Zobrazeno 1 - 10
of 231
pro vyhledávání: '"Duplicate code"'
Autor:
Florian Rabe, Navid Roux
Publikováno v:
Electronic Proceedings in Theoretical Computer Science. 337:88-103
Type theories can be formalized using the intrinsically (hard) or the extrinsically (soft) typed style. In large libraries of type theoretical features, often both styles are present, which can lead to code duplication and integration issues. We defi
Autor:
Alisa O. Osadchaya, Ilia V. Isaev
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 20, Iss 5, Pp 714-721 (2020)
Subject of Research. The paper presents research of existing approaches and methods for the search of clones in the program code. As a result of the study, a method is developed that implements a semantic approach for the search of duplicated fragmen
Publikováno v:
ACM Transactions on Software Engineering and Methodology. 29:1-49
Generic programming is a key paradigm for developing reusable software components. The inherent support for generic constructs is therefore important in programming languages. As for C++, the generic construct, templates, has been supported since the
Publikováno v:
MPLR
Code duplication is a major opportunity to enable optimizations in subsequent compiler phases. However, duplicating code prematurely or too liberally can result in tremendous code size increases. Thus, modern compilers use trade-offs between estimate
Publikováno v:
SBES
Bad smells have been defined to describe potential problems in code, possibly pointing out refactoring opportunities. Several empirical studies have highlighted that smells have a negative impact on comprehension and maintainability. Consequently, se
Autor:
Khaled Ismaeel, Eduard Paul Enoiu, Andrey Sadovykh, Dragos Truscan, Alexandr Naumchev, Cristina Seceleanu
Publikováno v:
RE Workshops
2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)
2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)
This position paper presents and illustrates the concept of security requirements as code – a novel approach to security requirements specification. The aspiration to minimize code duplication and maximize its reuse has always been driving the evol
Publikováno v:
Electronics
Volume 10
Issue 15
Electronics, Vol 10, Iss 1835, p 1835 (2021)
Volume 10
Issue 15
Electronics, Vol 10, Iss 1835, p 1835 (2021)
Very Long Instruction Word, or VLIW, architectures have received much attention in specific-purpose applications such as scientific computation, digital signal processing, and even safety-critical systems. Several compilation techniques for VLIW arch
Publikováno v:
ICDCS
Nowadays, large numbers of small IoT stream queries are created from diverse IoT applications and executed on cloud backend servers. However, existing distributed stream processing systems such as Storm and Flink do not efficiently handle the large n
Publikováno v:
ICSE
Machine Learning (ML), including Deep Learning (DL), systems, i.e., those with ML capabilities, are pervasive in today's data-driven society. Such systems are complex; they are comprised of ML models and many subsystems that support learning processe
Publikováno v:
WAIN@ICSE
WAIN'21-1st Workshop on AI Engineering – Software Engineering for AI. Virtual, Madrid, Spain
WAIN'21-1st Workshop on AI Engineering – Software Engineering for AI
WAIN'21-1st Workshop on AI Engineering – Software Engineering for AI. Virtual, Madrid, Spain
WAIN'21-1st Workshop on AI Engineering – Software Engineering for AI
Artificial Intelligence (AI) and Machine Learning (ML) are pervasive in the current computer science landscape. Yet, there still exists a lack of software engineering experience and best practices in this field. One such best practice, static code an