نتایج جستجو برای: clone
تعداد نتایج: 38483 فیلتر نتایج به سال:
Code duplication, or cloning, is a common programming practice that can lead to serious maintenance issues if not properly managed. The solution to managing clones has traditionally focused on clone detection and subsequent removal. Unfortunately, detecting clones is a difficult problem where even the state of the art (e.g., CCFinder [16]) achieves precision and recall of only 72% [6]. In pract...
Researchers have proposed various automated clone detection tools that can assist programmers in finding code clones (i.e., duplicated sections of code). Such tools can serve as input into the process of clone removal through refactoring activities. In this paper, we consider the scenario in which an automated clone detection tool was used to find code clones as part of the clone refactoring pr...
Responses to photon irradiation of xenografted human colon tumors derived from the heterogeneous DLD-1 line or its derivative A and D subpopulations were determined using excision assay and tumor regrowth delay assays. Differential responses among the three xenografted carcinomas were demonstrated. Clone A tumors treated with up to 17.5 Gy showed no actual regression below pretreatment volume. ...
bacteria play an important role in the initiation and progression of diseases (not only in disease but affect health status of individual). populations of digestive microflora in chicken gut change with age and also affected by diet, stressors, and performance enhancers as well as in disease conditions. the aim of the pre-sent study was to know bacterial makeup in chicken gut, using denaturing ...
CLONEPICKER is a software pipeline that integrates sequence data with BAC clone fingerprints to dynamically select a minimal overlapping clone set covering the whole genome. In the Rat Genome Sequencing Project (RGSP), a hybrid strategy of "clone by clone" and "whole genome shotgun" approaches was used to maximize the merits of both approaches. Like the "clone by clone" method, one key challeng...
Two similar code segments, or clones, form a clone pair within a software system. The changes to the clones over time create a clone evolution history. In this work, we study late propagation, a specific pattern of clone evolution. In late propagation, one clone in a clone pair is modified, causing the clone pair to diverge. The code segments are then reconciled in a later commit. Existing work...
On December 5th, a graying man in the audience of a seminar about cloning stood up and announced that he was starting to organize a clinic to clone human beings. Richard Seed, a Chicago-based entrepreneur, was not a familiar face to the crowd of geneticists, fertility experts and bioethicists. But, following the news last year about Dolly the cloned lamb, his audacious plan couldn’t simply be l...
Objective: The key research objectives of this study are: (1.) To compare and contrast the trend towards tree, token, text, metric, graph-based code clone detection techniques; (2.) distribution metric-based techniques on various online repositories; (3.) make a statistical analysis hybrid available for detection. overall objective is to investigate trends approaches. Methods: Various repositor...
Human cancer stem-like cells (CSCs)/cancer-initiating cells (CICs) can be isolated as side population (SP) cells, aldehyde dehydrogenase high (ALDHhigh) cells or cell surface marker-positive cells including CD44+ cells and CD133+ cells. CSCs/CICs and non-CSCs/CICs are unstable in in vitro culture, and CSCs/CICs can differentiate into non-CSCs/CICs and some non-CSCs/CICs can dedifferentiate into...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید