Learn More
Recently, there has been renewed interest in the role of tumor stem cells (TSCs) in tumorigenesis, chemoresistance, and relapse of malignant tumors including osteosarcoma. The potential exists to improve osteosarcoma treatment through characterization of TSCs and identification of therapeutic targets. Using transcriptome, proteome, immunophenotyping for(More)
Despite a decade of active research, there has been a marked lack in clone detection techniques that scale to large repositories for detecting near-miss clones. In this paper, we present a token-based clone detector, SourcererCC, that can detect both exact and near-miss clones from large inter-project repositories using a standard workstation. It exploits(More)
Given the availability of large source-code repositories, there has been a large number of applications for large-scale clone detection. Unfortunately, despite a decade of active research, there is a marked lack in clone detectors that scale to big software systems or large repositories, specifically for detecting near-miss (Type 3) clones where significant(More)
Osteocytes are ideally positioned to detect and respond to mechanical and hormonal stimuli and to coordinate the function of osteoblasts and osteoclasts. However, evidence supporting the involvement of osteocytes in specific aspects of skeletal biology has been limited mainly due to the lack of suitable experimental approaches. Few crucial advances in the(More)
Hematopoietic progenitors are regulated in their respective niches by cells of the bone marrow microenvironment. The bone marrow microenvironment is composed of a variety of cell types, and the relative contribution of each of these cells for hematopoietic lineage maintenance has remained largely unclear. Osteocytes, the most abundant yet least understood(More)
Over the past few years, researchers have implemented various algorithms to improve the scalability of clone detection. Most of these algorithms focus on scaling vertically on a single machine, and require complex intermediate data structures (e.g., suffix tree, etc.). However, several new use-cases of clone detection have emerged, which are beyond the(More)
One of the perceived values of open source software is the idea that many eyes can increase code quality and reduce the amount of bugs. This perception, however, has been questioned by some due the lack of supporting evidence. This paper presents an empirical analysis focusing on the relationship between the utilization of open source components and their(More)
In this paper, we present data downloaded from Maven, one of the most popular component repositories. The data includes the binaries of 186,392 components, along with source code for 161,025. We identify and organize these components into groups where each group contains all the versions of a library. In order to asses the quality of these components, we(More)
—Code cloning via copy-and-paste is a common practice in software engineering. Traditionally, this practice has been considered harmful, and a symptom that some important design abstraction is being ignored. As such, many previous studies suggest approaches to facilitate the discovery, removal, and refactoring of clones. However, not many studies exist that(More)