Auswahl der wissenschaftlichen Literatur zum Thema „Clone search“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Clone search" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Clone search"
Hammad, Muhammad, Onder Babur, Hamid Abdul Basit und Mark Van Den Brand. „Clone-Seeker: Effective Code Clone Search Using Annotations“. IEEE Access 10 (2022): 11696–713. http://dx.doi.org/10.1109/access.2022.3145686.
Der volle Inhalt der QuelleFarhadi, Mohammad Reza, Benjamin C. M. Fung, Yin Bun Fung, Philippe Charland, Stere Preda und Mourad Debbabi. „Scalable code clone search for malware analysis“. Digital Investigation 15 (Dezember 2015): 46–60. http://dx.doi.org/10.1016/j.diin.2015.06.001.
Der volle Inhalt der QuelleZHANG, YU, XUMING CHEN, LIHUA WU, ZIQIANG LUO und XIAOJIE LIU. „MHC-INSPIRED ANTIBODY CLONE ALGORITHM“. International Journal of Computational Methods 07, Nr. 02 (Juni 2010): 299–318. http://dx.doi.org/10.1142/s0219876210002179.
Der volle Inhalt der QuelleZhang, Yu, Li Hua Wu und Zi Qiang Luo. „Catastrophe-Based Antibody Clone Algorithm“. Applied Mechanics and Materials 121-126 (Oktober 2011): 4415–20. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.4415.
Der volle Inhalt der QuelleKeivanloo, Iman, Chanchal K. Roy und Juergen Rilling. „SeByte: Scalable clone and similarity search for bytecode“. Science of Computer Programming 95 (Dezember 2014): 426–44. http://dx.doi.org/10.1016/j.scico.2013.10.006.
Der volle Inhalt der QuelleTan, Yan Song. „An Improved Immune Clone Algorithm Logistics Delivery Strategy“. Journal of Advanced Computational Intelligence and Intelligent Informatics 23, Nr. 2 (20.03.2019): 309–12. http://dx.doi.org/10.20965/jaciii.2019.p0309.
Der volle Inhalt der QuellePark, Jin-woo, Mu-Woong Lee, Jong-Won Roh, Seung-won Hwang und Sunghun Kim. „Surfacing code in the dark: an instant clone search approach“. Knowledge and Information Systems 41, Nr. 3 (03.08.2013): 727–59. http://dx.doi.org/10.1007/s10115-013-0677-z.
Der volle Inhalt der QuelleNishi, Manziba Akanda, und Kostadin Damevski. „Scalable code clone detection and search based on adaptive prefix filtering“. Journal of Systems and Software 137 (März 2018): 130–42. http://dx.doi.org/10.1016/j.jss.2017.11.039.
Der volle Inhalt der QuelleRagkhitwetsagul, Chaiyong, und Jens Krinke. „Siamese: scalable and incremental code clone search via multiple code representations“. Empirical Software Engineering 24, Nr. 4 (05.03.2019): 2236–84. http://dx.doi.org/10.1007/s10664-019-09697-7.
Der volle Inhalt der QuelleEL-MATBOULI, M., und H. SOLIMAN. „Construction and screening of a cDNA library from the triactinomyxon spores ofMyxobolus cerebralis, the causative agent of salmonid Whirling Diseases“. Parasitology 132, Nr. 4 (03.01.2006): 467–77. http://dx.doi.org/10.1017/s0031182005009522.
Der volle Inhalt der QuelleDissertationen zum Thema "Clone search"
Ragkhitwetsagul, Chaiyong. „Code similarity and clone search in large-scale source code data“. Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10057538/.
Der volle Inhalt der QuelleSimões, Manuel Areias Sobrinho. „In search of the original leukemic clone in chronic myeloid leukemia patients in complete molecular remission after stem cell transplantation or imatinib“. Doctoral thesis, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/56734.
Der volle Inhalt der QuelleSimões, Manuel Areias Sobrinho. „In search of the original leukemic clone in chronic myeloid leukemia patients in complete molecular remission after stem cell transplantation or imatinib“. Tese, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/56734.
Der volle Inhalt der QuelleSaffer, R. A., und J. Liebert. „Search for Close Binary Evolved Stars“. Steward Observatory, The University of Arizona (Tucson, Arizona), 1988. http://hdl.handle.net/10150/623897.
Der volle Inhalt der QuelleBenoit, Tristan. „Cartographie des programmes et de leurs interrelations“. Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0320.
Der volle Inhalt der QuelleIn the field of software engineering, ensuring the quality and security of software is complex. This context is due to a set of factors, notably the increasing use of libraries and the use of practices such as copying codes from online services. The usual solution to this problem is the application of formal methods for program validation before their release. However, this approach requires a precise specification and a high degree of expertise. This thesis introduces new reverse engineering methods to automatically collect information about a program toolchain provenance and identify program clones within large data repositories. Our first contribution is the innovative neural network model Site Neural Network (SNN), which predicts the compilation toolchain used to produce an entire program. SNN offers excellent speed as well as good accuracy. Its modularity due to the use of hierarchies of classifiers allows for easy consideration of additional toolchains. Our second contribution is the Program Spectral Similarity (PSS), a tool that provides a quick and efficient way to detect program clones, even when their target hardware architecture differs or in the case of obfuscation. Unlike binary function-based methods or graph edit distance methods, which are time-consuming and low resilient, PSS relies on the spectral analysis of graphs to measure the similarity between programs. This thesis thus contributes to cyber security by providing tools to identify malware clones quickly. In addition, it supports computer forensics by providing relevant information on the compilation chain. This work paves the way for new neural networks for programs, as well as the development of spectral graph analysis methods for studying binary code similarity
Cowperthwaite, P. S., E. Berger, M. Soares-Santos, J. Annis, D. Brout, D. A. Brown, E. Buckley-Geer et al. „A DECAM SEARCH FOR AN OPTICAL COUNTERPART TO THE LIGO GRAVITATIONAL-WAVE EVENT GW151226“. IOP PUBLISHING LTD, 2016. http://hdl.handle.net/10150/621399.
Der volle Inhalt der QuelleSoares-Santos, M., R. Kessler, E. Berger, J. Annis, D. Brout, E. Buckley-Geer, H. Chen et al. „A DARK ENERGY CAMERA SEARCH FOR AN OPTICAL COUNTERPART TO THE FIRST ADVANCED LIGO GRAVITATIONAL WAVE EVENT GW150914“. IOP PUBLISHING LTD, 2016. http://hdl.handle.net/10150/621228.
Der volle Inhalt der QuelleAlsahafy, Maram Saad M. „Efficient Algorithms for Speeding Up Graph Data Analytics“. Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/26166.
Der volle Inhalt der QuelleHolland, David Charles. „The behaviour of resin bonded rock bolts and other anchorages subjected to close proximity blasting“. Thesis, University of Aberdeen, 1993. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU603184.
Der volle Inhalt der QuelleStock, Stephan Amir [Verfasser], und Sabine [Akademischer Betreuer] Reffert. „Analysis of High-Precision Spectroscopic Data in Search of Exoplanet Signals Close to the Stellar Noise Limit / Stephan Amir Stock ; Betreuer: Sabine Reffert“. Heidelberg : Universitätsbibliothek Heidelberg, 2021. http://d-nb.info/123415210X/34.
Der volle Inhalt der QuelleBücher zum Thema "Clone search"
Thibodeau, Beverly Anne. The search for relationships between respiration and growth in hybrid Populus clones. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1993.
Den vollen Inhalt der Quelle findenLong, David. Pirates magnified: See history up close on this search-and-find adventure. New York, NY: Wide Eyed Editions, 2017.
Den vollen Inhalt der Quelle findenFernandes, Sujatha. Close to the edge: In search of the global hip hop generation. London: Verso, 2011.
Den vollen Inhalt der Quelle findenBolen, Jean Shinoda. Close to the bone: Life-threatening illness and the search for meaning. New York: Scribner, 1996.
Den vollen Inhalt der Quelle findenStankiewicz, W. J. In search of a political philosophy: Ideologies at the close of the twentieth century. London: Routledge, 1993.
Den vollen Inhalt der Quelle findenWaern, Annika, und Anders Sundnes Løvlie. Hybrid Museum Experiences. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2022. http://dx.doi.org/10.5117/9789463726443.
Der volle Inhalt der QuelleBolen, Jean Shinoda. Close to the Bone: Life Threatening Illness and the Search for Meaning. Scribner, 1998.
Den vollen Inhalt der Quelle findenClose to the Bone: Life-Threatening Illness and the Search for Meaning. Audio Literature, 1998.
Den vollen Inhalt der Quelle findenManasse, Mark S. On the Efficient Determination of Most near Neighbors: Horseshoes, Hand Grenades, Web Search and Other Situations When Close Is Close Enough. Morgan & Claypool Publishers, 2012.
Den vollen Inhalt der Quelle findenStankiewicz, W. J. In Search of a Political Philosophy: Ideologies at the Close of the Twentieth Century. Taylor & Francis Group, 2002.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Clone search"
Keivanloo, Iman, und Juergen Rilling. „Source Code Clone Search“. In Code Clone Analysis, 121–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1927-4_9.
Der volle Inhalt der QuelleRagkhitwetsagul, Chaiyong, Matheus Paixao, Manal Adham, Saheed Busari, Jens Krinke und John H. Drake. „Searching for Configurations in Clone Evaluation – A Replication Study“. In Search Based Software Engineering, 250–56. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47106-8_20.
Der volle Inhalt der QuelleMartens, Koen, Hugh D. Loxdale und Isa Schön. „The Elusive Clone – In Search of Its True Nature and Identity“. In Lost Sex, 187–200. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2770-2_9.
Der volle Inhalt der QuelleMazeh, Tsevi, David W. Latham, Robert P. Stefanik, Guillermo Torres und Eti Wasserman. „A Radial-Velocity Search for Brown Dwarfs and the Low-Mass Companion of HD114762“. In Active Close Binaries, 267–76. Dordrecht: Springer Netherlands, 1990. http://dx.doi.org/10.1007/978-94-009-0679-2_22.
Der volle Inhalt der QuelleConsoli, Sergio, Domenico Perrotta und Marco Turchi. „Reduced Variable Neighbourhood Search for the Generation of Controlled Circular Data“. In Variable Neighborhood Search, 83–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69625-2_7.
Der volle Inhalt der QuelleSun, Gao-Ji. „Knowledge-Guided Neighborhood Search Algorithm for Close-Open Vehicle Routing Problem“. In Uncertainty and Operations Research, 157–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5720-0_18.
Der volle Inhalt der QuelleMkrtichian, D., S. L. Kim, A. V. Kusakin, E. Rovithis-Livaniou, P. Rovithis, P. Lampens, P. van Cauteren et al. „A Search for Pulsating, Mass-Accreting Components in Algol-Type Eclipsing Binaries“. In Close Binaries in the 21st Century: New Opportunities and Challenges, 167–69. Dordrecht: Springer Netherlands, 2006. http://dx.doi.org/10.1007/978-1-4020-5027-5_41.
Der volle Inhalt der QuelleLantican, Gaudencia A. „Field Screening of Gamma-Irradiated Cavendish Bananas“. In Efficient Screening Techniques to Identify Mutants with TR4 Resistance in Banana, 97–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64915-2_7.
Der volle Inhalt der QuelleAbío, Ignasi, Morgan Deters, Robert Nieuwenhuis und Peter J. Stuckey. „Reducing Chaos in SAT-Like Search: Finding Solutions Close to a Given One“. In Theory and Applications of Satisfiability Testing - SAT 2011, 273–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21581-0_22.
Der volle Inhalt der QuelleAnkali, Sanjay B., und Latha Parthiban. „Development of Porting Analyzer to Search Cross-Language Code Clones Using Levenshtein Distance“. In Smart Computing Techniques and Applications, 623–32. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0878-0_60.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Clone search"
Lee, Mu-Woong, Jong-Won Roh, Seung-won Hwang und Sunghun Kim. „Instant code clone search“. In the eighteenth ACM SIGSOFT international symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1882291.1882317.
Der volle Inhalt der QuelleBalachandran, Vipin. „Reducing accidental clones using instant clone search in automatic code review“. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2020. http://dx.doi.org/10.1109/icsme46990.2020.00089.
Der volle Inhalt der QuelleSchwarz, Niko. „Hot clones: Combining search-driven development, clone management, and code provenance“. In 2012 34th International Conference on Software Engineering (ICSE 2012). IEEE, 2012. http://dx.doi.org/10.1109/icse.2012.6227221.
Der volle Inhalt der QuelleSchwarz, Niko. „Hot Clones: A Shotgun Marriage of Search-Driven Development and Clone Management“. In 2012 16th European Conference on Software Maintenance and Reengineering (CSMR). IEEE, 2012. http://dx.doi.org/10.1109/csmr.2012.67.
Der volle Inhalt der QuelleBenoit, Tristan, Jean-Yves Marion und Sébastien Bardin. „Scalable Program Clone Search through Spectral Analysis“. In ESEC/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3611643.3616279.
Der volle Inhalt der QuelleKeivanloo, Iman, Christopher Forbes und Juergen Rilling. „Similarity search plug-in: Clone detection meets internet-scale code search“. In 2012 4th International Workshop on Search-driven Development: Users, Infrastructure, Tools, and Evaluation (SUITE). IEEE, 2012. http://dx.doi.org/10.1109/suite.2012.6225474.
Der volle Inhalt der QuelleKeivanloo, Iman. „Leveraging clone detection for Internet-scale source code search“. In 2012 IEEE 20th International Conference on Program Comprehension (ICPC). IEEE, 2012. http://dx.doi.org/10.1109/icpc.2012.6240504.
Der volle Inhalt der QuelleIshio, Takashi, Yusuke Sakaguchi, Kaoru Ito und Katsuro Inoue. „Source File Set Search for Clone-and-Own Reuse Analysis“. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, 2017. http://dx.doi.org/10.1109/msr.2017.19.
Der volle Inhalt der QuelleKeivanloo, Iman, Juergen Rilling und Philippe Charland. „Internet-scale Real-time Code Clone Search Via Multi-level Indexing“. In 2011 18th Working Conference on Reverse Engineering (WCRE). IEEE, 2011. http://dx.doi.org/10.1109/wcre.2011.13.
Der volle Inhalt der QuelleKeivanloo, Iman, Juergen Rilling und Philippe Charland. „SeClone - A Hybrid Approach to Internet-Scale Real-Time Code Clone Search“. In 2011 IEEE 19th International Conference on Program Comprehension (ICPC). IEEE, 2011. http://dx.doi.org/10.1109/icpc.2011.29.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Clone search"
Riles, J. K. A search for close-mass lepton doublet. Office of Scientific and Technical Information (OSTI), April 1989. http://dx.doi.org/10.2172/6140588.
Der volle Inhalt der QuelleRiles, John Keith. A Search for a Close-Mass Lepton Doublet. Office of Scientific and Technical Information (OSTI), Juni 2018. http://dx.doi.org/10.2172/1454047.
Der volle Inhalt der QuelleSteffenson, B. J., I. Mayrose, Gary J. Muehlbauer und A. Sharon. ing and comparative sequence analysis of powdery mildew and leaf rust resistance gene complements in wild barley. Israel: United States-Israel Binational Agricultural Research and Development Fund, 2021. http://dx.doi.org/10.32747/2021.8134173.bard.
Der volle Inhalt der QuelleGranot, David, Richard Amasino und Avner Silber. Mutual effects of hexose phosphorylation enzymes and phosphorous on plant development. United States Department of Agriculture, Januar 2006. http://dx.doi.org/10.32747/2006.7587223.bard.
Der volle Inhalt der QuelleFlabbi, Luca, und Mauricio Tejada. Gender Gaps in Education and Labor Market Outcomes in the United States: The Impact of Employers` Prejudice. Inter-American Development Bank, Dezember 2012. http://dx.doi.org/10.18235/0011443.
Der volle Inhalt der QuellePrusky, Dov, Noel Keen und John Browse. Modulation of the synthesis of the main preformed antifungal compound as abasis for the prevention of postharvest disease of C. gloeosporioides in avocado fruits. United States Department of Agriculture, Dezember 2001. http://dx.doi.org/10.32747/2001.7575273.bard.
Der volle Inhalt der QuelleAdam, Zach, und Eran Pichersky. Degradation of Abnormal Proteins in Chloroplasts of Higher Plants. United States Department of Agriculture, August 1994. http://dx.doi.org/10.32747/1994.7568768.bard.
Der volle Inhalt der QuelleGranot, David, und Richard Amasino. Regulation of Senescence by Sugar Metabolism. United States Department of Agriculture, Januar 2003. http://dx.doi.org/10.32747/2003.7585189.bard.
Der volle Inhalt der QuelleRafaeli, Ada, Russell Jurenka und Daniel Segal. Isolation, Purification and Sequence Determination of Pheromonotropic-Receptors. United States Department of Agriculture, Juli 2003. http://dx.doi.org/10.32747/2003.7695850.bard.
Der volle Inhalt der QuelleMichaels, Trevor. Red-tailed boa (Boa constrictor) surveys at Salt River Bay National Park, St. Croix U.S. Virgin Islands: 2023 report of activities. National Park Service, 2024. http://dx.doi.org/10.36967/2303799.
Der volle Inhalt der Quelle