Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shantou University(Natural Science Edition)》 2007-01
Add to Favorite Get Latest Update

Research on Detection Technology of Parameterized Duplicated Code Based on Procedure Blueprint

LI Jian-zhong 1,LIU Jian-bin 2,YU Chu-ying 3(1.Department of Mathematics and Information Technology,Hanshan Normal College,Chaozhou 521041,Guangdong,China;2.Department of Computer Science and Engineering,Beijing Information Science and Technology University,Beijing 100101,China;3.Department of Physics,Shantou University,Shantou 515063,Guangdong,China)  
In order to reduce the space complexity of the algorithm and avoid the complex process transforming the source code to p-suffix tree,procedure blueprint was introduced so that the method was improved.And more effective technology was presented for the localization of automatic refactoring.
【Fund】: 广东省自然科学基金资助项目(No:032027);; 韩山师范学院扶持科研资助项目(No:FC200506)
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 WANG Wei,SU Xiao-hong,MA Pei-jun,WANG Tian-tian ( School of Computer Science and Technology,Harbin Institute of Technology,150001 Harbin,China);Detection of identifier renaming inconsistency[J];Journal of Harbin Institute of Technology;2011-01
【Co-citations】
Chinese Journal Full-text Database 8 Hits
1 FAN Bo,LIU Jian-bin(School of Computer Science,Beijing Information Science and Technology University,Beijing 100192,China);Java program model reversion based on JavaCC[J];Journal of Beijing Information Science & Technology University;2010-02
2 YI Chang-an(Computer Department,Zengcheng College of South China Normal University,Guangzhou 511363,China);The Current Research Based on Duplicated Code[J];Computer Knowledge and Technology;2009-22
3 LI Jian-zhong1,LIU Jian-bin2(1.College of Mathematics and Information Technology,Hanshan Normal University,Chaozhou 521041,China;2.Department of Computer Science and Engineering,Beijing Information Science and Technology University,Beijing 100101,China);A Research on A Tool for Automatic Detection of Duplicated Code[J];Journal of Hanshan Teachers College;2006-06
4 LIU Jian-Bin 1,3 LI Jian-Zhong 2,3 YU Chu-Ying4 YANG Lin-Bang3 (Dept.of Computer Science and Engineering,Beijing Information Science and Techology University,Beijing100101)1 (Institute of Mathematics and Infrmation Technology,Hanshan Normal College,Chaozhou 521041)2 (Department of Computer Science,Engineering Institute,Shantou University,Shantou 515063)3 (Department of Physics,Shantou University,Shantou Guangdong 515063)4;A Software Cyclomatic Complexity Metrics Method Based on Procedure Blueprint[J];Computer Science;2006-06
5 LIU Jian-Bin YANG Lin-Bang (Dept. of Computer Science and Engineering, Beijing Information Science and Technology University, Beijing 100101) (Department of Computer Science, ShanTou University, ShanTou 515063);Refactoring Operations Based on Procedure Blueprint[J];Computer Science;2007-01
6 LIU Jian-bin,ZHENG Min(Department of Computer Science,Shantou University,Shantou 515063,Guangdong,China);Program Slicing Method of Data Flow Equations Based on Abstract Implementation Structure Diagram[J];Journal of Shantou University(Natural Science Edition);2006-03
7 LIN Zhe1,2,LIU Jian-bin1(1.Department of Computer Science,Shantou University,Shantou 515063,Guangdong,China;2.Department of Computer Science,Shantou Polytechnic,Shantou 515078,Guangdong,China);Visual Object-Oriented Program Modeling System[J];Journal of Shantou University(Natural Science Edition);2008-01
8 Ma Zirui1,Li Shengqi2,Song Lijuan1(1.School of Mathematics and Computer Science,Ningxia University,Yinchuan 750021,China;2.Management school of Ningbo Institute of Technology,Zhejiang University,Ningbo 315010,China);Research on Transfer Method from Java Program to Class Diagram and AISD[J];;2009-01
【Co-references】
Chinese Journal Full-text Database 6 Hits
1 YANG Zhao-hong~(1,2) GONG Yun-zhan~2 XIAO Qing~(1,2) WANG Ya-wen~2 (1.Department of Information Engineering of the Academy of Armored Force Engineering,Beijing 100072,China; 2.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A Defect Model Based Testing System[J];Journal of Beijing University of Posts and Telecommunications;2008-05
2 GUAN En-zheng, ZHOU Chun-guang, WANG Zhe, XU Xiu-juan(College of Computer Science & Technology,Jilin University, Changchun 130012,China);Frequent Sequential Pattern Mining Algorithm[J];Journal of Changchun Post and Telecommunication Institute;2005-03
3 LI Tian-rui~(1), PAN Wu-ming~(2), YANG Ning~(1), XU Yang~(1) (1. Department of Mathematics, Southwest Jiaotong University, Chengdu 610031, China; 2. Software Engineering College, Sichuan University, Chengdu 610065, China);Study on Properties of Sequential Patterns[J];Journal of Fudan University;2004-05
4 LI Jian-zhong1,LIU Jian-bin2(1.College of Mathematics and Information Technology,Hanshan Normal University,Chaozhou 521041,China;2.Department of Computer Science and Engineering,Beijing Information Science and Technology University,Beijing 100101,China);A Research on A Tool for Automatic Detection of Duplicated Code[J];Journal of Hanshan Teachers College;2006-06
5 SHA Jin1,DENG Cheng-yu2,ZHANG Cui-xiao1,LIU Wei-feng1(1.Department of Computer Science and Technology,Shijiazhuang Railway Institute,Shijiazhuang 050043,China;2.College of Communication Engineering,Yanshan University,Qinhuangdao 066004,China);Closed sequential pattern mining algorithm[J];Computer Engineering and Design;2006-03
6 XIA Ming-bo~1,WANG Xiao-chuan~1,SUN Yong-qiang~2,JIN Shi-yao~1 (1.National Key Lab.for Parallel and Distributed Processing, College of Computer,National University of Defense Technology,Changsha 410073,China;2.College of Computer,National University of Defense Technology,Changsha 410073,China);Research on Sequential Pattern Mining Algorithms[J];Computer Technology and Development;2006-04
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 WANG Wei,SU Xiao-hong,MA Pei-jun,WANG Tian-tian ( School of Computer Science and Technology,Harbin Institute of Technology,150001 Harbin,China);Detection of identifier renaming inconsistency[J];Journal of Harbin Institute of Technology;2011-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved