<--- Back to Details
First PageDocument Content
Software development / Mutation / Duplicate code / Source code / Extreme programming / Gene duplication / Code refactoring / Clone / Source lines of code / Software metrics / Computer programming / Biology
Software development
Mutation
Duplicate code
Source code
Extreme programming
Gene duplication
Code refactoring
Clone
Source lines of code
Software metrics
Computer programming
Biology

Archeology of Code Duplication : Recovering Duplication Chains From Small Duplication Fragments Richard Wettel

Add to Reading List

Source URL: www.inf.usi.ch

Download Document from Source Website

File Size: 173,62 KB

Share Document on Facebook

Similar Documents

AVOCA GmbH  Extreme Programming Considered Harmful for Reliable Software Development  Status:

AVOCA GmbH Extreme Programming Considered Harmful for Reliable Software Development Status:

DocID: 1t4jS - View Document

Decoupling Extreme Programming from Moores Ike Antkare International Institute of Technology United Slates of Earth

Decoupling Extreme Programming from Moores Ike Antkare International Institute of Technology United Slates of Earth

DocID: 1sDK4 - View Document

A Simple Model of Agile Software Processes – or – Extreme Programming Annealed Glenn Vanderburg 2240 Dampton Dr. Plano, TX 75025

A Simple Model of Agile Software Processes – or – Extreme Programming Annealed Glenn Vanderburg 2240 Dampton Dr. Plano, TX 75025

DocID: 1saAc - View Document

QA to AQ Part Three Shifting from Quality Assurance to Agile Quality “Tearing Down the Walls” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

QA to AQ Part Three Shifting from Quality Assurance to Agile Quality “Tearing Down the Walls” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

DocID: 1raaP - View Document

EFMD Global Focus_Iss.2 Vol.10 www.globalfocusmagazine.com Agile universities Borrowing from concepts first used in the software

EFMD Global Focus_Iss.2 Vol.10 www.globalfocusmagazine.com Agile universities Borrowing from concepts first used in the software

DocID: 1r2YA - View Document