• No results found

[PDF] Top 20 Analysis Of Source Lines Of Code(SLOC) Metric

Has 10000 "Analysis Of Source Lines Of Code(SLOC) Metric" found on our website. Below are the top 20 most common "Analysis Of Source Lines Of Code(SLOC) Metric".

Analysis Of Source Lines Of Code(SLOC) Metric

Analysis Of Source Lines Of Code(SLOC) Metric

... There is no standard definition of what a line of code is. Do comments count? Are data declarations included? What happens if a statement extends over several lines? – These are the questions that often ... See full document

5

Predicting attack-prone components with internal metrics

Predicting attack-prone components with internal metrics

... million source lines of code (SLOC) to create and evaluate predictive models that identify attack-prone ...static analysis tool FlexeLint 3 , code churn, and ...static ... See full document

12

A Programming Language Independent Framework for Metrics-based Software Evolution and Analysis

A Programming Language Independent Framework for Metrics-based Software Evolution and Analysis

... a source code ...evolutionary analysis based on software structures (e.g. detecting structural source code changes between sequential software ...of metric algo- rithms ...deeper ... See full document

32

Analysis of Source Code: A Case Study

Analysis of Source Code: A Case Study

... We chose to analyse the FWTK (FireWall ToolKit) system from Trusted Information Systems (TIS) http://www.tis.com/research/software. TIS makes available the sources free of charge for educational and research purposes. ... See full document

15

VisminerTD: a tool for automatic identification and interactive monitoring of the evolution of technical debt items

VisminerTD: a tool for automatic identification and interactive monitoring of the evolution of technical debt items

... (viii) Code Smells: detects code smells; (ix) Custom TD thresholds: allows to set TD identification thresholds; (x) Multiple versions analysis: allows the analysis of multiple versions ... See full document

28

Coherent clusters in source code

Coherent clusters in source code

... code lines to have nearly identical length and ...the source code reveals that this block of code is a switch statement handling 234 ...dependence analysis collateral damage’ ... See full document

45

On software modernisation due to library obsolescence

On software modernisation due to library obsolescence

... the source code of the client software system and the API of the obsolete library, our methodology operates as ...enable source code analysis, and extraction of suitable metrics and ab- ... See full document

5

Suitability of BlackBox dataset for style analysis in detection of source code plagiarism

Suitability of BlackBox dataset for style analysis in detection of source code plagiarism

... and source that is often obtained from the text books and online sources, there is a variety of easy ways for students to copy others’ ...detect source code plagiarism because it relates to ... See full document

6

Style analysis for source code plagiarism detection

Style analysis for source code plagiarism detection

... explained source code features which might identify the author of the code and refer to their work as software ...the analysis of the code into two different parts: analysis of ... See full document

10

Call Tree Detection Using Source Code Syntax Analysis

Call Tree Detection Using Source Code Syntax Analysis

... of lines of code. When a programmer inspects the code, he has to rely on search tools to analyze the relationship between various tiers of ...used code traversal technique to establish ... See full document

9

Improving the Design of Cohesion and Coupling Metrics for Aspect Oriented Software Development

Improving the Design of Cohesion and Coupling Metrics for Aspect Oriented Software Development

... the analysis of run time metrics is very expensive and very complex in case of performance ...unused code present in software while it is less related to the classes at run ... See full document

8

Another Look At Copyright Protection of Software: Did the 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981)

Another Look At Copyright Protection of Software: Did the 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981)

... In transforming source code to object code, some source code statements may wholly disappear, while some object code statements may have no counterpart in the source c[r] ... See full document

19

Automatic Code Review by Learning the Revision of Source Code

Automatic Code Review by Learning the Revision of Source Code

... (e.g., lines of code added, lines of code deleted, ...detect code snippets of certain ...and source code in a programming language for bug localization ... See full document

8

Windows, Linux, Mac Operating System and Decision Making

Windows, Linux, Mac Operating System and Decision Making

... This paper presents a comparative study of choosing footstep of Windows, Linux and Mac, the three popular operating systems. This paper provides seven factors which needed to be considered before choosing an operating ... See full document

5

A Fisher Rao metric for paracatadioptric images of lines

A Fisher Rao metric for paracatadioptric images of lines

... projected lines in a paracatadioptric image is parameterised using a small number of subsets of the Euclidean plane IR 2 ...of lines in the paracatadioptric image are measured using the Fisher-Rao ... See full document

32

From random lines to metric spaces

From random lines to metric spaces

... The remainder of the paper is restricted to the planar case of d = 2, since the ar- guments now make essential use of point-line duality. Consider the extent to which networks formed by -geodesics fulfil the requirements ... See full document

50

Scalable Source Code Similarity Detection in Large Code Repositories

Scalable Source Code Similarity Detection in Large Code Repositories

... Typically, source code similarity detection tools work by scanning the source code to identify pieces of code that are similar by using different string matching ...the code ... See full document

11

Android Malware Detection through Machine Learning Techniques: A Review

Android Malware Detection through Machine Learning Techniques: A Review

... the analysis of different Android ...the analysis of Android malware involves looking for additional class files because it has become a common phenomenon to easily modify Android apps and add extra class ... See full document

17

Features of Aktogay Sheep of Different Lines

Features of Aktogay Sheep of Different Lines

... new lines. Total number of animal new lines of the semi-coarse-wolled sheep of Aktogay populations at the republic makes over 30 thousand heads and their quantity increases every year, covering all new ... See full document

7

advanced-web-shell-forensic-analysis-pt-1-2.pdf

advanced-web-shell-forensic-analysis-pt-1-2.pdf

... • Advanced source code analysis • Advanced Features?. Hidden Shells Tunneling Mass Mailer DDoS?[r] ... See full document

48

Show all 10000 documents...