메뉴 건너뛰기




Volumn , Issue , 2008, Pages 321-330

Scalable detection of semantic clones

Author keywords

Clone detection; Program dependence graph; Refactoring; Software maintenance

Indexed keywords

CLONE DETECTION; CODE CLONES; CODE FRAGMENTS; EQUIVALENT CONTROLS; GAIN INSIGHTS; GRAPH SIMILARITIES; LINUX KERNELS; OPEN SOURCE PROJECTS; PROGRAM DEPENDENCE GRAPH; PROGRAM DESIGNS; PROGRAM FRAGMENTS; REDUNDANT CODES; REFACTORING; SCALABLE ANALYSIS; SCALABLE APPROACHES; SEMANTIC INFORMATIONS; SOFTWARE MAINTENANCE; SUB-GRAPHS; CODE CLONE; EQUIVALENT CONTROL; GAIN INSIGHT; GRAPH SIMILARITY; LINUX KERNEL; PROGRAM DESIGN; REAL CODE; SCALABLE APPROACH; SEMANTIC INFORMATION; SUBGRAPHS;

EID: 57349194546     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368088.1368132     Document Type: Conference Paper
Times cited : (273)

References (21)
  • 2
    • 32344438117 scopus 로고    scopus 로고
    • Detecting higher-level similarity patterns in programs
    • H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE, 2005.
    • (2005) ESEC/FSE
    • Basit, H.A.1    Jarzabek, S.2
  • 4
    • 34548228440 scopus 로고    scopus 로고
    • Comparison and evaluation of clone detection tools
    • Member-Rainer Koschke and Member-Giulio Antoniol and Member-Jens Krinke and Member-Ettore Merlo
    • S. Bellon. Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng., 33(9), 2007. Member-Rainer Koschke and Member-Giulio Antoniol and Member-Jens Krinke and Member-Ettore Merlo.
    • (2007) IEEE Trans. Softw. Eng , vol.33 , Issue.9
    • Bellon, S.1
  • 7
    • 15044355327 scopus 로고    scopus 로고
    • Similarity search in high dimensions via hashing
    • A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In VLDB, 1999.
    • (1999) VLDB
    • Gionis, A.1    Indyk, P.2    Motwani, R.3
  • 9
    • 34548767669 scopus 로고    scopus 로고
    • Deckard: Scalable and accurate tree-based detection of code clones
    • L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In Proceedings of ICSE, 2007.
    • (2007) Proceedings of ICSE
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 10
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7), 2002.
    • (2002) TSE , vol.28 , Issue.7
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 11
    • 0033717004 scopus 로고    scopus 로고
    • Semantics-preserving procedure extraction
    • R. Komondoor and S. Horwitz. Semantics-preserving procedure extraction. In POPL, 2000.
    • (2000) POPL
    • Komondoor, R.1    Horwitz, S.2
  • 12
    • 57349101139 scopus 로고    scopus 로고
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, 2001.
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, 2001.
  • 14
    • 84910009447 scopus 로고    scopus 로고
    • CP-Miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, 2004.
    • (2004) OSDI
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 15
    • 32344452883 scopus 로고    scopus 로고
    • PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
    • Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, 2005.
    • (2005) ESEC/FSE
    • Li, Z.1    Zhou, Y.2
  • 17
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, 1996.
    • (1996) ICSM
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 18
    • 1142267351 scopus 로고    scopus 로고
    • Winnowing: Local algorithms for document fingerprinting
    • S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: local algorithms for document fingerprinting. In SIGMOD, 2003.
    • (2003) SIGMOD
    • Schleimer, S.1    Wilkerson, D.S.2    Aiken, A.3
  • 19
    • 14344258876 scopus 로고    scopus 로고
    • Clone detection in source code by frequent itemset techniques
    • V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In SCAM, 2004.
    • (2004) SCAM
    • Wahler, V.1    Seipel, D.2    von Gudenberg, J.W.3    Fischer, G.4
  • 21
    • 29844449569 scopus 로고    scopus 로고
    • Similarity evaluation on tree-structured data
    • R. Yang, P. Kalnis, and A. K. H. Tung. Similarity evaluation on tree-structured data. In SIGMOD, 2005.
    • (2005) SIGMOD
    • Yang, R.1    Kalnis, P.2    Tung, A.K.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.