-
1
-
-
34548259865
-
Finding Clones with Dup: Analysis of an Experiment
-
B. Baker. Finding Clones with Dup: Analysis of an Experiment. IEEE TSE, 33(9):608-621, 2007.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 608-621
-
-
Baker, B.1
-
2
-
-
0029222025
-
On Finding Duplication and Near-Duplication in Large Software Systems
-
B. Buker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Buker, B.1
-
3
-
-
0033353188
-
Measuring Clone Based Reengineering Opportunities
-
M. Balazinska, E. Merlo. M. Dagenais, B. Lague and K. Kontogiannis. Measuring Clone Based Reengineering Opportunities. In METRICS, pp. 292-303, 1999.
-
(1999)
METRICS
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
4
-
-
37849021096
-
Efficient Token Based Clone Detection with Flexible Tokenization
-
H. Bask, S. Pugliesi, W. Smyth, A. Turpin and S.Jarzabek. Efficient Token Based Clone Detection with Flexible Tokenization. In ESEC/FSE, pp. 513-515, 2007.
-
(2007)
ESEC/FSE
, pp. 513-515
-
-
Bask, H.1
Pugliesi, S.2
Smyth, W.3
Turpin, A.4
Jarzabek, S.5
-
5
-
-
53849090475
-
-
Project Bauhaus
-
Project Bauhaus, http://www.bauhaus-stuttgart.de.
-
-
-
-
6
-
-
0032311601
-
Clone Detection Using Abstract Syntax Trees
-
I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM. pp. 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Anna, M.4
-
7
-
-
34548228440
-
Comparison and Evaluation of Clone Detection Tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
8
-
-
34548812113
-
Evaluating Clone Detection Tools for Use during Preventative Maintenance
-
E. Burd and J. Bailey. Evaluating Clone Detection Tools for Use during Preventative Maintenance. In SCAM, pp. 36-43, 2002.
-
(2002)
SCAM
, pp. 36-43
-
-
Burd, E.1
Bailey, J.2
-
9
-
-
35348852053
-
Function Clone Detection in Web Applications: A Semiautomated Approach
-
F. Calefato, F. Lanubile and T. Mallardo. Function Clone Detection in Web Applications: A Semiautomated Approach. J. of Weh Eng., 3(1):3-21, 2004.
-
(2004)
J. of Weh Eng
, vol.3
, Issue.1
, pp. 3-21
-
-
Calefato, F.1
Lanubile, F.2
Mallardo, T.3
-
10
-
-
53849102795
-
Identifying Clones in the Linux Kernel
-
G. Casazza, G. Antoniol, U. Villano, E. Merlo and M. Penta. Identifying Clones in the Linux Kernel. In SCAM, pp. 90-97, 2001.
-
(2001)
SCAM
, pp. 90-97
-
-
Casazza, G.1
Antoniol, G.2
Villano, U.3
Merlo, E.4
Penta, M.5
-
11
-
-
84952201613
-
Dotplot: A program for exploring self-similarity in millions of lines for text and code
-
K. Church and J. Helfman. Dotplot: A program for exploring self-similarity in millions of lines for text and code. J. of American Stat. Ass., 2(2):153-174, 1993.
-
(1993)
J. of American Stat. Ass
, vol.2
, Issue.2
, pp. 153-174
-
-
Church, K.1
Helfman, J.2
-
12
-
-
32344442609
-
Practical Language-Independent Detection of Near-Miss Clones
-
J.R. Cordy, T.R. Dean and N. Synytskyy. Practical Language-Independent Detection of Near-Miss Clones. In CASCON, pp. 29-40, 2004.
-
(2004)
CASCON
, pp. 29-40
-
-
Cordy, J.R.1
Dean, T.R.2
Synytskyy, N.3
-
13
-
-
32344434402
-
The Development of a Software Clone Detector
-
N. Davey, P. Barson, S. Field and R. Frank. The Development of a Software Clone Detector. J. App. Soft. Tech., 1(3/4):219-236, 1995.
-
(1995)
J. App. Soft. Tech
, vol.1
, Issue.3-4
, pp. 219-236
-
-
Davey, N.1
Barson, P.2
Field, S.3
Frank, R.4
-
14
-
-
0036389629
-
An Approach to Identify Duplicated Web
-
G. Di Lucca, M. Penta and A. Fasolino. An Approach to Identify Duplicated Web Pages. In COMPSAC, pp. 481-486, 2002.
-
(2002)
COMPSAC
, pp. 481-486
-
-
Di Lucca, G.1
Penta, M.2
Fasolino, A.3
-
15
-
-
53849113169
-
-
Tool Dupman http://sourceforge.net/projects/dupman
-
Tool Dupman
-
-
-
16
-
-
0033308732
-
A Language Independent Approach for Detecting Duplicated Code
-
S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
-
(1999)
ICSM
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
17
-
-
51149108069
-
Clone Detection via Structural Abstraction
-
W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
-
(2007)
WCRE
, pp. 150-159
-
-
Evans, W.1
Fraser, C.2
-
19
-
-
1442344984
-
-
D. Gitchell and N. Tran. Sim: A utility for detecting similarity in computer programs. In SIGCSE Bulletin, 31(1): 266-270, 1999.
-
D. Gitchell and N. Tran. Sim: A utility for detecting similarity in computer programs. In SIGCSE Bulletin, 31(1): 266-270, 1999.
-
-
-
-
20
-
-
34548767669
-
DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
-
L. Jiang. G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
21
-
-
53849147395
-
Visualizing Textual Redundancy in Legacy Source
-
J. Johnson. Visualizing Textual Redundancy in Legacy Source. In CASCCW, pp. 171-183, 1994.
-
(1994)
CASCCW
, pp. 171-183
-
-
Johnson, J.1
-
22
-
-
0036648690
-
CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
-
T. Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
-
(2002)
IEEE TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
23
-
-
84890052317
-
Using Slicing to Identify Duplication in Source Code
-
R. Komondoor and S. Horwitz. Using Slicing to Identify Duplication in Source Code. In SAS, pp. 40-56, 2001.
-
(2001)
SAS
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
24
-
-
0030166953
-
Pattern Matching for Clone and Concept Detection
-
K. Kontogiannis, R. DeMori, E. Merlo, M. Galler, and M. Bernstein. Pattern Matching for Clone and Concept Detection. JASE, 3(1-2):77-108, 1996.
-
(1996)
JASE
, vol.3
, Issue.1-2
, pp. 77-108
-
-
Kontogiannis, K.1
DeMori, R.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
25
-
-
34948876329
-
Clone Detection Using Abstract Syntax Suffix Trees
-
R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
-
(2006)
WCRE
, pp. 253-262
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
26
-
-
64549100783
-
Survey of Research on Software Clones
-
24pp
-
R. Koschke. Survey of Research on Software Clones. In Dagstuhl Seminar 06301, 24pp., 2006.
-
(2006)
Dagstuhl Seminar 06301
-
-
Koschke, R.1
-
27
-
-
0034770139
-
Identifying Similar Code with Program Dependence Graphs
-
J. Krinke. Identifying Similar Code with Program Dependence Graphs. In WCRE, pp. 301-309, 2001.
-
(2001)
WCRE
, pp. 301-309
-
-
Krinke, J.1
-
28
-
-
85126165687
-
SDD: High performance Code Clone Detection System for Large Scale Source Code
-
S. Lee and I. Jeong. SDD: High performance Code Clone Detection System for Large Scale Source Code. In OOPSLA, pp. 140-141, 2005.
-
(2005)
OOPSLA
, pp. 140-141
-
-
Lee, S.1
Jeong, I.2
-
29
-
-
4444250414
-
-
2. Soft. Qual. J., 12(4):361-382, 2004.
-
2. Soft. Qual. J., 12(4):361-382, 2004.
-
-
-
-
30
-
-
33749559863
-
-
C. Liu, C. Chen, J. Han and P. Yu. GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis.In KDD. pp. 872-881, 2006.
-
C. Liu, C. Chen, J. Han and P. Yu. GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis.In KDD. pp. 872-881, 2006.
-
-
-
-
31
-
-
34548789572
-
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder
-
S. Livieri, Y. Higo, M. Matsushita, K. Inoue: Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder. In ICSE, pp. 106-115, 2007.
-
(2007)
ICSE
, pp. 106-115
-
-
Livieri, S.1
Higo, Y.2
Matsushita, M.3
Inoue, K.4
-
32
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3): 176-192, 2006.
-
(2006)
IEEE TSE
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
33
-
-
85043988965
-
Finding Similar Files in a Large File System
-
U. Manber. Finding Similar Files in a Large File System. In USENIX Winter, pp. 1-10, 1994.
-
(1994)
USENIX Winter
, pp. 1-10
-
-
Manber, U.1
-
34
-
-
85116901733
-
Identification of High-level Concept Clones in Source Code
-
A. Marcus and J. Maletic. Identification of High-level Concept Clones in Source Code. In ASE, pp. 107-114, 2001.
-
(2001)
ASE
, pp. 107-114
-
-
Marcus, A.1
Maletic, J.2
-
35
-
-
0030407014
-
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
-
J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM. pp. 244-253, 1996.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
36
-
-
53849090118
-
Source Code Enhancement Using Reduction of Duplicated Code
-
S. Nasehi, G. Sotudeh and M. Gomrokchi. Source Code Enhancement Using Reduction of Duplicated Code. In IASTED SE, 2007.
-
(2007)
IASTED SE
-
-
Nasehi, S.1
Sotudeh, G.2
Gomrokchi, M.3
-
37
-
-
84970889390
-
Extending Software Quality Assessment Techniques to Java Systems
-
J. Patenaude, E. Merlo, M. Dagenais, and B. Lague. Extending Software Quality Assessment Techniques to Java Systems. In IWPC, pp. 49-56, 1999.
-
(1999)
IWPC
, pp. 49-56
-
-
Patenaude, J.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
-
38
-
-
53849113833
-
-
C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's Technical Report:541, 115pp., 2007.
-
C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's Technical Report:541, 115pp., 2007.
-
-
-
-
39
-
-
71149111492
-
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
-
10pp
-
C.K. Roy and J.R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, 10pp., 2008.
-
(2008)
ICPC
-
-
Roy, C.K.1
Cordy, J.R.2
-
40
-
-
27744514010
-
Evaluating Clone Detection Techniques
-
12pp
-
F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques. In ELISA 12pp., 2003.
-
(2003)
ELISA
-
-
Rysselberghe, F.1
Demeyer, S.2
-
41
-
-
15844401604
-
Evaluating Clone Detection Techniques from a Refactoring Perspective
-
F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques from a Refactoring Perspective. In ASE, pp. 336-339, 2004.
-
(2004)
ASE
, pp. 336-339
-
-
Rysselberghe, F.1
Demeyer, S.2
-
42
-
-
53849097897
-
-
Tool SimScan. http://www.blue-edge.bg/simscan/
-
Tool SimScan
-
-
-
43
-
-
34248359450
-
Phoenix-Based Clone Detection Using Suffix Trees
-
R. Tairas and J. Gray. Phoenix-Based Clone Detection Using Suffix Trees. In ACM-SE, pp. 679-684, 2006.
-
(2006)
ACM-SE
, pp. 679-684
-
-
Tairas, R.1
Gray, J.2
-
44
-
-
84948985305
-
On Detection of Gapped Code Clones Using Gap Locations
-
Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. On Detection of Gapped Code Clones Using Gap Locations. In APSEC, pp. 327-336, 2002.
-
(2002)
APSEC
, pp. 327-336
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
45
-
-
14344258876
-
Clone Detection in Source Code by Frequent Itemset Techniques
-
V. Wahler, D. Seipel, J. Gudenberg and G. Fischer. Clone Detection in Source Code by Frequent Itemset Techniques. In SCAM, pp. 128-135, 2004.
-
(2004)
SCAM
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
Gudenberg, J.3
Fischer, G.4
-
46
-
-
33847207801
-
Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments
-
8pp
-
R. Wettel and R. Marinescu. Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments. In SYNASC, 8pp., 2005.
-
(2005)
SYNASC
-
-
Wettel, R.1
Marinescu, R.2
-
47
-
-
0026185673
-
Identifying Syntactic Differences Between Two Programs
-
W. Yang. Identifying Syntactic Differences Between Two Programs. Soft.-Prac. and Exper., 21(7):739-155, 1991.
-
(1991)
Soft.-Prac. and Exper
, vol.21
, Issue.7
, pp. 739-155
-
-
Yang, W.1
|