-
1
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In WCRE, pages 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.S.1
-
2
-
-
0013238532
-
Parameterized duplication in strings: Algorithms and an application to software maintenance
-
B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SICOMP, 26(5): 1343-1362, 1997.
-
(1997)
SICOMP
, vol.26
, Issue.5
, pp. 1343-1362
-
-
Baker, B.S.1
-
3
-
-
32344438117
-
Detecting higher-level similarity patterns in programs
-
H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE, pages 156-165, 2005.
-
(2005)
ESEC/FSE
, pp. 156-165
-
-
Basit, H.A.1
Jarzabek, S.2
-
4
-
-
4544229973
-
DMS®: Program transformations for practical scalable software evolution
-
I. D. Baxter, C. Pidgeon, and M. Mehlich. DMS®: Program transformations for practical scalable software evolution. In ICSE, pages 625-634, 2004.
-
(2004)
ICSE
, pp. 625-634
-
-
Baxter, I.D.1
Pidgeon, C.2
Mehlich, M.3
-
5
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
6
-
-
0036041421
-
An empirical study of operating system errors
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. R. Engler. An empirical study of operating system errors. In SOSP, pages 73-88, 2001.
-
(2001)
SOSP
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.R.5
-
7
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In SoCG, pages 253-262, 2004.
-
(2004)
SoCG
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
8
-
-
0023385308
-
The program dependence graph and its use in optimization
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. TOPLAS, 9(3):319-349, 1987.
-
(1987)
TOPLAS
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
9
-
-
15044355327
-
Similarity search in high dimensions via hashing
-
A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In VLDB, pages 518-529, 1999.
-
(1999)
VLDB
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
10
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
11
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, and D. Notkin. An empirical study of code clone genealogies. In ESEC/FSE, pages 187-196, 2005.
-
(2005)
ESEC/FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
-
13
-
-
0033717004
-
Semantics-preserving procedure extraction
-
R. Komondoor and S. Horwitz. Semantics-preserving procedure extraction. In POPL, pages 155-169, 2000.
-
(2000)
POPL
, pp. 155-169
-
-
Komondoor, R.1
Horwitz, S.2
-
14
-
-
84890052317
-
Using slicing to identify duplication in source code
-
R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40-56, 2001.
-
(2001)
SAS
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
15
-
-
0030166953
-
Pattern matching for clone and concept detection
-
K. Kontogiannis, R. de Mori, E. Merlo, M. Galler, and M. Bernstein. Pattern matching for clone and concept detection. Automated Soft. Eng., 3(1/2):77-108, 1996.
-
(1996)
Automated Soft. Eng
, vol.3
, Issue.1-2
, pp. 77-108
-
-
Kontogiannis, K.1
de Mori, R.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
16
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Laguë, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314-321, 1997.
-
(1997)
ICSM
, pp. 314-321
-
-
Laguë, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.P.5
-
17
-
-
84910009447
-
CP-Miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, pages 289-302, 2004.
-
(2004)
OSDI
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
18
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, pages 306-315, 2005.
-
(2005)
ESEC/FSE
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
19
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, pages 244-254, 1996.
-
(1996)
ICSM
, pp. 244-254
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
20
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: local algorithms for document fingerprinting. In SIGMOD, pages 76-85, 2003.
-
(2003)
SIGMOD
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
21
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In SCAM, pages 128-135, 2004.
-
(2004)
SCAM
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
von Gudenberg, J.W.3
Fischer, G.4
-
22
-
-
0021457061
-
Program slicing
-
M. Weiser. Program slicing. TSE, 10(4):352-357, 1984.
-
(1984)
TSE
, vol.10
, Issue.4
, pp. 352-357
-
-
Weiser, M.1
-
23
-
-
29844449569
-
Similarity evaluation on tree-structured data
-
R. Yang, P. Kalnis, and A. K. H. Tung. Similarity evaluation on tree-structured data. In SIGMOD, pages 754-765, 2005.
-
(2005)
SIGMOD
, pp. 754-765
-
-
Yang, R.1
Kalnis, P.2
Tung, A.K.H.3
-
24
-
-
0024889169
-
Simple fast algorithms for the editing distance between trees and related problems
-
K. Zhang and D. Shasha. Simple fast algorithms for the editing distance between trees and related problems. SICOMP, 18(6):1245-1262, 1989.
-
(1989)
SICOMP
, vol.18
, Issue.6
, pp. 1245-1262
-
-
Zhang, K.1
Shasha, D.2
|