𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On the use of clone detection for identifying crosscutting concern code

✍ Scribed by Bruntink, M.; van Deursen, A.; van Engelen, R.; Tourwe, T.


Book ID
117936702
Publisher
IEEE
Year
2005
Tongue
English
Weight
721 KB
Volume
31
Category
Article
ISSN
0098-5589

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


On the use of ECLIPSE code for optimizin
✍ M. Caldas; J. Santos; V. SemiΓ£o πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 227 KB πŸ‘ 1 views

The sequential code ECLIPSE is used in the present work to perform a technical analysis of two industrial processes-a coke gas cleansing plant and a power plant-aiming their energetic and environmental optimization. The code is validated herein comparing its results against existing experimental dat

Use of a designer triple expression hybr
✍ S Moteki; P S Leung; R L Coppel; E R Dickson; M M Kaplan; S Munoz; M E Gershwin πŸ“‚ Article πŸ“… 1996 πŸ› John Wiley and Sons 🌐 English βš– 276 KB

the 135 control sera from patients with primary scleros-The detection of antimitochondrial autoantibodies ing cholangitis (PSC), chronic autoimmune hepatitis (AMAs) is critical in the diagnosis of primary biliary cir-(CAH), systemic lupus erythematosus (SLE), or healthy rhosis (PBC). However, conven

Development of measures of online privac
✍ Tom Buchanan; Carina Paine; Adam N. Joinson; Ulf-Dietrich Reips πŸ“‚ Article πŸ“… 2006 πŸ› John Wiley and Sons 🌐 English βš– 242 KB πŸ‘ 3 views

## Abstract As the Internet grows in importance, concerns about online privacy have arisen. The authors describe the development and validation of three short Internet‐administered scales measuring privacy‐related attitudes (Privacy Concern) and behaviors (General Caution and Technical Protection).