메뉴 건너뛰기




Volumn , Issue , 2007, Pages 96-105

DECKARD: Scalable and accurate tree-based detection of code clones

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; NUMERICAL METHODS; TREES (MATHEMATICS); VECTORS;

EID: 34548767669     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2007.30     Document Type: Conference Paper
Times cited : (942)

References (24)
  • 1
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • B. S. Baker. On finding duplication and near-duplication in large software systems. In WCRE, pages 86-95, 1995.
    • (1995) WCRE , pp. 86-95
    • Baker, B.S.1
  • 2
    • 0013238532 scopus 로고    scopus 로고
    • Parameterized duplication in strings: Algorithms and an application to software maintenance
    • B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SICOMP, 26(5): 1343-1362, 1997.
    • (1997) SICOMP , vol.26 , Issue.5 , pp. 1343-1362
    • Baker, B.S.1
  • 3
    • 32344438117 scopus 로고    scopus 로고
    • Detecting higher-level similarity patterns in programs
    • H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE, pages 156-165, 2005.
    • (2005) ESEC/FSE , pp. 156-165
    • Basit, H.A.1    Jarzabek, S.2
  • 4
    • 4544229973 scopus 로고    scopus 로고
    • DMS®: Program transformations for practical scalable software evolution
    • I. D. Baxter, C. Pidgeon, and M. Mehlich. DMS®: Program transformations for practical scalable software evolution. In ICSE, pages 625-634, 2004.
    • (2004) ICSE , pp. 625-634
    • Baxter, I.D.1    Pidgeon, C.2    Mehlich, M.3
  • 6
    • 0036041421 scopus 로고    scopus 로고
    • An empirical study of operating system errors
    • A. Chou, J. Yang, B. Chelf, S. Hallem, and D. R. Engler. An empirical study of operating system errors. In SOSP, pages 73-88, 2001.
    • (2001) SOSP , pp. 73-88
    • Chou, A.1    Yang, J.2    Chelf, B.3    Hallem, S.4    Engler, D.R.5
  • 7
    • 4544259509 scopus 로고    scopus 로고
    • Locality-sensitive hashing scheme based on p-stable distributions
    • M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In SoCG, pages 253-262, 2004.
    • (2004) SoCG , pp. 253-262
    • Datar, M.1    Immorlica, N.2    Indyk, P.3    Mirrokni, V.S.4
  • 8
    • 0023385308 scopus 로고
    • The program dependence graph and its use in optimization
    • J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. TOPLAS, 9(3):319-349, 1987.
    • (1987) TOPLAS , vol.9 , Issue.3 , pp. 319-349
    • Ferrante, J.1    Ottenstein, K.J.2    Warren, J.D.3
  • 9
    • 15044355327 scopus 로고    scopus 로고
    • Similarity search in high dimensions via hashing
    • A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In VLDB, pages 518-529, 1999.
    • (1999) VLDB , pp. 518-529
    • Gionis, A.1    Indyk, P.2    Motwani, R.3
  • 10
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
    • (2002) TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 11
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • M. Kim, V. Sazawal, and D. Notkin. An empirical study of code clone genealogies. In ESEC/FSE, pages 187-196, 2005.
    • (2005) ESEC/FSE , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3
  • 13
    • 0033717004 scopus 로고    scopus 로고
    • Semantics-preserving procedure extraction
    • R. Komondoor and S. Horwitz. Semantics-preserving procedure extraction. In POPL, pages 155-169, 2000.
    • (2000) POPL , pp. 155-169
    • Komondoor, R.1    Horwitz, S.2
  • 14
    • 84890052317 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40-56, 2001.
    • (2001) SAS , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 16
    • 0031371549 scopus 로고    scopus 로고
    • Assessing the benefits of incorporating function clone detection in a development process
    • B. Laguë, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314-321, 1997.
    • (1997) ICSM , pp. 314-321
    • Laguë, B.1    Proulx, D.2    Mayrand, J.3    Merlo, E.4    Hudepohl, J.P.5
  • 17
    • 84910009447 scopus 로고    scopus 로고
    • CP-Miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, pages 289-302, 2004.
    • (2004) OSDI , pp. 289-302
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 18
    • 32344452883 scopus 로고    scopus 로고
    • PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
    • Z. Li and Y Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, pages 306-315, 2005.
    • (2005) ESEC/FSE , pp. 306-315
    • Li, Z.1    Zhou, Y.2
  • 19
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, pages 244-254, 1996.
    • (1996) ICSM , pp. 244-254
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 20
    • 1142267351 scopus 로고    scopus 로고
    • Winnowing: Local algorithms for document fingerprinting
    • S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: local algorithms for document fingerprinting. In SIGMOD, pages 76-85, 2003.
    • (2003) SIGMOD , pp. 76-85
    • Schleimer, S.1    Wilkerson, D.S.2    Aiken, A.3
  • 21
    • 14344258876 scopus 로고    scopus 로고
    • Clone detection in source code by frequent itemset techniques
    • V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In SCAM, pages 128-135, 2004.
    • (2004) SCAM , pp. 128-135
    • Wahler, V.1    Seipel, D.2    von Gudenberg, J.W.3    Fischer, G.4
  • 22
    • 0021457061 scopus 로고
    • Program slicing
    • M. Weiser. Program slicing. TSE, 10(4):352-357, 1984.
    • (1984) TSE , vol.10 , Issue.4 , pp. 352-357
    • Weiser, M.1
  • 23
    • 29844449569 scopus 로고    scopus 로고
    • Similarity evaluation on tree-structured data
    • R. Yang, P. Kalnis, and A. K. H. Tung. Similarity evaluation on tree-structured data. In SIGMOD, pages 754-765, 2005.
    • (2005) SIGMOD , pp. 754-765
    • Yang, R.1    Kalnis, P.2    Tung, A.K.H.3
  • 24
    • 0024889169 scopus 로고
    • Simple fast algorithms for the editing distance between trees and related problems
    • K. Zhang and D. Shasha. Simple fast algorithms for the editing distance between trees and related problems. SICOMP, 18(6):1245-1262, 1989.
    • (1989) SICOMP , vol.18 , Issue.6 , pp. 1245-1262
    • Zhang, K.1    Shasha, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.