Sciweavers

799 search results - page 6 / 160
» Visualization of clone detection results
Sort
View
SIGSOFT
2010
ACM
13 years 6 months ago
Instant code clone search
In this paper, we propose a scalable instant code clone search engine for large-scale software repositories. While there are commercial code search engines available, they treat s...
Mu-Woong Lee, Jong-Won Roh, Seung-won Hwang, Sungh...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
PERVASIVE
2009
Springer
14 years 3 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
TOG
2008
111views more  TOG 2008»
13 years 8 months ago
Clone attack! Perception of crowd variety
When simulating large crowds, it is inevitable that the models and motions of many virtual characters will be cloned. However, the perceptual impact of this trade-off has never be...
Rachel McDonnell, Michéal Larkin, Simon Dob...
BIBE
2007
IEEE
154views Bioinformatics» more  BIBE 2007»
14 years 3 months ago
A Compartmentalized Approach to the Assembly of Physical Maps
We propose a novel compartmentalized method for the assembly of physical maps from fingerprinted clones. Our assembler exploits the presence of genetic markers at the global leve...
Serdar Bozdag, Timothy J. Close, Stefano Lonardi