메뉴 건너뛰기




Volumn 20, Issue 6, 2008, Pages 435-461

A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system

Author keywords

Code clone; Metrics; Object oriented; Refactoring; Software maintenance

Indexed keywords

CLONING; COMPUTER SOFTWARE; COMPUTER SOFTWARE MAINTENANCE; MAINTENANCE; OBJECT ORIENTED PROGRAMMING;

EID: 56849129297     PISSN: 1532060X     EISSN: 15320618     Source Type: Journal    
DOI: 10.1002/smr.394     Document Type: Article
Times cited : (83)

References (29)
  • 1
    • 0347856275 scopus 로고    scopus 로고
    • Standard, for Software Maintenance
    • IEEE
    • IEEE. Standard, for Software Maintenance. IEEE Standard 1219, 1998.
    • (1998) IEEE Standard , vol.1219
  • 4
    • 0013238532 scopus 로고    scopus 로고
    • Parameterized duplication in strings: Algorithms and an application to software maintenance
    • Baker BS. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM Journal on Computing 1997; 26(5):1343-1362.
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1343-1362
    • Baker, B.S.1
  • 6
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • Kamiya T, Kusumoto S, Inoue K. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering 2002; 28(7):654-670.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 12
    • 34347383992 scopus 로고    scopus 로고
    • Method and implementation for investigating code clones in a software system
    • Higo Y, Kamiya T, Kusumoto S, Inoue K. Method and implementation for investigating code clones in a software system. Information and Software Technology 2007; 49(9-10):985-998.
    • (2007) Information and Software Technology , vol.49 , Issue.9-10 , pp. 985-998
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 13
    • 56849126449 scopus 로고    scopus 로고
    • Ant. Available at: http://ant.apache.org/ [5 August 2008].
    • Ant. Available at: http://ant.apache.org/ [5 August 2008].
  • 14
    • 56849109455 scopus 로고    scopus 로고
    • Available at:, 5 August 2008
    • JUnit. Available at: http://www.junit.org/ [5 August 2008].
    • JUnit
  • 16
    • 56849122805 scopus 로고    scopus 로고
    • XML-Based Variant Configuration Language, Technology for Reuse. Available at:, 5 August 2008
    • XML-Based Variant Configuration Language - Technology for Reuse. Available at: http://xvcl.comp.nus.edu.sg/ [5 August 2008].
  • 24
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding copy-paste and related bugs in large-scale software code
    • Li. Z, Lu S, Myagmar S, Zhou Y. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering 2006; 32(3):176-192.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 27
    • 33746353080 scopus 로고    scopus 로고
    • Three public enemies: Cut, copy, and paste
    • Mann ZA. Three public enemies: Cut, copy, and paste. IEEE Computer 2006; 39(7):31-35.
    • (2006) IEEE Computer , vol.39 , Issue.7 , pp. 31-35
    • Mann, Z.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.