-
2
-
-
77956616360
-
-
G. Antoniol, G. Casazza, M. D. Penta, and E. Merlo. Modeling clones evolution through time series. In International Conference on Software Maintenance, pages 273-280. IEEE CS Press, 2001.
-
G. Antoniol, G. Casazza, M. D. Penta, and E. Merlo. Modeling clones evolution through time series. In International Conference on Software Maintenance, pages 273-280. IEEE CS Press, 2001.
-
-
-
-
3
-
-
0036783855
-
Analyzing cloning evolution in the linux kernel
-
G. Antoniol, U. Villano, E. Merlo, and M. Penta. Analyzing cloning evolution in the linux kernel. Information and Software Technology, 44(13):755-765, 2002.
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Penta, M.4
-
5
-
-
34548812113
-
Evaluating clone detection tools for use during preventative maintenance
-
IEEE CS Press
-
J. Bailey and E. Burd. Evaluating clone detection tools for use during preventative maintenance. In Workshop Source Code Analysis and Manipulation, pages 36-43. IEEE CS Press, 2002.
-
(2002)
Workshop Source Code Analysis and Manipulation
, pp. 36-43
-
-
Bailey, J.1
Burd, E.2
-
6
-
-
0013238532
-
Parameterized duplication in strings: Algorithms and an application to software maintenance
-
Oct
-
B. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM Journal on Computing, 26(5):1343-1362, Oct. 1997.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1343-1362
-
-
Baker, B.1
-
7
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
L. Wills, P. Newcomb, and E. Chikofsky, editors, Los Alamitos, California, July, IEEE CS Press
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In L. Wills, P. Newcomb, and E. Chikofsky, editors, Second Working Conference on Reverse Engineering, pages 86-95, Los Alamitos, California, July 1995. IEEE CS Press.
-
(1995)
Second Working Conference on Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
8
-
-
0030084599
-
Parameterized Pattern Matching: Algorithms and Applications
-
Feb
-
B. S. Baker. Parameterized Pattern Matching: Algorithms and Applications. Journal Computer System Science, 52(1):28-42, Feb. 1996.
-
(1996)
Journal Computer System Science
, vol.52
, Issue.1
, pp. 28-42
-
-
Baker, B.S.1
-
10
-
-
0033353188
-
Measuring clone based reengineering opportunities
-
IEEE CS Press, Nov
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague, and K. Kontogiannis. Measuring clone based reengineering opportunities. In IEEE Symposium on Software Metrics, pages 292-303. IEEE CS Press, Nov. 1999.
-
(1999)
IEEE Symposium on Software Metrics
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
11
-
-
0033359177
-
Partial redesign of java software systems based on clone analysis
-
IEEE CS Press
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague, and K. Kontogiannis. Partial redesign of java software systems based on clone analysis. In Working Conference on Reverse Engineering, pages 326-336. IEEE CS Press, 1999.
-
(1999)
Working Conference on Reverse Engineering
, pp. 326-336
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
12
-
-
0034503791
-
Advanced clone-analysis to support object-oriented system refactoring
-
IEEE CS Press, Oct
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague, and K. Kontogiannis. Advanced clone-analysis to support object-oriented system refactoring. In Working Conference on Reverse Engineering, pages 98-107. IEEE CS Press, Oct. 2000.
-
(2000)
Working Conference on Reverse Engineering
, pp. 98-107
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
13
-
-
0032311601
-
Clone Detection Using
-
Abstract Syntax Trees, T. M. Koshgoftaar and K. Bennett, editors, IEEE Computer Society Press
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone Detection Using Abstract Syntax Trees. In T. M. Koshgoftaar and K. Bennett, editors, International Conference on Software Maintenance, pages 368-378. IEEE Computer Society Press, 1998.
-
(1998)
International Conference on Software Maintenance
, pp. 368-378
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
14
-
-
0346519769
-
-
Diploma thesis, no. 1998, University of Stuttgart Germany, Institute for Software Technology, Sept
-
S. Bellon. Vergleich von Techniken zur Erkennung duplizierten Quellcodes. Diploma thesis, no. 1998, University of Stuttgart (Germany), Institute for Software Technology, Sept. 2002.
-
(2002)
Vergleich von Techniken zur Erkennung duplizierten Quellcodes
-
-
Bellon, S.1
-
15
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Sept
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering, pages 577-591, Sept. 2007.
-
(2007)
IEEE Transactions on Software Engineering
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
16
-
-
18044396139
-
An evaluation of clone detection techniques for cross-cutting concerns
-
M. Bruntink, A. van Deursen, T. Tourwe, and R. van Engelen. An evaluation of clone detection techniques for cross-cutting concerns. In International Conference on Software Maintenance, pages 200-209, 2004.
-
(2004)
International Conference on Software Maintenance
, pp. 200-209
-
-
Bruntink, M.1
van Deursen, A.2
Tourwe, T.3
van Engelen, R.4
-
17
-
-
30344449773
-
On the use of clone detection for identifying crosscutting concern code
-
M. Bruntink, R. van Engelen, and T. Tourwe. On the use of clone detection for identifying crosscutting concern code. IEEE Transactions on Software Engineering, 31(10):804-818, 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.10
, pp. 804-818
-
-
Bruntink, M.1
van Engelen, R.2
Tourwe, T.3
-
18
-
-
0036041421
-
An empirical study of operating system errors
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. R. Engler. An empirical study of operating system errors. In Symposium on Operating Systems Principles, pages 73-88, 2001.
-
(2001)
Symposium on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.R.5
-
21
-
-
18844392422
-
Comprehending reality: Practical challenges to software maintenance automation
-
IEEE CS Press
-
J. Cordy. Comprehending reality: Practical challenges to software maintenance automation. In International Workshop on Program Comprehension, pages 196-206. IEEE CS Press, 2003.
-
(2003)
International Workshop on Program Comprehension
, pp. 196-206
-
-
Cordy, J.1
-
23
-
-
57349168513
-
Clone detection in automotive model-based development
-
ACM Press
-
F. Deissenboeck, B. Hummel, E. Juergens, B. Schaetz, S. Wagner, S. Teuchert, and J.-F. Girard. Clone detection in automotive model-based development. In International Conference on Software Engineering. ACM Press, 2008.
-
(2008)
International Conference on Software Engineering
-
-
Deissenboeck, F.1
Hummel, B.2
Juergens, E.3
Schaetz, B.4
Wagner, S.5
Teuchert, S.6
Girard, J.-F.7
-
24
-
-
0036389629
-
-
G. Di Lucca, M. Di Penta, and A. Fasolino. An approach to identify duplicated web pages. In International Computer Software and Applications Conference, pages 481-486, 2002
-
G. Di Lucca, M. Di Penta, and A. Fasolino. An approach to identify duplicated web pages. In International Computer Software and Applications Conference, pages 481-486, 2002.
-
-
-
-
26
-
-
56749179725
-
Empirical evaluation of clone detection using syntax suffix trees
-
accepted for publication
-
R. Falke, R. Koschke, and P. Frenzel. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering, 2008. accepted for publication.
-
(2008)
Empirical Software Engineering
-
-
Falke, R.1
Koschke, R.2
Frenzel, P.3
-
28
-
-
0023385308
-
The program dependence graph and its use in optimization
-
319-349, July
-
J. Ferrante, K. Ottenstein, and J. Warren. The program dependence graph and its use in optimization. ACM Trans. on Prog. Lang. and Sys., 9(3):319-349, July 1987.
-
(1987)
ACM Trans. on Prog. Lang. and Sys
, vol.9
, Issue.3
-
-
Ferrante, J.1
Ottenstein, K.2
Warren, J.3
-
29
-
-
33748601586
-
On the internet, software should be milked, not brewed
-
Dec
-
G. Flammia. On the internet, software should be milked, not brewed. IEEE Expert, 11(6):87-88, Dec. 1996.
-
(1996)
IEEE Expert
, vol.11
, Issue.6
, pp. 87-88
-
-
Flammia, G.1
-
30
-
-
0023327532
-
No silver bullet: Essence and accidents of software engineering
-
Apr
-
J. Frederick P. Brooks. No silver bullet: Essence and accidents of software engineering. Computer, 20(4):10-19, Apr. 1987.
-
(1987)
Computer
, vol.20
, Issue.4
, pp. 10-19
-
-
Frederick, J.1
Brooks, P.2
-
31
-
-
51149121673
-
Extending the reflection method for consolidating software variants into product lines
-
IEEE CS Press, Oct
-
P. Frenzel, R. Koschke, A. P. J. Breu, and K. Angstmann. Extending the reflection method for consolidating software variants into product lines. In Working Conference on Reverse Engineering, pages 160-169. IEEE CS Press, Oct. 2007.
-
(2007)
Working Conference on Reverse Engineering
, pp. 160-169
-
-
Frenzel, P.1
Koschke, R.2
Breu, A.P.J.3
Angstmann, K.4
-
32
-
-
84898390317
-
Clone-based Reengineering für Java auf der Eclipse-Plattform
-
Department für Informatik, Abteilung Software Engineering, Germany
-
S. Giesecke. Clone-based Reengineering für Java auf der Eclipse-Plattform. Diplomarbeit, Carl von Ossietzky Universität Oldenburg, Department für Informatik, Abteilung Software Engineering, Germany, 2003.
-
(2003)
Diplomarbeit, Carl von Ossietzky Universität Oldenburg
-
-
Giesecke, S.1
-
36
-
-
84976757541
-
A tool that detects plagiarism in Pascal programs
-
S. Grier. A tool that detects plagiarism in Pascal programs. SIGSCE Bulletin, 13(1):15-20, 1981.
-
(1981)
SIGSCE Bulletin
, vol.13
, Issue.1
, pp. 15-20
-
-
Grier, S.1
-
37
-
-
84949935816
-
On software maintenance process improvement based on code clone analysis
-
International Conference on Product Focused Software Process Improvement, of, Springer
-
Y. Higo, Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On software maintenance process improvement based on code clone analysis. In International Conference on Product Focused Software Process Improvement, volume 2559 of Lecture Notes In Computer Science, pages 185-197. Springer, 2002.
-
(2002)
Lecture Notes In Computer Science
, vol.2559
, pp. 185-197
-
-
Higo, Y.1
Ueda, Y.2
Kamiya, T.3
Kusumoto, S.4
Inoue, K.5
-
38
-
-
0023960940
-
Detecting plagiarism in student Pascal programs
-
H. T. Jankowitz. Detecting plagiarism in student Pascal programs. Computer Journal, 1(31):1-8, 1988.
-
(1988)
Computer Journal
, vol.1
, Issue.31
, pp. 1-8
-
-
Jankowitz, H.T.1
-
39
-
-
33747790264
-
Unifying clones with a generative programming technique: A case study
-
S. Jarzabek and S. Li. Unifying clones with a generative programming technique: a case study. Journal on Software Maintenance and Evolution, 18(4):267-292, 2006.
-
(2006)
Journal on Software Maintenance and Evolution
, vol.18
, Issue.4
, pp. 267-292
-
-
Jarzabek, S.1
Li, S.2
-
40
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
ACM Press
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In International Conference on Software Engineering, pages 96-105. ACM Press, 2007.
-
(2007)
International Conference on Software Engineering
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
42
-
-
84962184978
-
Substring matching for clone detection and change tracking
-
IEEE CS Press
-
J. H. Johnson. Substring matching for clone detection and change tracking. In International Conference on Software Maintenance, pages 120-126. IEEE CS Press, 1994.
-
(1994)
International Conference on Software Maintenance
, pp. 120-126
-
-
Johnson, J.H.1
-
45
-
-
0036648690
-
CCFinder: A Multi-Linguistic Token-based Code Clone Detection System for Large Scale Source Code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A Multi-Linguistic Token-based Code Clone Detection System for Large Scale Source Code. IEEE Transactions on Software Engineering, 28(7):654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
46
-
-
84924352991
-
Subjectivity in clone judgment: Can we ever agree?
-
R. Koschke, E. Merlo, and A. Walenstein, editors, Schlo Dagstuhl
-
C. Kapser, P. Anderson, M. Godfrey, R. Koschke, M. Rieger, F. van Rysselberghe, and P. Weigerber. Subjectivity in clone judgment: Can we ever agree? In R. Koschke, E. Merlo, and A. Walenstein, editors, Dagstuhl Seminar "Duplication, Redundancy, and Similarity in Software" Proceedings 06301. Schlo Dagstuhl, 2006.
-
(2006)
Dagstuhl Seminar "Duplication, Redundancy, and Similarity in Software" Proceedings 06301
-
-
Kapser, C.1
Anderson, P.2
Godfrey, M.3
Koschke, R.4
Rieger, M.5
van Rysselberghe, F.6
Weigerber, P.7
-
47
-
-
56749099420
-
A taxonomy of clones in source code: The reengineers most wanted list
-
IEEE CS Press, Position Paper
-
C. Kapser and M. Godfrey. A taxonomy of clones in source code: The reengineers most wanted list. In Working Conference on Reverse Engineering. IEEE CS Press, 2003. Position Paper.
-
(2003)
Working Conference on Reverse Engineering
-
-
Kapser, C.1
Godfrey, M.2
-
50
-
-
33646429779
-
Supporting the analysis of clones in software systems: Research articles
-
C. J. Kapser and M. W. Godfrey. Supporting the analysis of clones in software systems: Research articles. Journal of Software Maintenance and Evolution, 18(2):61-82, 2006.
-
(2006)
Journal of Software Maintenance and Evolution
, vol.18
, Issue.2
, pp. 61-82
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
51
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
IEEE CS Press
-
M. Kim, L. Bergman, T. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. In International Symposium on Empirical Software Engineering, pages 83-92. IEEE CS Press, 2004.
-
(2004)
International Symposium on Empirical Software Engineering
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
52
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy. An empirical study of code clone genealogies. In European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE, pages 187-196, 2005.
-
(2005)
European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
54
-
-
32344442249
-
Eliminating duplication in source code via procedure extraction
-
Technical report 1461, UW-Madison Dept. of Computer Sciences, Dec
-
R. Komondoor and S. Horwitz. Eliminating duplication in source code via procedure extraction. Technical report 1461, UW-Madison Dept. of Computer Sciences, Dec. 2002.
-
(2002)
-
-
Komondoor, R.1
Horwitz, S.2
-
55
-
-
0029210270
-
Pattern matching for design concept localization
-
IEEE CS Press, July
-
K. Kontogiannis, R. DeMori, M. Bernstein, M. Galler, and E. Merlo. Pattern matching for design concept localization. In Working Conference on Reverse Engineering, pages 96-103. IEEE CS Press, July 1995.
-
(1995)
Working Conference on Reverse Engineering
, pp. 96-103
-
-
Kontogiannis, K.1
DeMori, R.2
Bernstein, M.3
Galler, M.4
Merlo, E.5
-
56
-
-
0030166953
-
Pattern matching for clone and concept detection
-
June
-
K. Kontogiannis, R. D. Mori, E. Merlo, M. Galler, and M. Bernstein. Pattern matching for clone and concept detection. Journal of Automated Software Engineering, 3(1/2):79-108, June 1996.
-
(1996)
Journal of Automated Software Engineering
, vol.3
, Issue.1-2
, pp. 79-108
-
-
Kontogiannis, K.1
Mori, R.D.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
57
-
-
57849152931
-
-
R. Koschke. Survey of research on software clones. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.
-
R. Koschke. Survey of research on software clones. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.
-
-
-
-
58
-
-
64549113062
-
-
Springer Verlag, 2008. Editors: Serge Demeyer und Tom Mens
-
R. Koschke. Identifying and Removing Software Clones, pages 15-39. Springer Verlag, 2008. Editors: Serge Demeyer und Tom Mens.
-
Identifying and Removing Software Clones
, pp. 15-39
-
-
Koschke, R.1
-
60
-
-
0034770139
-
Identifying Similar Code with Program Dependence Graphs
-
J. Krinke. Identifying Similar Code with Program Dependence Graphs. In Working Conference on Reverse Engineering, pages 301-309, 2001.
-
(2001)
Working Conference on Reverse Engineering
, pp. 301-309
-
-
Krinke, J.1
-
61
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
IEEE CS Press
-
J. Krinke. A study of consistent and inconsistent changes to code clones. In Working Conference on Reverse Engineering. IEEE CS Press, 2007.
-
(2007)
Working Conference on Reverse Engineering
-
-
Krinke, J.1
-
62
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lague, D. Proulx, J. Mayrand, E. Merlo, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In International Conference on Software Maintenance, pages 314-321, 1997.
-
(1997)
International Conference on Software Maintenance
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.5
-
65
-
-
84910009447
-
Cp-miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In Operating System Design and Implementation, pages 289-302, 2004.
-
(2004)
Operating System Design and Implementation
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
66
-
-
33645819206
-
Copy-paste and related bugs in large-scale software code
-
Mar
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 32(3):176-192, Mar. 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
67
-
-
34548735994
-
-
A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In Mining Software Repositories, ICSE Workshop. ACM Press, May 2007.
-
A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In Mining Software Repositories, ICSE Workshop. ACM Press, May 2007.
-
-
-
-
68
-
-
32344452759
-
Compare: A collusion detector for Pascal
-
N. H. Madhavji. Compare: a collusion detector for Pascal. Techniques et Sciences Informatiques, 4(6):489-497, 1985.
-
(1985)
Techniques et Sciences Informatiques
, vol.4
, Issue.6
, pp. 489-497
-
-
Madhavji, N.H.1
-
71
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In International Conference on Software Maintenance, pages 244-253, 1996.
-
(1996)
International Conference on Software Maintenance
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
72
-
-
0016942292
-
A space-economical suffix tree construction algorithm
-
E. McCreight. A space-economical suffix tree construction algorithm. Journal of the ACM, 32(2):262-272, 1976.
-
(1976)
Journal of the ACM
, vol.32
, Issue.2
, pp. 262-272
-
-
McCreight, E.1
-
73
-
-
50249120730
-
Supporting the grow-and-prune model in software product lines evolution using clone detection
-
IEEE CS Press
-
T. Mende, F. Beckwermert, R. Koschke, and G. Meier. Supporting the grow-and-prune model in software product lines evolution using clone detection. In European Conference on Software Maintenance and Reengineering, pages 163-172. IEEE CS Press, 2008.
-
(2008)
European Conference on Software Maintenance and Reengineering
, pp. 163-172
-
-
Mende, T.1
Beckwermert, F.2
Koschke, R.3
Meier, G.4
-
74
-
-
77954747683
-
Software quality analysis by code clones in industrial legacy software
-
A. Monden, D. Nakae, T. Kamiya, S. Sato, and K. Matsumoto. Software quality analysis by code clones in industrial legacy software. In IEEE Symposium on Software Metrics, pages 87-94, 2002.
-
(2002)
IEEE Symposium on Software Metrics
, pp. 87-94
-
-
Monden, A.1
Nakae, D.2
Kamiya, T.3
Sato, S.4
Matsumoto, K.5
-
76
-
-
0002895754
-
Jplag: Finding plagiarisms among a set of programs
-
Technical report, University of Karlsruhe, Department of Informatics
-
L. Prechelt, G. Malpohl, and M. Philippsen. Jplag: Finding plagiarisms among a set of programs. Technical report, University of Karlsruhe, Department of Informatics, 2000.
-
(2000)
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
79
-
-
57849136059
-
-
Technical Report No. 2007-541, School of Computing, Queen's University at Kingston, Ontario, Canada
-
C. K. Roy and J. R. Cordy. A survey on software clone detection research. Technical Report No. 2007-541, School of Computing, Queen's University at Kingston, Ontario, Canada, 2007.
-
(2007)
A survey on software clone detection research
-
-
Roy, C.K.1
Cordy, J.R.2
-
80
-
-
71149111492
-
Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
IEEE CS Press
-
C. K. Roy and J. R. Cordy. Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In International Conference on Program Comprehension. IEEE CS Press, 2008.
-
(2008)
International Conference on Program Comprehension
-
-
Roy, C.K.1
Cordy, J.R.2
-
86
-
-
84948677440
-
An integrated approach for studying architectural evolution
-
IEEE CS Press, June
-
Q. Tu and M. W. Godfrey. An integrated approach for studying architectural evolution. In International Workshop on Program Comprehension, pages 127-136. IEEE CS Press, June 2002.
-
(2002)
International Workshop on Program Comprehension
, pp. 127-136
-
-
Tu, Q.1
Godfrey, M.W.2
-
87
-
-
84948459152
-
Gemini: Maintenance support environment based on code clone analysis
-
IEEE CS Press
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In IEEE Symposium on Software Metrics, pages 67-76. IEEE CS Press, 2002.
-
(2002)
IEEE Symposium on Software Metrics
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
90
-
-
57849158208
-
-
C. D. via Structural Abstraction. William s. evans and christopher w. fraser and fei ma. In Working Conference on Reverse Engineering, pages 150-159. IEEE CS Press, 2007.
-
C. D. via Structural Abstraction. William s. evans and christopher w. fraser and fei ma. In Working Conference on Reverse Engineering, pages 150-159. IEEE CS Press, 2007.
-
-
-
-
91
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In Workshop Source Code Analysis and Manipulation, pages 128-135, 2004.
-
(2004)
Workshop Source Code Analysis and Manipulation
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
von Gudenberg, J.W.3
Fischer, G.4
-
92
-
-
57849162831
-
-
A. Walenstein. Code clones: Reconsidering terminology. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany.
-
A. Walenstein. Code clones: Reconsidering terminology. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany.
-
-
-
-
93
-
-
57849115774
-
-
A. Walenstein, M. El-Ramly, J. R. Cordy, W. S. Evans, K. Mahdavi, M. Pizka, G. Ramalingam, and J. W. von Gudenberg. Similarity in programs. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany.
-
A. Walenstein, M. El-Ramly, J. R. Cordy, W. S. Evans, K. Mahdavi, M. Pizka, G. Ramalingam, and J. W. von Gudenberg. Similarity in programs. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany.
-
-
-
-
94
-
-
84944630622
-
Problems creating task-relevant clone detection reference data
-
IEEE CS Press
-
A. Walenstein, N. Jyoti, J. Li, Y. Yang, and A. Lakhotia. Problems creating task-relevant clone detection reference data. In Working Conference on Reverse Engineering, pages 285-294. IEEE CS Press, 2003.
-
(2003)
Working Conference on Reverse Engineering
, pp. 285-294
-
-
Walenstein, A.1
Jyoti, N.2
Li, J.3
Yang, Y.4
Lakhotia, A.5
-
95
-
-
84948731890
-
Arc diagrams: Visualizing structure in strings
-
IEEE CS Press
-
M. Wattenberg. Arc diagrams: Visualizing structure in strings. In Proceedings InfoVis, pages 10-17. IEEE CS Press, 2002.
-
(2002)
Proceedings InfoVis
, pp. 10-17
-
-
Wattenberg, M.1
-
96
-
-
34547374057
-
Refactoring detection based on UMLDiff change-facts queries
-
IEEE CS Press
-
Z. Xing and E. Stroulia. Refactoring detection based on UMLDiff change-facts queries. In Working Conference on Reverse Engineering, pages 263-274. IEEE CS Press, 2003.
-
(2003)
Working Conference on Reverse Engineering
, pp. 263-274
-
-
Xing, Z.1
Stroulia, E.2
-
97
-
-
30344468434
-
Analyzing the evolutionary history of the logical design of object-oriented software
-
Oct
-
Z. Xing and E. Stroulia. Analyzing the evolutionary history of the logical design of object-oriented software. IEEE Transactions on Software Engineering, 31(10):850-868, Oct. 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.10
, pp. 850-868
-
-
Xing, Z.1
Stroulia, E.2
-
98
-
-
0026185673
-
Identifying syntactic differences between two programs
-
July
-
W. Yang. Identifying syntactic differences between two programs. Software-Practice and Experience, 21(7):739-755, July 1991.
-
(1991)
Software-Practice and Experience
, vol.21
, Issue.7
, pp. 739-755
-
-
Yang, W.1
-
99
-
-
84944611721
-
Detecting merging and splitting using origin analysis
-
IEEE CS Press
-
L. Zou and M. Godfrey. Detecting merging and splitting using origin analysis. In Working Conference on Reverse Engineering, pages 146-154. IEEE CS Press, 2003.
-
(2003)
Working Conference on Reverse Engineering
, pp. 146-154
-
-
Zou, L.1
Godfrey, M.2
|