• Login
    Search 
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • School of Computing Graduate Theses
    • Search
    •   Home
    • Scholarly Contributions
    • Computing, School of
    • School of Computing Graduate Theses
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-6 of 6

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • xmlui.Discovery.AbstractSearch.sort_by.dc.date.available_dt_asc
    • xmlui.Discovery.AbstractSearch.sort_by.dc.date.available_dt_desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Business Process Recovery Using UI Design Patterns and Clone Detection in Business Processes 

    Guo, Jin (2008-10-28)
    A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rules to achieve business ...
    Thumbnail

    Towards Web Service Tagging By Similarity Detection 

    Martin, Douglas (2011-10-04)
    The web of the future will require automated tagging of equivalent or similar services in support of service discovery and the selection of appropriate alternatives in case of failure. Code similarity detection tools, or ...
    Thumbnail

    An Approach to Clone Detection in Behavioral Models 

    Antony, Elizabeth (2014-03-04)
    In this thesis, we present an approach for identifying near-miss interaction clones in reverse-engineered UML behavioural models. Our goal is to identify patterns of interaction ("conversations") that can be used to ...
    Thumbnail

    NeCO: Ontology Alignment using Near-miss Clone Detection 

    Geesaman, Paul Louis (2014-01-29)
    The Semantic Web is an endeavour to enhance the web with the ability to represent knowledge. The knowledge is expressed through what are called ontologies. In order to make ontologies useful, it is important to be able to ...
    Thumbnail

    Leveraging Historical Code Changes to Support Clone Management Activities 

    Sourav, Sumit (2015-10-01)
    Code clones are code snippets that come into existence when developers copy paste (and possibly modify) an existing piece of code. Studies show that cloning is an inevitable phenomenon leading to a significant presence of ...
    Thumbnail

    An Empirical Study for the Impact of Maintenance Activities in Clone Evolution 

    Marks, Lionel (2009-11-26)
    Code clones are duplicated code fragments that are copied to re-use functionality and speed up development. However, due to the duplicate nature of code clones, inconsistent updates can lead to bugs in the software system. ...

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    Atmire NV
     

     

    Browse

    All of QSpaceCommunities & CollectionsPublished DatesAuthorsTitlesSubjectsTypesThis CollectionPublished DatesAuthorsTitlesSubjectsTypes

    My Account

    LoginRegister

    Discover

    AuthorAntony, Elizabeth (1)Geesaman, Paul Louis (1)Guo, Jin (1)Marks, Lionel (1)Martin, Douglas (1)Sourav, Sumit (1)Subject
    Clone Detection (6)
    Access Violations (1)Alignment (1)Behavioral Models (1)Business Applications (1)Business Processes (1)Clone Evolution (1)Clone Management (1)Computer Science (1)Near-miss (1)... View MoreDate Published2015 (1)2014 (2)2011 (1)2009 (1)2008 (1)

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us
    Theme by 
    Atmire NV