-
2
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In Working Conference on Reverse Engineering (WCRE), pages 86-95, 1995.
-
(1995)
Working Conference on Reverse Engineering (WCRE)
, pp. 86-95
-
-
Baker, B.S.1
-
3
-
-
0013238532
-
Parameterized duplication in strings: Algorithms and an application to software maintenance
-
B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM Journal on Computing (SICOMP), 26(5):1343-1362, 1997.
-
(1997)
SIAM Journal on Computing (SICOMP)
, vol.26
, Issue.5
, pp. 1343-1362
-
-
Baker, B.S.1
-
5
-
-
32344438117
-
Detecting higher-level similarity patterns in programs
-
H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE, pages 156-165, 2005.
-
(2005)
ESEC/FSE
, pp. 156-165
-
-
Basit, H.A.1
Jarzabek, S.2
-
6
-
-
4544229973
-
DMS®: Program transformations for practical scalable software evolution
-
I. D. Baxter, C. Pidgeon, and M. Mehlich. DMS®: Program transformations for practical scalable software evolution. In ICSE, pages 625-634, 2004.
-
(2004)
ICSE
, pp. 625-634
-
-
Baxter, I.D.1
Pidgeon, C.2
Mehlich, M.3
-
7
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
9
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni. Locality-sensitive hashing scheme based on p-stable distributions. In Symposium on Computational Geometry (SoCG), pages 253-262, 2004.
-
(2004)
Symposium on Computational Geometry (SoCG)
, pp. 253-262
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
12
-
-
0023385308
-
The program dependence graph and its use in optimization
-
July
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren. The program dependence graph and its use in optimization. Transactions on Programming Languages and Systems (TOPLAS), 9(3):319-349, July 1987.
-
(1987)
Transactions on Programming Languages and Systems (TOPLAS)
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
13
-
-
0036036098
-
-
C. Flanagan, K. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, andR. Stata. Extended static checking for Java. In Conference on Programming Language Design and Implementation (PLDI), pages 234-245, 2002.
-
C. Flanagan, K. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, andR. Stata. Extended static checking for Java. In Conference on Programming Language Design and Implementation (PLDI), pages 234-245, 2002.
-
-
-
-
14
-
-
0036041563
-
Lazy abstraction
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Lazy abstraction. In Symposium on Principles of Programming Languages (POPL), pages 58-70, 2002.
-
(2002)
Symposium on Principles of Programming Languages (POPL)
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
15
-
-
0037586554
-
XVCL: XML-based variant configuration language
-
S. Jarzabek, P. Bassett, H. Zhang, and W. Zhang. XVCL: XML-based variant configuration language. In ICSE, pages 810-811, 2003.
-
(2003)
ICSE
, pp. 810-811
-
-
Jarzabek, S.1
Bassett, P.2
Zhang, H.3
Zhang, W.4
-
16
-
-
77954517211
-
Eliminating redundancies with a "composition with adaptation" meta-programming technique
-
S. Jarzabek and S. Li. Eliminating redundancies with a "composition with adaptation" meta-programming technique. In ESEC/FSE, pages 237-246, 2003.
-
(2003)
ESEC/FSE
, pp. 237-246
-
-
Jarzabek, S.1
Li, S.2
-
17
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
18
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
20
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, and D. Notkin. An empirical study of code clone genealogies. In ESEC/FSE, pages 187-196, 2005.
-
(2005)
ESEC/FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
-
22
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In Symposium on Operating Systems Design and Implementation (OSDI), pages 161-176, 2006.
-
(2006)
Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 161-176
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
24
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Laguë, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314-321, 1997.
-
(1997)
ICSM
, pp. 314-321
-
-
Laguë, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.P.5
-
25
-
-
84910009447
-
CP-Miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In Symposium on Operating Systems Design and Implementation (OSDI), pages 289-302, 2004.
-
(2004)
Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
26
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, pages 306-315, 2005.
-
(2005)
ESEC/FSE
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
28
-
-
34548787258
-
Using server pages to unify clones in web applications: A trade-off analysis
-
D. C. Rajapakse and S. Jarzabek. Using server pages to unify clones in web applications: A trade-off analysis. In ICSE, pages 116-126, 2007.
-
(2007)
ICSE
, pp. 116-126
-
-
Rajapakse, D.C.1
Jarzabek, S.2
-
29
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In International Workshop on Source Code Analysis and Manipulation, pages 128-135, 2004.
-
(2004)
International Workshop on Source Code Analysis and Manipulation
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
von Gudenberg, J.W.3
Fischer, G.4
-
31
-
-
0038011045
-
Using redundancies to find errors
-
Y. Xie and D. R. Engler. Using redundancies to find errors. In FSE, pages 51-60, 2002.
-
(2002)
FSE
, pp. 51-60
-
-
Xie, Y.1
Engler, D.R.2
|