source Code Obfuscation: an Experimental Assessment

... client source code, and perform two comprehension tasks, (T1 and T2 in Ta- ble ...the code modified by the subjects, and evalu- ated the attack as successful if test cases ...

11

Dissecting and digging application source code for vulnerabilities

Dissecting and digging application source code for vulnerabilities

... source code. Above regex will find all possible matches in the source code and display on the tool’s ...supplying source code base along with rules ...

9

Secure Your Source Code and Digital Assets

Secure Your Source Code and Digital Assets

... Dynamsoft has heavily invested in SCM Anywhere Hosted's development, infrastructure, support and maintenance. As a software development company, we fully understand the importance of source code and digital ...

8

Incremental Origin Analysis of Source Code Files

Incremental Origin Analysis of Source Code Files

... the source code history of a file is often not complete because movements or copies of the file are not recorded in the ...open source projects have been previously managed with CVS (where no origin ...

10

Automating the Extraction and Evaluation of Comments in Source Code.

Automating the Extraction and Evaluation of Comments in Source Code.

... We believe there is considerable similarity between automating the grading of short answer responses and that of source code comments. Both involve parsing and evaluating concise explanations written in ...

37

Coherent clusters in source code

Coherent clusters in source code

... code lines to have nearly identical length and indentation. Inspection of the source code reveals that this block of code is a switch statement handling 234 cases. Further investigation shows ...

45

Analysis of Source Code: A Case Study

Analysis of Source Code: A Case Study

... We now focus on the processes that need to be created to test the behaviour of the FWTK components. Each component interacts with a client and can also run as a daemon process. To keep the environment as close to reality ...

15

Show all 10000 documents...

Related subjects