-
1
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
L. M. Wills, P. Newcomb, and E. J. Chikofsky, editors, IEEE Computer Society Press
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In L. M. Wills, P. Newcomb, and E. J. Chikofsky, editors, Proceedings: Second Working Conference on Reverse Engineering, pages 86-95. IEEE Computer Society Press, 1995.
-
(1995)
Proceedings: Second Working Conference on Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
2
-
-
0032311601
-
Clone detection using abstract syntax trees
-
T. M. Koshgoftaar and K. Bennett, editors, IEEE Computer Society Press
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In T. M. Koshgoftaar and K. Bennett, editors, Proceedings; International Conference on Software Maintenance, pages 368-378. IEEE Computer Society Press, 1998.
-
(1998)
Proceedings; International Conference on Software Maintenance
, pp. 368-378
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
3
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
H. Yang and L. White, editors, IEEE, Sept.
-
S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In H. Yang and L. White, editors, Proceedings ICSM'99 (International Conference on Software Maintenance), pages 109-118. IEEE, Sept. 1999.
-
(1999)
Proceedings ICSM'99 (International Conference on Software Maintenance)
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
4
-
-
0344507637
-
An empirical approach for detecting program similarity within a university programming environment
-
J. A. W. Faidhi and S. K. Robinson. An empirical approach for detecting program similarity within a university programming environment. Computers and Education, 11(1):11-19, 1987.
-
(1987)
Computers and Education
, vol.11
, Issue.1
, pp. 11-19
-
-
Faidhi, J.A.W.1
Robinson, S.K.2
-
5
-
-
0003880013
-
-
Addison Wesley, Reading
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-oriented Software. Addison Wesley, Reading, 1996.
-
(1996)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
6
-
-
84962184978
-
Substring matching for clone detection and change tracking
-
H. A. Muller and M. Georges, editors, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, IEEE Computer Society Press
-
J. H. Johnson. Substring matching for clone detection and change tracking. In H. A. Muller and M. Georges, editors, International Conference on Software Maintenance: proceedings, September 19-23, 1994, Victoria, British Columbia, Canada, pages 120-126, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, 1994. IEEE Computer Society Press.
-
(1994)
International Conference on Software Maintenance: Proceedings, September 19-23, 1994, Victoria, British Columbia, Canada
, pp. 120-126
-
-
Johnson, J.H.1
-
7
-
-
0034997163
-
Maintenance support tools for java programs: CCFinder and JAAT
-
Los Alamitos, California, May12-19 IEEE Computer Society
-
T. Kamiya, F. Ohata, K. Kondou, S. Kusumoto, and K. Inoue. Maintenance support tools for java programs: CCFinder and JAAT. In Proceedings of the 23rd International Conference on Software Engeneering (ICSE-01), pages 837-838, Los Alamitos, California, May12-19 2001. IEEE Computer Society.
-
(2001)
Proceedings of the 23rd International Conference on Software Engeneering (ICSE-01)
, pp. 837-838
-
-
Kamiya, T.1
Ohata, F.2
Kondou, K.3
Kusumoto, S.4
Inoue, K.5
-
8
-
-
23044528486
-
Tool demonstration: Finding duplicated code using program dependences
-
R. Komondoor and S. Horwitz. Tool demonstration: Finding duplicated code using program dependences. Lecture Notes in Computer Science, 2028:383-??, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2028
, pp. 383
-
-
Komondoor, R.1
Horwitz, S.2
-
9
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
Stuttgart, Germany, October
-
J. Krinke. Identifying similar code with program dependence graphs. In Proc. Eight Working Conference On Reverse Engineering (WCRE 2001), pages 301-309, Stuttgart, Germany, October 2001.
-
(2001)
Proc. Eight Working Conference on Reverse Engineering (WCRE 2001)
, pp. 301-309
-
-
Krinke, J.1
-
10
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
IEEE Computer Society Press
-
B. Laguë, D. Proulx, E. M. Merlo, J. Mayrand, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In Proceedings: 1997 International Conference on Software Maintenance, pages 314-321. IEEE Computer Society Press, 1997.
-
(1997)
Proceedings: 1997 International Conference on Software Maintenance
, pp. 314-321
-
-
Laguë, B.1
Proulx, D.2
Merlo, E.M.3
Mayrand, J.4
Hudepohl, J.5
-
11
-
-
84876625882
-
-
PhD thesis, Dep. de Eng. Informática, Instituto Superior Técnico, Universidade Técnica de Lisboa, October
-
A. M. Leitão. Reengenharia de Programas. PhD thesis, Dep. de Eng. Informática, Instituto Superior Técnico, Universidade Técnica de Lisboa, October 2001.
-
(2001)
Reengenharia de Programas
-
-
Leitão, A.M.1
-
12
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
Washington, Nov. 4-8 IEEE Computer Society Press
-
J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proceedings of the International Conference on Software Maintenance, pages 244-254, Washington, Nov. 4-8 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the International Conference on Software Maintenance
, pp. 244-254
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
13
-
-
84976799118
-
An algorithmic approach to the detection and prevention of plagiarism
-
K. Ottenstein. An algorithmic approach to the detection and prevention of plagiarism. ACM SIGSCE Bulletin, 8(4):30-41, 1976.
-
(1976)
ACM SIGSCE Bulletin
, vol.8
, Issue.4
, pp. 30-41
-
-
Ottenstein, K.1
-
14
-
-
4243812570
-
-
Department of Computer Science, SUNY at Buffalo, Buffalo, NY
-
S. C. Shapiro and The SNePS Implementation Group. SNePS 2.3 User's Manual. Department of Computer Science, SUNY at Buffalo, Buffalo, NY, 1995.
-
(1995)
SNePS 2.3 User's Manual
-
-
Shapiro, S.C.1
-
16
-
-
84944335300
-
-
33, Centrum voor Wiskunde en Informatica (CWI), Dec. 31 SEN-R9807
-
A. van Deursen. The leap year problem. In 33, page 7. Centrum voor Wiskunde en Informatica (CWI), ISSN 1386-369X, Dec. 31 1998. SEN-R9807.
-
(1998)
The Leap Year Problem
, pp. 7
-
-
Van Deursen, A.1
-
17
-
-
26844517162
-
Plagiarism à la mode: A comparison of automated systems for detecting suspected plagiarism
-
K. L. Verco and M. J. Wise. Plagiarism à la mode: a comparison of automated systems for detecting suspected plagiarism. The Computer Journal, 39(9):741-750, 1996.
-
(1996)
The Computer Journal
, vol.39
, Issue.9
, pp. 741-750
-
-
Verco, K.L.1
Wise, M.J.2
-
18
-
-
3142651177
-
Using an integrated toolset for program understanding
-
November
-
M. Whitney, K. Kontogiannis, J. H. Johnson, M. Bernstein, B. Corrie, E. Merlo, J. G. McDaniel, R. D. Mori, H. A. Müller, J. Mylopoulos, M. Stanley, S. R. Tilley,, and K. Wong. Using an integrated toolset for program understanding. In Proceedings of the CASCON '95, pages 262-274, November 1995.
-
(1995)
Proceedings of the CASCON '95
, pp. 262-274
-
-
Whitney, M.1
Kontogiannis, K.2
Johnson, J.H.3
Bernstein, M.4
Corrie, B.5
Merlo, E.6
McDaniel, J.G.7
Mori, R.D.8
Müller, H.A.9
Mylopoulos, J.10
Stanley, M.11
Tilley, S.R.12
Wong, K.13
|