Диссертация (1149623), страница 20
Текст из файла (страница 20)
Computational Geometry — An Introduction / F.P. Preparata,M.I. Shamos. Springer, 1985. — 390 p.117. Damerau-Levenshtein (DL) edit distance algorithm for Python in Cython forhighperformance[Electronicresource].—URL: https://github.com/gfairchild/pyxDamerauLevenshtein (online; accessed 2018-01-20).118. Python DiffLib module [Electronic resource]. — URL: https://docs.python.org/3/library/difflib.html (online; accessed 2018-01-20).119. [PyLevenshtein] Python-Levenshtein library: The Levenshtein Python C extension module contains functions for fast computation of Levenshtein distance andstring similarity [Electronic resource]. — URL: https://github.com/ztane/pythonLevenshtein/ (online; accessed: 2018-01-20).120.
PyQt Python v2 and v3 bindings for The Qt Company's Qt application framework[Electronicresource].—URL: https://riverbankcomputing.com/software/pyqt/intro (online; accessed 2018-01-20).121. Rago, A. Identifying duplicate functionality in textual use cases by aligning semantic actions / A. Rago, C. Marcos, J.A. Diaz-Pace // Software & Systems Modeling. — 2016.
— 15 (2). — P. 579–603.114122. Ramaswamy, L. Automatic Detection of Fragments in Dynamically GeneratedWeb Pages / L. Ramaswamy, A. Iyengar, L. Liu, F. Douglis // Proceedings of the13th International Conference on World Wide Web. — 2004. — P. 443–454.123. Ratcliff, J.W. Pattern Matching: The Gestalt Approach / J.W. Ratcliff, D.E. Metzener // Dr. Dobb's Journal. — 1988. — 13 (7). — P.
46–72.124. Rattan, D. Software clone detection: A systematic review / D. Rattan, R. Bhatia,M. Singh // Information and Software Technology. — 2013. — 55 (7). —P. 1165–1199.125. Rodrigues, I.P. Usability Evaluation of Domain-Specific Languages: A Systematic Literature Review / I.P. Rodrigues, M. de Borba Campos, A.F. Zorzo // Proceedings of Human-Computer Interaction. User Interface Design, Developmentand Multimodality. — 2017.
— P. 522–534.126. Romanovsky, K. Refactoring the Documentation of Software Product Lines /K. Romanovsky, D. Koznov, L. Minchin // Lecture Notes in Computer Science. — 2011. — Vol. 4980. — P. 158–170.127. Royce, W.W. Management the development of large software systems /W.W. Royce // Proceedings of the 9th international conference on Software Engineering. — 1987. — P. 328–338.128.
Shi, L. An empirical study on evolution of API documentation / L. Shi,H. Zhong, T. Xie, M. Li // Lecture Notes in Computer Science. — 2011. —Vol. 6603. — P. 416–431.129. Shieber, S.M. Evidence against the context freeness of natural language /S.M. Shieber // Linguistics and Philosophy.
— 2012. — 8 (3). — P. 333–343.130. Simian — Similarity Analyser [Electronic resource]. — URL: http://www.harukizaemon.com/simian/index.html(online;accessed:2018-01-20).131. Singh, J. Understanding Data Deduplication [Electronic resource] / J. Singh. —2009. — URL: https://www.druva.com/blog/understanding-data-deduplication/(online; accessed 2018-01-20).115132. Smyth, W. Computing Patterns in Strings / W. Smyth. — Addison-Wesley,2003. — 423 p.133. Sommerville, I. Software documentation, Report [Electronic resource] / I.
Sommerville. Lancaster University, UK, 2001. — URL: http://www.literateprogramming.com/documentation.pdf (online; accessed: 2018-01-20).134. Šošić, M. Edlib: a C/C ++ library for fast, exact sequence alignment using editdistance / M. Šošić, M. Šikić // Bioinformatics. — 2017. — 33 (9). —P. 1394–1395.135.
Sajnani, H. SourcererCC: Scaling Code Clone Detection to Big-code /H. Sajnani, V. Saini, J. Svajlenko et al. // Proceedings of the 38th InternationalConference on Software Engineering. — 2016. — P. 1157–1168.136. Špakov, O. Visualization of eye gaze data using heat maps / O. Špakov,D. Miniotas // Electronics and Electrical Engineering. — 2007. — 2 (74). —P. 55–58.137.
Pennington, J. Glove: Global vectors for word representation / J. Pennington,R. Socher, C. Manning // Proceedings of the 2014 conference on empirical methods in natural language processing. — 2014. — P. 1532–1543.138. Steyvers, M. Probabilistic Topic Models / M. Steyvers, T. Griffiths // Handbookof latent semantic analysis. — 2007. — 427 (7). — P. 424–440.139.
Subramanian, S. Live API documentation / S. Subramanian, L. Inozemtseva, R.Holmes // Proceedings of the 36th International Conference on Software Engineering. — 2014. — P. 643–652.140. Petrov, S. Announcing syntaxnet: The world’s most accurate parser goes opensource [Electronic resource] / S. Petrov // Google Research Blog. — 2016. —URL:https://research.googleblog.com/2016/05/announcing-syntaxnet-worlds-most.html (online; accessed: 2018-01-20).141.
Thomas, B. Documentation for software engineers: what is needed to aid systemunderstanding? / B. Thomas, S. Tilley // Proceedings of the 19th annual international conference on Computer documentation. — 2001. — P. 235–236.116142. Vallés, E.
Detection of Near-duplicate User Generated Contents: The SMS SpamCollection / E. Vallés, C. Rosso // Proceedings of the 3rd International WorkshoponSearchandMiningUser-generatedContents.—2011.—P. 27–34.143. Wagner, R.A. An Extension of the String-to-String Correction Problem /R.A. Wagner, R. Lowrance // Journal of the ACM. — 1975. — 22 (2). —P. 177–183.144. Wagner, R.A. The String-to-String Correction Problem / R.A. Wagner,M.J. Fischer // Journal of the ACM. — 1974.
— 21 (1). — P. 168–173.145. Wagner, S. Analyzing Text in Software Projects / S. Wagner, D. Méndez Fernández // The Art and Science of Analyzing Software Data. — Elsevier, 2015. —P. 39–72.146. Wang, P. Local Similarity Search for Unstructured Text / P. Wang, C. Xiao,J. Qin, W.
Wang, X. Zhang, Y. Ishikawa // Proceedings of International Conference on Management of Data. — 2016. — P. 1991–2005.147. Walsh, N. DocBook 5: The Definitive Guide / N. Walsh. O'Reilly Media, 2010.— 552 p.148. Weiss, E.H. How To Write Usable User Documentation / E. H. Weiss. 2nd edition, Phoenix: Oryx Press, 1991. — 267 p.149. Williams, K. Near Duplicate Detection in an Academic Digital Library / K. Williams, C.L. Giles // Proceedings of the ACM Symposium on Document Engineering.
— 2013. — P. 91–94.150. Wingkvist, A. Analysis and visualization of information quality of technicaldocumentation / A. Wingkvist, W. Löwe, M. Ericsson, R. Lincke // Proceedingsof the 4th European Conference on Information Management and Evaluation. —2010. — P. 388–396.151. Zhang, Q. Efficient Partial-duplicate Detection Based on Sequence Matching /Qi Zhang, Yu Zhang, H. Yu, Xu.
Huang // Proceedings of the 33rd InternationalACM SIGIR Conference on Research and Development in Information Retrieval.— 2010. — P. 675–682.117152. ZendFramework3Documentation[Electronicresource].—URL: https://framework.zend.com/learn (online; accessed: 2018-01-20).153. Zhi, J. Cost, benefits and quality of software development documentation:A systematic mapping / J.
Zhi, V. Garousi-Yusifoğlu, B. Sun, G. Garousi,S. Shahnewaz, G. Ruhe // Journal of Systems and Software. — 2015. —Vol. 99 — P. 175–198.118Приложение. Пример группы неточных повторовВ данном приложении представлен пример группы повторов, найденной пообразцу в интерактивном режиме. В качестве образца для поиска был взят одиниз повторов группы, выделенный на тепловой карте и карте повторов в документации СУБД PostgreSQL.Образец представлен на листинге A.1:To alter the owner, you must also be a direct or indirect member of the new owningrole, and that role must have CREATE privilege on the table's schema. (These restrictions enforce that altering the owner doesn't do anything you couldn't do by dropping and recreating the table. However, a superuser can alter ownership of any tableanyway.)Листинг А.1. Образец описания прав, необходимыхдля смены владельца таблицы СУБД PostgreSQLПоиск по данному образцу выдал 13 вхождений.
Эти вхождения и результатыих коррекции представлены в табл. А.1.Табл. А.1. Неточные повторы, найденные по образцу№ НайденоTo alter the owner, you must also be adirect or indirect member of the newowning role, and that role must haveCREATE privilege on the table'sschema. (These restrictions enforce1 that altering the owner doesn't do anything you couldn't do by dropping andrecreating the table. However, asuperuser can alter ownership of anytable anyway.)ОтредактированоTo alter the owner, you must also be adirect or indirect member of the newowning role, and that role must haveCREATE privilege on the table'sschema.
(These restrictions enforcethat altering the owner doesn't do anything you couldn't do by dropping andrecreating the table. However, asuperuser can alter ownership of anytable anyway.)119№ НайденоTo alter the owner, you must also be adirect or indirect member of the newowning role, and that role must haveCREATE privilege on the sequence'sschema. (These restrictions enforce2 that altering the owner doesn't do anything you couldn't do by dropping andrecreating the sequence. However, asuperuser can alter ownership of anysequence anyway.)ОтредактированоTo alter the owner, you must also be adirect or indirect member of the newowning role, and that role must haveCREATE privilege on the sequence'sschema.















