-
1
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
IEEE CSP
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In WCRE. IEEE CSP, 1995.
-
(1995)
WCRE
-
-
Baker, B.S.1
-
2
-
-
0032311601
-
-
I. D. Baxter, A. Yahin, L. Moura,M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM '98, page 368, Washington, DC, USA, 1998. IEEE-CS.
-
I. D. Baxter, A. Yahin, L. Moura,M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM '98, page 368, Washington, DC, USA, 1998. IEEE-CS.
-
-
-
-
3
-
-
0015489880
-
Organization and maintenance of large ordered indices
-
R. Bayer and E. M. McCreight. Organization and maintenance of large ordered indices. Acta Inf., 1:173-189, 1972.
-
(1972)
Acta Inf
, vol.1
, pp. 173-189
-
-
Bayer, R.1
McCreight, E.M.2
-
4
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. Software Eng., 33(9):577-591, 2007.
-
(2007)
IEEE Trans. Software Eng
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
5
-
-
34548812113
-
Evaluating clone detection tools for use during preventative maintenance. In SCAM, Montreal
-
October
-
E. Burd and J. Bailey. Evaluating clone detection tools for use during preventative maintenance. In SCAM, Montreal, October 2002. IEEE-CS.
-
(2002)
IEEE-CS
-
-
Burd, E.1
Bailey, J.2
-
6
-
-
3042606353
-
Shared information and program plagiarism detection
-
jul
-
X. Chen, B. Francia, M. Li, B. McKinnon, and A. Seker. Shared information and program plagiarism detection. IEEE Trans. Information Theory, jul 2004.
-
(2004)
IEEE Trans. Information Theory
-
-
Chen, X.1
Francia, B.2
Li, M.3
McKinnon, B.4
Seker, A.5
-
7
-
-
70349977963
-
Syntax tree fingerprinting: A foundation for source code similarity detection
-
Technical Report IGM2009-03, Université Paris-Est Marne-la-Vallée
-
M. Chilowicz, E. Duris, and G. Roussel. Syntax tree fingerprinting: a foundation for source code similarity detection. Technical Report IGM2009-03, Université Paris-Est Marne-la-Vallée, 2009. http://igm.univ-mlv. fr/LabInfo/rapportsInternes/2009/03.pdf.
-
(2009)
-
-
Chilowicz, M.1
Duris, E.2
Roussel, G.3
-
8
-
-
1442271419
-
Plagiarism in natural and programming languages: An overview of current tools and technologies
-
Internal Report CS-00-05, University of Sheffield
-
P. Clough. Plagiarism in natural and programming languages: an overview of current tools and technologies. Internal Report CS-00-05, University of Sheffield, 2000.
-
(2000)
-
-
Clough, P.1
-
9
-
-
51149108069
-
-
W. S. Evans, C. W. Fraser, and F. Ma. Clone detection via structural abstraction. In WCRE '07, pages 150-159, Washington, DC, USA, 2007. IEEE CS.
-
W. S. Evans, C. W. Fraser, and F. Ma. Clone detection via structural abstraction. In WCRE '07, pages 150-159, Washington, DC, USA, 2007. IEEE CS.
-
-
-
-
11
-
-
34548767669
-
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In ICSE '07, pages 96-105, Washington, DC, USA, 2007. IEEE-CS.
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In ICSE '07, pages 96-105, Washington, DC, USA, 2007. IEEE-CS.
-
-
-
-
12
-
-
35248830635
-
Simple linear work suffix array construction
-
Proc. ICALP, of
-
J. Kärkkäinen and P. Sanders. Simple linear work suffix array construction. In Proc. ICALP, volume 2719 of LNCS, 2003.
-
(2003)
LNCS
, vol.2719
-
-
Kärkkäinen, J.1
Sanders, P.2
-
13
-
-
84956976999
-
Linear-time longest-common-prefix computation in suffix arrays and its applications
-
T. Kasai, G. Lee, H. Arimura, S. Arikawa, and K. Park. Linear-time longest-common-prefix computation in suffix arrays and its applications. Combinatorial Pattern Matching (LNCS), pages 181-192, 2001.
-
(2001)
Combinatorial Pattern Matching (LNCS)
, pp. 181-192
-
-
Kasai, T.1
Lee, G.2
Arimura, H.3
Arikawa, S.4
Park, K.5
-
14
-
-
34948876329
-
-
R. Koschke, R. Falke, and P. Frenzel. Clone detection using abstract syntax suffix trees. In WCRE '06, pages 253-262, Washington, DC, USA, 2006. IEEE-CS.
-
R. Koschke, R. Falke, and P. Frenzel. Clone detection using abstract syntax suffix trees. In WCRE '06, pages 253-262, Washington, DC, USA, 2006. IEEE-CS.
-
-
-
-
15
-
-
33749559863
-
Gplag: Detection of software plagiarism by program dependence graph analysis
-
New York, NY, USA, ACM Press
-
C. Liu, C. Chen, J. Han, and P. S. Yu. Gplag: detection of software plagiarism by program dependence graph analysis. In KDD '06, pages 872-881, New York, NY, USA, 2006. ACM Press.
-
(2006)
KDD '06
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.S.4
-
16
-
-
50249120730
-
Supporting the grow-and-prune model in software product lines evolution using clone detection
-
Athens, Grece, IEEE
-
T. Mende, F. Beckwermert, R. Koschke, and G. Meier. Supporting the grow-and-prune model in software product lines evolution using clone detection. In CSMR 2008, pages 163-172, Athens, Grece, 2008. IEEE.
-
(2008)
CSMR 2008
, pp. 163-172
-
-
Mende, T.1
Beckwermert, F.2
Koschke, R.3
Meier, G.4
-
17
-
-
84863029564
-
Computer algorithms for plagiarism detection
-
A. Parker and J. Hamblen. Computer algorithms for plagiarism detection. IEEE Trans. on Educ., 32(2), 1989.
-
(1989)
IEEE Trans. on Educ
, vol.32
, Issue.2
-
-
Parker, A.1
Hamblen, J.2
-
19
-
-
71149111492
-
NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC '08, pages 172-181, 2008.
-
(2008)
ICPC '08
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
20
-
-
71149091724
-
Scenario-based comparison of clone detection techniques
-
IEEE
-
C. K. Roy and J. R. Cordy. Scenario-based comparison of clone detection techniques. In ICPC, pages 153-162. IEEE, 2008.
-
(2008)
ICPC
, pp. 153-162
-
-
Roy, C.K.1
Cordy, J.R.2
-
22
-
-
34248359450
-
Phoenix-based clone detection using suffix trees
-
New York, NY, USA, ACM
-
R. Tairas and J. Gray. Phoenix-based clone detection using suffix trees. In ACM-SE 44, pages 679-684, New York, NY, USA, 2006. ACM.
-
(2006)
ACM-SE 44
, pp. 679-684
-
-
Tairas, R.1
Gray, J.2
-
23
-
-
84948985305
-
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In APSEC '02, page 327, Washington, DC, USA, 2002. IEEE Computer Society.
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In APSEC '02, page 327, Washington, DC, USA, 2002. IEEE Computer Society.
-
-
-
-
24
-
-
0029701640
-
YAP3: Improved detection of similarities in computer program and other texts
-
SIGCSE, ACM, Feb
-
M. J. Wise. YAP3: improved detection of similarities in computer program and other texts. In Proc. the Conf. on Comp. Sci. Educ. SIGCSE, ACM, Feb. 1996.
-
(1996)
Proc. the Conf. on Comp. Sci. Educ
-
-
Wise, M.J.1
|