Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47667 open access dissertations and theses found for:
if(Code clone detection)  »   Refine Search
1.
Towards Accurate and Scalable Clone Detection Using Software Metrics
by Saini, Vaibhav Pratap Singh, Ph.D.  University of California, Irvine. 2018: 225 pages; 10981732.
2.
Managing the copy -and -paste programming practice
by Deshane, Patricia, Ph.D.  Clarkson University. 2010: 136 pages; 3406858.
3.
Scalable detection of software refactoring
by Milea, Narcisa Andreea, Ph.D.  National University of Singapore (Singapore). 2015: 164 pages; 10006062.
4.
Detecting Fine-Grained Similarity in Binaries
by Saebjornsen, Andreas, Ph.D.  University of California, Davis. 2014: 107 pages; 3646391.
5.
Remix and reuse of source code in software production
by Jones, M. Cameron, Ph.D.  University of Illinois at Urbana-Champaign. 2010: 196 pages; 3455917.
6.
Integrating "Code Smells" Detection with Refactoring Tool Support
by Nongpong, Kwankamol, Ph.D.  The University of Wisconsin - Milwaukee. 2012: 153 pages; 3523928.
7.
Forensic Detection for Earnings Management in Selected Code Law Nations of Europe
by Garner, Jeffrey Lee, Ph.D.  Walden University. 2018: 318 pages; 10932861.
8.
Abstract Syntax Tree-Based Code Smell Detection and Refactoring
by Patodiya aka Patoliya, Aditi aka Palak, M.S.  California State University, Long Beach. 2018: 66 pages; 10837962.
9.
Metrics for Aspect Mining Visualization
by Jorgensen, Gisle J., Ph.D.  Nova Southeastern University. 2018: 85 pages; 10842982.
10.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
11.
Finding duplicate code in Java using beacons and idioms
by Morales, Esteban J., M.S.  California State University, Long Beach. 2011: 68 pages; 1507689.
12.
JSmell: A Bad Smell detection tool for Java systems
by Roperia, Naveen, M.S.  California State University, Long Beach. 2009: 77 pages; 1466306.
13.
Temperature-dependent phage resistance in Listeria monocytogenes epidemic clone II strains
by Kim, Jae-Won, Ph.D.  North Carolina State University. 2008: 214 pages; 3345470.
16.
Assessing code decay by detecting software architecture violations
by Bandi, Ajay, Ph.D.  Mississippi State University. 2014: 194 pages; 3665453.
17.
19.
Program inconsistency detection: Universal reachability analysis and conditional slicing
by Tomb, Aaron, Ph.D.  University of California, Santa Cruz. 2011: 182 pages; 3471818.
21.
Mine detection rats: Effects of repeated extinction on detection rates
by Mahoney, Amanda M., Ph.D.  Western Michigan University. 2012: 67 pages; 3531894.
22.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
23.
24.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
26.
Development of Cell-Based Neurotransmitter Fluorescent Reporters (CNiFERs) for in vivo Detection of Somatostatin
by La├žin, Macit Emre, Ph.D.  Icahn School of Medicine at Mount Sinai. 2019: 102 pages; 27545081.
27.
Deterministic Parallelization of Object-Oriented Code Through Out-of-Order Execution
by Jenista, James C., Ph.D.  University of California, Irvine. 2012: 291 pages; 3523925.
28.
Data Transmission Using Image Steganography in Quick Response (QR) Code
by Shah, Sunny K., M.S.  California State University, Long Beach. 2017: 66 pages; 10638623.
29.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
30.
Implementation and evaluation of a double-adjacent error correcting code in an FPGA
by Malley, Brian J., M.S.  California State University, Long Beach. 2016: 80 pages; 10196051.
1 - 30 of 47667 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest