The Java Code Clone Detection API (JCCD) allows to implement individual code clone detectors. These code clone detectors can be easily integrated into other Java applications. JCCD is based on a pipeline architecture which allows to replace whole par
Features
- Flexible: Adapt your own code clone detectors.
- Extensible: Re-implement parts of the JCCD pipeline to realize your own ideas and concepts.
- Adjustable: Adjust each phase of the detection pipeline by your own settings.
- Accurate: Define precise how a code clone looks like depending on your needs and your notion.
- Fast: JCCD compete with other state-of-the-art code clone detectors. Due to the pipeline model, code clone detectors implemented with JCCD can easily exploit parallel processing on a multi-core computer.
License
BSD LicenseFollow JCCD
You Might Also Like
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Rate This Project
Login To Rate This Project
User Reviews
-
The shroud of the dark side has fallen. Begun, the Clone War has!