-
2
-
-
26044454396
-
Is Mutation an Appropriate Tool for Testing Experiments?
-
J. H. Andrews, L. C. Briand and Y. Labiche. Is Mutation an Appropriate Tool for Testing Experiments? In ICSE, pp. 402-411, 2005.
-
(2005)
ICSE
, pp. 402-411
-
-
Andrews, J.H.1
Briand, L.C.2
Labiche, Y.3
-
3
-
-
34547677997
-
How Clones are Maintained: An Empirical Study
-
L. Aversano, L. Cerulo, and Massimiliano Di Penta. How Clones are Maintained: An Empirical Study. In CSMR, pp. 81-90, 2007.
-
(2007)
CSMR
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Di Penta, M.3
-
4
-
-
34548259865
-
Finding Clones with Dup: Analysis of an Experiment
-
B. Baker. Finding Clones with Dup: Analysis of an Experiment. In IEEE TSE, 33(9):608-621, 2007.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 608-621
-
-
Baker, B.1
-
5
-
-
0029222025
-
On Finding Duplication and Near-Duplication in Large Software Systems
-
B. Baker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.1
-
6
-
-
0033353188
-
Measuring Clone Based Reengineering Opportunities
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague and K. Kontogiannis. Measuring Clone Based Reengineering Opportunities. In METRICS, pp. 292-303, 1999.
-
(1999)
METRICS
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
8
-
-
0032311601
-
Clone Detection Using Abstract Syntax Trees
-
I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM, pp. 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Anna, M.4
-
10
-
-
34548228440
-
Comparison and Evaluation of Clone Detection Tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
11
-
-
48049108256
-
Comparative Assessment of Testing and Model Checking Using Program Mutation
-
J. Bradbury, J.R. Cordy and J. Dingel. Comparative Assessment of Testing and Model Checking Using Program Mutation. In Mutation pp. 210-219, 2007.
-
(2007)
Mutation
, pp. 210-219
-
-
Bradbury, J.1
Cordy, J.R.2
Dingel, J.3
-
12
-
-
30344449773
-
On the Use of Clone Detection for Identifying Crosscutting Concern Code
-
M. Bruntink, A. Deursen, R. Engelen and T. Tourwe. On the Use of Clone Detection for Identifying Crosscutting Concern Code. IEEE TSE, 31(10):804-818, 2005.
-
(2005)
IEEE TSE
, vol.31
, Issue.10
, pp. 804-818
-
-
Bruntink, M.1
Deursen, A.2
Engelen, R.3
Tourwe, T.4
-
13
-
-
34548812113
-
Evaluating Clone Detection Tools for Use during Preventative Maintenance
-
E. Burd, J. Bailey. Evaluating Clone Detection Tools for Use during Preventative Maintenance. In SCAM, pp. 36-43, 2002.
-
(2002)
SCAM
, pp. 36-43
-
-
Burd, E.1
Bailey, J.2
-
14
-
-
33646831658
-
The TXL source transformation language
-
J.R. Cordy. The TXL source transformation language. In Science of Computer Programming, 61(3):190-210, 2006.
-
(2006)
Science of Computer Programming
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
15
-
-
32344435327
-
On the Effectiveness of Clone Detection by String Matching
-
S. Ducasse, O. Nierstrasz and M. Rieger. On the Effectiveness of Clone Detection by String Matching. JSME: Research and Practice, 18(1): 37-58, 2006.
-
(2006)
JSME: Research and Practice
, vol.18
, Issue.1
, pp. 37-58
-
-
Ducasse, S.1
Nierstrasz, O.2
Rieger, M.3
-
16
-
-
0033308732
-
A Language Independent Approach for Detecting Duplicated Code
-
S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
-
(1999)
ICSM
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
17
-
-
51149108069
-
Clone Detection via Structural Abstraction
-
W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
-
(2007)
WCRE
, pp. 150-159
-
-
Evans, W.1
Fraser, C.2
-
18
-
-
56749179725
-
Empirical Evaluation of Clone Detection Using Syntax Suffix Trees
-
to appear
-
R. Falke, R. Koschke and P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering, 43 pp., 2008 (to appear).
-
Empirical Software Engineering
, vol.43
, pp. 2008
-
-
Falke, R.1
Koschke, R.2
Frenzel, P.3
-
19
-
-
57349194546
-
Scalable Detection of Semantic Clones
-
M. Gabel, L. Jiang and Z. Su. Scalable Detection of Semantic Clones. In ICSE, pp. 321-330, 2008.
-
(2008)
ICSE
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
20
-
-
69949088512
-
-
Feb 2008
-
The Gzip-1.2.4 http://www.gzip.org/(Feb 2008).
-
The Gzip-1.2.4
-
-
-
21
-
-
84924253147
-
-
June 2006
-
The JHotDraw: http://www.jhotdraw.org/(June 2006)
-
The JHotDraw
-
-
-
22
-
-
34548767669
-
DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
-
L. Jiang, G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
23
-
-
84962184978
-
Substring Matching for Clone Detection and Change Tracking
-
J. Johnson. Substring Matching for Clone Detection and Change Tracking. In ICSM, pp. 120-126, 1994.
-
(1994)
ICSM
, pp. 120-126
-
-
Johnson, J.1
-
24
-
-
0036648690
-
CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
-
T. Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
-
(2002)
IEEE TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
25
-
-
34548718935
-
Cloning Considered Harmful Considered Harmful
-
C. Kapser and M. Godfrey. "Cloning Considered Harmful" Considered Harmful. In WCRE, pp. 19-28, 2006.
-
(2006)
WCRE
, pp. 19-28
-
-
Kapser, C.1
Godfrey, M.2
-
26
-
-
11244253656
-
Aiding Comprehension of Cloning Through Categorization
-
C. Kapser, and M. Godfrey. Aiding Comprehension of Cloning Through Categorization. In IWPSE'04, pp. 85-94, 2004.
-
(2004)
IWPSE'04
, pp. 85-94
-
-
Kapser, C.1
Godfrey, M.2
-
27
-
-
11244317212
-
An Ethnographic Study of Copy and Paste Programming Practices in OOPL
-
M. Kim, L. Bergman, T. Lau and D. Notkin. An Ethnographic Study of Copy and Paste Programming Practices in OOPL. In ISESE, pp. 83-92, 2004.
-
(2004)
ISESE
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
28
-
-
32344450436
-
An Empirical Study of Code Clone Genealogies
-
M. Kim and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187-196, 2005.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Murphy, G.2
-
29
-
-
84890052317
-
Using Slicing to Identify Duplication in Source Code
-
R. Komondoor and S. Horwitz. Using Slicing to Identify Duplication in Source Code. In SAS, pp. 40-56, 2001.
-
(2001)
SAS
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
30
-
-
0030166953
-
Pattern Matching for Clone and Concept Detection
-
K. Kontogiannis, R. DeMori, E. Merlo, M. Galler, and M. Bernstein. Pattern Matching for Clone and Concept Detection. JASE, 3(1-2):77-108, 1996.
-
(1996)
JASE
, vol.3
, Issue.1-2
, pp. 77-108
-
-
Kontogiannis, K.1
DeMori, R.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
31
-
-
0031346714
-
Evaluation Experiments on the Detection of Programming Patterns using Metrics
-
K. Kontogiannis. Evaluation Experiments on the Detection of Programming Patterns using Metrics. In WCRE, pp. 44-54, 1997.
-
(1997)
WCRE
, pp. 44-54
-
-
Kontogiannis, K.1
-
32
-
-
34948876329
-
Clone Detection Using Abstract Syntax Suffix Trees
-
R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
-
(2006)
WCRE
, pp. 253-262
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
33
-
-
0034770139
-
Identifying Similar Code with Program Dependence Graphs
-
J. Krinke. Identifying Similar Code with Program Dependence Graphs. In WCRE, pp. 301-309, 2001.
-
(2001)
WCRE
, pp. 301-309
-
-
Krinke, J.1
-
34
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
Z. Li, S. Lu, S. Myagmar and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3):176-192, 2006.
-
(2006)
IEEE TSE
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
35
-
-
85116901733
-
Identification of High-level Concept Clones in Source Code
-
A. Marcus and J. Maletic. Identification of High-level Concept Clones in Source Code. In ASE, pp. 107-114, 2001.
-
(2001)
ASE
, pp. 107-114
-
-
Marcus, A.1
Maletic, J.2
-
36
-
-
0030407014
-
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
-
J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM, pp. 244-253, 1996.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
37
-
-
71149111492
-
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
-
C.K. Roy and J.R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, pp. 172-181, 2008.
-
(2008)
ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
38
-
-
71149091724
-
Scenario-Based Comparison of Clone Detection Techniques
-
C.K. Roy and J.R. Cordy. Scenario-Based Comparison of Clone Detection Techniques. In ICPC, pp. 153-162, 2008.
-
(2008)
ICPC
, pp. 153-162
-
-
Roy, C.K.1
Cordy, J.R.2
-
39
-
-
69949090791
-
-
C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's School of Computing TR 2007-541, 115 pp., 2007.
-
C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's School of Computing TR 2007-541, 115 pp., 2007.
-
-
-
-
40
-
-
57049182540
-
Towards a Mutation-Based Automatic Framework for Evaluating Clone DetectionTools
-
C.K. Roy and J.R. Cordy. Towards a Mutation-Based Automatic Framework for Evaluating Clone DetectionTools. In C3S2E, Student Poster, pp. 137-140, 2008.
-
(2008)
C3S2E, Student Poster
, pp. 137-140
-
-
Roy, C.K.1
Cordy, J.R.2
-
41
-
-
57749209364
-
An Empirical Study of Function Clones in Open Source Software
-
C.K. Roy and J.R. Cordy. An Empirical Study of Function Clones in Open Source Software. In WCRE 2008, pp. 81-90, 2008.
-
(2008)
WCRE 2008
, pp. 81-90
-
-
Roy, C.K.1
Cordy, J.R.2
-
42
-
-
15844401604
-
Evaluating Clone Detection Techniques from a Refactoring Perspective
-
F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques from a Refactoring Perspective. In ASE, pp. 336-339, 2004.
-
(2004)
ASE
, pp. 336-339
-
-
Rysselberghe, F.1
Demeyer, S.2
-
43
-
-
0346151254
-
Problems Creating Task-relevant Clone Detection Reference Data
-
A. Walenstein, N. Jyoti, J. Li, Y. Yang, A. Lakhotia. Problems Creating Task-relevant Clone Detection Reference Data. In WCRE, pp. 285-295, 2003.
-
(2003)
WCRE
, pp. 285-295
-
-
Walenstein, A.1
Jyoti, N.2
Li, J.3
Yang, Y.4
Lakhotia, A.5
|