Retrieving Similar Code Fragments based on Identifier Similarity for ...
Recommend Documents
recently designed to create and browse ontology modules and fragments [19]. .... property record is also created: i-property(name=R, domain=C, range=D').
As XML has become a standard for data representa- tion, it can be found in plenty of information technolo- gies. A possible optimization of XML-based ...
with a post (that we call as the first post, whose title is the thread title .... Hence, we can simply add ... comparsion of iphone with android and symbian ); we would.
Keywords: search, source code, reuse, pagerank, ranking, functional dependen- ... The structure of code is not conducive to being read in a sequential style.
information via JavaScript error messages, have been discovered and fixed in the past. ..... because we think the header
to select the best one from a list that can contain many irrel-. evant components ..... from using 'man -k' to search for commands with keywords. extracted from Q1.
Dec 13, 2018 - Introduction. The largest ..... Film (Art)âPolitics and government (Biography). 1,902,138 ... front_en.pdf (accessed on 15 September 2018). 3.
comms.scitech.susx.ac.uk/fft/crypto/ECC_SC.pdf. [9] W. Chou and Laerence, âElliptic curve cryptography and its applications to mobile device,â Project Report, ...
We call that two images have resolution mismatch if they only differ in size. ..... of IEEE Int'l Conf. on Multimedia Computing and. Systems, Boston, 1994.
large-scale code clone detection, finding usage examples, detecting software ... galore of code snippets on the Internet, e.g. from Stackoverflow, are incomplete code ... our large-scale code search framework to empirical software engineering ...
Preprocessing. Document. Preprocessing. Cited .... SALTON-G-1993-P-HYPERTEXT- 0.369 ..... Duron XP 1010 MHz processor and 512MB main memory under ...
documents [18], automatically building directories for documents [19], etc. From this ... As mentioned previously, the Thomson-ISI Company developed a fully ...
(clear sky and clouds) and scattered light from surrounding areas, which may be .... shortcuts limit the applicability of the radiosity method to remote sensing ...
The application of insect-sensing organs as parts of advanced biosensor devices with an electronic reading of the signals produced by the biological component ...
Mar 6, 2013 - The uncontrol- lable length distribution of overlapping DNA sequence in SLIC ... annealing during the incubation (data not shown). After the assembly of all ... of the primers. In order to determine the optimal overhang lengths, 5 bp, .
Feb 13, 2012 - m/n to be our figure of merit and derive upper bounds on the query ratio by ... We show that our recursive and algebraic construction results in query ratios ..... Since x1 takes values in {â1,0,1} and since the first term on the rig
May 24, 2011 - RUTIH protected the spleen less than BCG. Following a 9 month vaccination-challenge interval, protection was observed for the lungs, but not ...
We have tested our method using IRMA 2009 dataset a with 14,400 x-ray images as part ... searching of 2-D electrophoresis gels, and pathology slidesâ (Wang ...
pound word, as in the case of English âNew York,â âget off,â and âtwo hundred dollars,â ... This improved precision by at least 8% for every basic method. A.
the the popular file sharing application Kazaa. Our results show that the proposed model and parameter fitting proce- dure are very effective in matching the ...
of the user. In this work, binary switch sensors are used to detect a person s walking sequence. .... [15] covered the floor of an interactive space with hexagonal.
these measures utilize background samples to facilitate better recogni- ... Shot); “
are these two examples well separated from the background sample set?”.
1 Department of Computer Science and Technology, Tsinghua University, ... Secondly, job posting usually comprises of two fields, i.e. title and description.
Retrieving Similar Code Fragments based on Identifier Similarity for ...
Jul 20, 2008 - large-scale software systems, such as Linux and JDK(Java. Development Kit), often ... (linux-2.6.6/arch/sparc64/prom/memory.c). 111 for(iter=0; ...
Retrieving Similar Code Fragments based on Identifier Similarity for Defect Detection Norihiro Yoshida, Takashi Ishio, Makoto Matsushita, Katsuro Inoue Graduate School of Information Science and Technorogy, Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka, 560-8531, Japan