-
1
-
-
0036783855
-
Analyzing cloning evolution in the Linux kernel
-
Oct
-
G. Antoniol, U. Villano, E. Merlo, and M. Di Penta. Analyzing cloning evolution in the Linux kernel. Information and Software Technology, 44:755-765, Oct. 2002.
-
(2002)
Information and Software Technology
, vol.44
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Di Penta, M.4
-
2
-
-
70349919911
-
-
A. Becerman-Rodau. Protecting Computer Software: after Apple Computer Inc. v. Frankin Computer Corp, 714 F.2d 1240 (3d Cir. 1983) does copyright provide the best protection? Temple Law Review, 57527, 1984
-
A. Becerman-Rodau. Protecting Computer Software: after Apple Computer Inc. v. Frankin Computer Corp., 714 F.2d 1240 (3d Cir. 1983) does copyright provide the best protection? Temple Law Review, 57(527), 1984.
-
-
-
-
3
-
-
85088204517
-
Mining evolution data of a product family
-
USA, May 17, ACM
-
M. Fischer, J. Oberleitner, J. Ratzinger, and H. Gall. Mining evolution data of a product family. In Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR 2005, USA, May 17, 2005. ACM, 2005.
-
(2005)
Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR 2005
-
-
Fischer, M.1
Oberleitner, J.2
Ratzinger, J.3
Gall, H.4
-
4
-
-
70349916754
-
-
FreeBSD Documentation Project, Accessed Apr. 2009
-
FreeBSD Documentation Project. Ports with distribution restrictions. http://www.freebsd.org/doc/en/books/portershandbook/ porting-restrictions. html. Accessed Apr. 2009.
-
Ports with distribution restrictions
-
-
-
6
-
-
57049139273
-
The fossology project
-
R. Gobeille. The fossology project. In Fith International Workshop on Mining Software Repositories, MSR 2008, Leipzig, Germany, May 10-11, 2008, Proceedings, pages 47-50, 2008.
-
(2008)
Fith International Workshop on Mining Software Repositories, MSR 2008, Leipzig, Germany, May 10-11, 2008, Proceedings
, pp. 47-50
-
-
Gobeille, R.1
-
7
-
-
17644417780
-
Using origin analysis to detect merging and splitting of source code entities
-
Feb
-
M. Godfrey and L. Zou. Using origin analysis to detect merging and splitting of source code entities. IEEE Transactions on Software Engineering, 31(2):166-181, Feb. 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.2
, pp. 166-181
-
-
Godfrey, M.1
Zou, L.2
-
9
-
-
70349933372
-
-
Jacobsen v. Katzer, No. 2008-1001 (Fed. Cir. 8/13/2008). U.S. Court of Appeals for the Federal Circuit, 2008.
-
Jacobsen v. Katzer, No. 2008-1001 (Fed. Cir. 8/13/2008). U.S. Court of Appeals for the Federal Circuit, 2008.
-
-
-
-
10
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
July
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654-670, July 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
11
-
-
56749132226
-
-
C. Kapser andM.W. Godfrey. cloning considered harmful considered harmful: patterns of cloning in software. Empirical Software Engineering, 13(6):645-692, 2008.
-
C. Kapser andM.W. Godfrey. "cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering, 13(6):645-692, 2008.
-
-
-
-
12
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G.Murphy. An empirical study of code clone genealogies. ESEC/FSE, 30(5):187-196, 2005.
-
(2005)
ESEC/FSE
, vol.30
, Issue.5
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
13
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
Washington, DC, USA, IEEE Computer Society
-
J. Krinke. A study of consistent and inconsistent changes to code clones. In WCRE '07: Proceedings of the 14th Working Conference on Reverse Engineering, pages 170-178, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
WCRE '07: Proceedings of the 14th Working Conference on Reverse Engineering
, pp. 170-178
-
-
Krinke, J.1
-
14
-
-
56349141528
-
Is cloned code more stable than non-cloned code?
-
Washington, DC, USA, IEEE Computer Society
-
J. Krinke. Is cloned code more stable than non-cloned code? In SCAM 08: Proceedings of the Working Conference on Source Code Analysis and Manipulation, pages 57-66, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
SCAM 08: Proceedings of the Working Conference on Source Code Analysis and Manipulation
, pp. 57-66
-
-
Krinke, J.1
-
15
-
-
70349935563
-
-
S. Lai. The Copyright Protection of Computer Software in the United Kingdom. Hart Publishing, 2000
-
S. Lai. The Copyright Protection of Computer Software in the United Kingdom. Hart Publishing, 2000.
-
-
-
-
16
-
-
33645819206
-
Cp-miner: Finding copypaste and related bugs in large-scale software code
-
Z. Li, S. Lu, and S. Myagmar. Cp-miner: Finding copypaste and related bugs in large-scale software code. IEEE Trans. Softw. Eng., 32(3):176-192, 2006.
-
(2006)
IEEE Trans. Softw. Eng
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
-
17
-
-
34548718215
-
Analysis of the linux kernel evolution using code clone coverage
-
Washington, DC, USA, IEEE Computer Society
-
S. Livieri, Y. Higo, M. Matsushita, and K. Inoue. Analysis of the linux kernel evolution using code clone coverage. In MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories, page 22,Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories
, pp. 22
-
-
Livieri, S.1
Higo, Y.2
Matsushita, M.3
Inoue, K.4
-
18
-
-
57849157446
-
A methodology to assess the impact of source code flaws in changeability and its application to clones
-
Washington, DC, USA, IEEE Computer Society
-
A. Lozano. A methodology to assess the impact of source code flaws in changeability and its application to clones. In ICSM 08: Proceedings of the International Conference of Software Maintenance, pages 424-427, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ICSM 08: Proceedings of the International Conference of Software Maintenance
, pp. 424-427
-
-
Lozano, A.1
-
19
-
-
34548735994
-
Evaluating the harmfulness of cloning: A change based experiment
-
Washington, DC, USA, IEEE Computer Society
-
A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories, page 18,Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories
, pp. 18
-
-
Lozano, A.1
Wermelinger, M.2
Nuseibeh, B.3
-
20
-
-
70349926264
-
Copying 0.03 percent of software code base not "de minimis
-
N. J. Mertzel. Copying 0.03 percent of software code base not "de minimis". Journal of Intellectual Property Law & Practice, 9(3):547-548, 2008.
-
(2008)
Journal of Intellectual Property Law & Practice
, vol.9
, Issue.3
, pp. 547-548
-
-
Mertzel, N.J.1
-
25
-
-
70349926255
-
-
United States Copyright Office. Circular 92 Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, June 2003
-
United States Copyright Office. Circular 92 Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, June 2003.
-
-
-
-
26
-
-
26444574763
-
Measuring similarity of large software systems based on source code correspondence
-
Oulu, Finland, June 13-15, Springer
-
T. Yamamoto, M. Matsushita, T. Kamiya, and K. Inoue. Measuring similarity of large software systems based on source code correspondence. In 6th Int. Conf. on Product Focused Software Process Improvement, PROFES 2005, Oulu, Finland, June 13-15, 2005, pages 530-544. Springer, 2005.
-
(2005)
6th Int. Conf. on Product Focused Software Process Improvement, PROFES 2005
, pp. 530-544
-
-
Yamamoto, T.1
Matsushita, M.2
Kamiya, T.3
Inoue, K.4
|