Sciweavers

AAAI
2010
13 years 10 months ago
Cloning in Elections
We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each candidate c by one or more clones, i.e., new candidates that...
Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko
ORDER
2006
105views more  ORDER 2006»
14 years 11 days ago
Descending Chains and Antichains of the Unary, Linear, and Monotone Subfunction Relations
The C-subfunction relations on the set of functions on a finite base set A defined by function classes C are examined. For certain clones C on A, it is determined whether the part...
Erkko Lehtonen
JALC
2006
81views more  JALC 2006»
14 years 12 days ago
A Monoidal Interval of Clones of Selfdual Functions
Let A be a 2p-element set, p prime, and let be a fixed point-free permutation on A of order p. We study the interval of clones C on A such that C consists of functions that are s...
Andrei A. Krokhin, Ivo G. Rosenberg
BMCBI
2007
129views more  BMCBI 2007»
14 years 17 days ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...
DAGSTUHL
2006
14 years 1 months ago
Managing Known Clones: Issues and Open Questions
Many software systems contained cloned code, i.e., segments of code that are highly similar to each other, typically because one has been copied from the other, and then possibly m...
Kostas Kontogiannis
CASCON
2004
129views Education» more  CASCON 2004»
14 years 1 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
ACMSE
2006
ACM
14 years 2 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
FASE
2006
Springer
14 years 4 months ago
Relation of Code Clones and Change Couplings
Abstract. Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution. It is broadly assumed that the ...
Reto Geiger, Beat Fluri, Harald Gall, Martin Pinzg...
SAS
2001
Springer
14 years 4 months ago
Using Slicing to Identify Duplication in Source Code
Programs often have a lot of duplicated code, which makes both understanding and maintenance more difficult. This problem can be alleviated by detecting duplicated code, extracting...
Raghavan Komondoor, Susan Horwitz
MSR
2010
ACM
14 years 5 months ago
Clones: What is that smell?
—Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance dif...
Foyzur Rahman, Christian Bird, Premkumar T. Devanb...