메뉴 건너뛰기




Volumn , Issue , 2008, Pages 172-181

NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization

Author keywords

[No Author keywords available]

Indexed keywords

CLONE DETECTION; CODE NORMALIZATION; CODE SEGMENTS; HIGH-PRECISION; INTERNATIONAL CONFERENCES; PROGRAM COMPREHENSION; PROGRAM STATEMENTS; SOURCE TRANSFORMATION; TRANSFORMATION RULES; TRANSFORMATION SYSTEMS;

EID: 71149111492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPC.2008.41     Document Type: Conference Paper
Times cited : (481)

References (33)
  • 1
    • 53849084656 scopus 로고    scopus 로고
    • December, 2007
    • The Abyss: http://abyss.sourceforge.net/ (December, 2007)
    • The Abyss
  • 2
    • 26044454396 scopus 로고    scopus 로고
    • Is Mutation an Appropriate Tool for Testing Experiments?
    • J. H. Andrews, L. C. Briand and Y. Labiche. Is Mutation an Appropriate Tool for Testing Experiments? In ICSE, pp. 402-411, 2005.
    • (2005) ICSE , pp. 402-411
    • Andrews, J.H.1    Briand, L.C.2    Labiche, Y.3
  • 3
    • 0029222025 scopus 로고
    • On Finding Duplication and Near-Duplication in Large Software Systems
    • B. Baker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
    • (1995) WCRE , pp. 86-95
    • Baker, B.1
  • 4
    • 37849021096 scopus 로고    scopus 로고
    • Efficient Token Based Clone Detection with Flexible Tokenization
    • H. Basit, S. Pugliesi, W. Smyth, A. Turpin and S.Jarzabek. Efficient Token Based Clone Detection with Flexible Tokenization. In ESEC/FSE. pp. 513-515, 2007.
    • (2007) ESEC/FSE , pp. 513-515
    • Basit, H.1    Pugliesi, S.2    Smyth, W.3    Turpin, A.4    Jarzabek, S.5
  • 5
    • 0032311601 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Trees
    • I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM, pp. 368-377, 1998.
    • (1998) ICSM , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Anna, M.4
  • 7
    • 34548228440 scopus 로고    scopus 로고
    • Comparison and Evaluation of Clone Detection Tools
    • S. Bellon, R. Koschke, O. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
    • (2007) IEEE TSE , vol.33 , Issue.9 , pp. 577-591
    • Bellon, S.1    Koschke, R.2    Antoniol, O.3    Krinke, J.4    Merlo, E.5
  • 8
    • 53849100860 scopus 로고    scopus 로고
    • The TIL Chairmarks. www.program-tranaformation.org/Sts/TILChairmarks, 2008.
    • (2008) The TIL Chairmarks
  • 9
    • 33646831658 scopus 로고    scopus 로고
    • The TXL source transformation language
    • J.R. Cordy. The TXL source transformation language. In Science of Computer Programming, 61(3):190-210, 2006.
    • (2006) Science of Computer Programming , vol.61 , Issue.3 , pp. 190-210
    • Cordy, J.R.1
  • 10
    • 32344442609 scopus 로고    scopus 로고
    • Practical Language-Independent Detection of Near-Miss Clones
    • J.R. Cordy, T.R. Dean and N. Synytskyy. Practical Language-Independent Detection of Near-Miss Clones. In CASCON, pp. 29-40, 2004.
    • (2004) CASCON , pp. 29-40
    • Cordy, J.R.1    Dean, T.R.2    Synytskyy, N.3
  • 12
    • 0033341958 scopus 로고    scopus 로고
    • Building Documentation Generators
    • A. van Deursen and T. Kuipers. Building Documentation Generators. In ICSM, pp. 40-49, 1999.
    • (1999) ICSM , pp. 40-49
    • van Deursen, A.1    Kuipers, T.2
  • 13
    • 0033308732 scopus 로고    scopus 로고
    • A Language Independent Approach for Detecting Duplicated Code
    • S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
    • (1999) ICSM , pp. 109-118
    • Ducasse, S.1    Rieger, M.2    Demeyer, S.3
  • 14
    • 51149108069 scopus 로고    scopus 로고
    • Clone Detection via Structural Abstraction
    • W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
    • (2007) WCRE , pp. 150-159
    • Evans, W.1    Fraser, C.2
  • 16
    • 0003838454 scopus 로고
    • An Algorithm for Differential File Comparison
    • Technical Report 41, Bell Laboratories
    • J. W. Hunt and M. D. McIlroy. An Algorithm for Differential File Comparison. Technical Report 41, Bell Laboratories, 1976.
    • (1976)
    • Hunt, J.W.1    McIlroy, M.D.2
  • 17
    • 0017492836 scopus 로고
    • A Fast Algorithm for Computing Longest Common Subsequences
    • 350-353
    • J. W. Hunt and T. G. Szymanski. A Fast Algorithm for Computing Longest Common Subsequences. Comm. ACM. 20(5):350-353, 1977.
    • (1977) Comm. ACM , vol.20 , Issue.5
    • Hunt, J.W.1    Szymanski, T.G.2
  • 18
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
    • L. Jiang, G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
    • (2007) ICSE , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 19
    • 53849147395 scopus 로고
    • Visualizing Textual Redundancy in Legacy Source
    • J. Johnson. Visualizing Textual Redundancy in Legacy Source. In CASCON, pp. 171-183, 1994.
    • (1994) CASCON , pp. 171-183
    • Johnson, J.1
  • 20
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
    • T Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
    • (2002) IEEE TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 21
    • 34548718935 scopus 로고    scopus 로고
    • Cloning Considered Harmful Considered Harmful
    • C. Kapser and M. Godfrey. "Cloning Considered Harmful" Considered Harmful. In WCRE, pp. 19-28, 2006.
    • (2006) WCRE , pp. 19-28
    • Kapser, C.1    Godfrey, M.2
  • 22
    • 33646429779 scopus 로고    scopus 로고
    • Supporting the Analysis of Clones in Software Systems: A Case Study
    • C. Kapser and M. Godfrey. Supporting the Analysis of Clones in Software Systems: A Case Study. JSME: Research and Practice, 18(2):61-82, 2006.
    • (2006) JSME: Research and Practice , vol.18 , Issue.2 , pp. 61-82
    • Kapser, C.1    Godfrey, M.2
  • 23
    • 32344450436 scopus 로고    scopus 로고
    • An Empirical Study of Code Clone Genealogies
    • M. Kim and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187-196, 2005.
    • (2005) FSE , pp. 187-196
    • Kim, M.1    Murphy, G.2
  • 24
    • 34948876329 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Suffix Trees
    • R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
    • (2006) WCRE , pp. 253-262
    • Koschke, R.1    Falke, R.2    Frenzel, P.3
  • 25
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
    • Z. Li, S. Lu, S. Myagmar and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3): 176-192, 2006.
    • (2006) IEEE TSE , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 26
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
    • J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM, pp. 244-253, 1996.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 27
    • 0034770585 scopus 로고    scopus 로고
    • Generating Robust Parsers using Island Grammars
    • L. Moonen. Generating Robust Parsers using Island Grammars. In WCRE, pp. 13-22, 2001.
    • (2001) WCRE , pp. 13-22
    • Moonen, L.1
  • 28
    • 70849123239 scopus 로고    scopus 로고
    • A Survey on Software Clone Detection Reseairh
    • Queen's University, 115 pp
    • C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Reseairh. School of Computing TR 2007-541, Queen's University, 115 pp., 2007.
    • (2007) School of Computing TR 2007-541
    • Roy, C.K.1    Cordy, J.R.2
  • 29
    • 71149091724 scopus 로고    scopus 로고
    • Scenario-Based Comparison of Clone Detection Techniques
    • C.K. Roy and J.R. Cordy. Scenario-Based Comparison of Clone Detection Techniques. In ICPC, 10 pp., 2008.
    • ICPC , vol.10 , pp. 2008
    • Roy, C.K.1    Cordy, J.R.2
  • 30
    • 27744514010 scopus 로고    scopus 로고
    • Evaluating Clone Detection Techniques
    • F.V. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques. In ELISA, 12 pp., 2003.
    • ELISA , vol.12 , pp. 2003
    • Rysselberghe, F.V.1    Demeyer, S.2
  • 31
    • 34248359450 scopus 로고    scopus 로고
    • Phoenix-Based Clone Detection Using Suffix Trees
    • R. Tairas and J. Gray. Phoenix-Based Clone Detection Using Suffix Trees. In ACM-SE, pp. 679-684, 2006.
    • (2006) ACM-SE , pp. 679-684
    • Tairas, R.1    Gray, J.2
  • 32
    • 84948985305 scopus 로고    scopus 로고
    • On Detection of Gapped Code Clones Using Gap Locations
    • Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. On Detection of Gapped Code Clones Using Gap Locations. In APSEC, pp. 327-336, 2002.
    • (2002) APSEC , pp. 327-336
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 33
    • 33847207801 scopus 로고    scopus 로고
    • Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments
    • R. Wettel and R. Marinescu. Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments. In SYNASC, 8 pp., 2005.
    • SYNASC , vol.8 , pp. 2005
    • Wettel, R.1    Marinescu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.