-
1
-
-
53849084656
-
-
December, 2007
-
The Abyss: http://abyss.sourceforge.net/ (December, 2007)
-
The Abyss
-
-
-
2
-
-
26044454396
-
Is Mutation an Appropriate Tool for Testing Experiments?
-
J. H. Andrews, L. C. Briand and Y. Labiche. Is Mutation an Appropriate Tool for Testing Experiments? In ICSE, pp. 402-411, 2005.
-
(2005)
ICSE
, pp. 402-411
-
-
Andrews, J.H.1
Briand, L.C.2
Labiche, Y.3
-
3
-
-
0029222025
-
On Finding Duplication and Near-Duplication in Large Software Systems
-
B. Baker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.1
-
4
-
-
37849021096
-
Efficient Token Based Clone Detection with Flexible Tokenization
-
H. Basit, S. Pugliesi, W. Smyth, A. Turpin and S.Jarzabek. Efficient Token Based Clone Detection with Flexible Tokenization. In ESEC/FSE. pp. 513-515, 2007.
-
(2007)
ESEC/FSE
, pp. 513-515
-
-
Basit, H.1
Pugliesi, S.2
Smyth, W.3
Turpin, A.4
Jarzabek, S.5
-
5
-
-
0032311601
-
Clone Detection Using Abstract Syntax Trees
-
I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM, pp. 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Anna, M.4
-
7
-
-
34548228440
-
Comparison and Evaluation of Clone Detection Tools
-
S. Bellon, R. Koschke, O. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, O.3
Krinke, J.4
Merlo, E.5
-
8
-
-
53849100860
-
-
The TIL Chairmarks. www.program-tranaformation.org/Sts/TILChairmarks, 2008.
-
(2008)
The TIL Chairmarks
-
-
-
9
-
-
33646831658
-
The TXL source transformation language
-
J.R. Cordy. The TXL source transformation language. In Science of Computer Programming, 61(3):190-210, 2006.
-
(2006)
Science of Computer Programming
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
10
-
-
32344442609
-
Practical Language-Independent Detection of Near-Miss Clones
-
J.R. Cordy, T.R. Dean and N. Synytskyy. Practical Language-Independent Detection of Near-Miss Clones. In CASCON, pp. 29-40, 2004.
-
(2004)
CASCON
, pp. 29-40
-
-
Cordy, J.R.1
Dean, T.R.2
Synytskyy, N.3
-
11
-
-
0242302679
-
Agile Parsing in TXL
-
T.R. Dean, J.R. Cordy, A.J. Malton and K.A. Schneider. Agile Parsing in TXL. J. ASE, 10(4):311-336, 2003.
-
(2003)
J. ASE
, vol.10
, Issue.4
, pp. 311-336
-
-
Dean, T.R.1
Cordy, J.R.2
Malton, A.J.3
Schneider, K.A.4
-
12
-
-
0033341958
-
Building Documentation Generators
-
A. van Deursen and T. Kuipers. Building Documentation Generators. In ICSM, pp. 40-49, 1999.
-
(1999)
ICSM
, pp. 40-49
-
-
van Deursen, A.1
Kuipers, T.2
-
13
-
-
0033308732
-
A Language Independent Approach for Detecting Duplicated Code
-
S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
-
(1999)
ICSM
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
14
-
-
51149108069
-
Clone Detection via Structural Abstraction
-
W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
-
(2007)
WCRE
, pp. 150-159
-
-
Evans, W.1
Fraser, C.2
-
16
-
-
0003838454
-
An Algorithm for Differential File Comparison
-
Technical Report 41, Bell Laboratories
-
J. W. Hunt and M. D. McIlroy. An Algorithm for Differential File Comparison. Technical Report 41, Bell Laboratories, 1976.
-
(1976)
-
-
Hunt, J.W.1
McIlroy, M.D.2
-
17
-
-
0017492836
-
A Fast Algorithm for Computing Longest Common Subsequences
-
350-353
-
J. W. Hunt and T. G. Szymanski. A Fast Algorithm for Computing Longest Common Subsequences. Comm. ACM. 20(5):350-353, 1977.
-
(1977)
Comm. ACM
, vol.20
, Issue.5
-
-
Hunt, J.W.1
Szymanski, T.G.2
-
18
-
-
34548767669
-
DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
-
L. Jiang, G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
19
-
-
53849147395
-
Visualizing Textual Redundancy in Legacy Source
-
J. Johnson. Visualizing Textual Redundancy in Legacy Source. In CASCON, pp. 171-183, 1994.
-
(1994)
CASCON
, pp. 171-183
-
-
Johnson, J.1
-
20
-
-
0036648690
-
CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
-
T Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
-
(2002)
IEEE TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
21
-
-
34548718935
-
Cloning Considered Harmful Considered Harmful
-
C. Kapser and M. Godfrey. "Cloning Considered Harmful" Considered Harmful. In WCRE, pp. 19-28, 2006.
-
(2006)
WCRE
, pp. 19-28
-
-
Kapser, C.1
Godfrey, M.2
-
22
-
-
33646429779
-
Supporting the Analysis of Clones in Software Systems: A Case Study
-
C. Kapser and M. Godfrey. Supporting the Analysis of Clones in Software Systems: A Case Study. JSME: Research and Practice, 18(2):61-82, 2006.
-
(2006)
JSME: Research and Practice
, vol.18
, Issue.2
, pp. 61-82
-
-
Kapser, C.1
Godfrey, M.2
-
23
-
-
32344450436
-
An Empirical Study of Code Clone Genealogies
-
M. Kim and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187-196, 2005.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Murphy, G.2
-
24
-
-
34948876329
-
Clone Detection Using Abstract Syntax Suffix Trees
-
R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
-
(2006)
WCRE
, pp. 253-262
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
25
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
Z. Li, S. Lu, S. Myagmar and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3): 176-192, 2006.
-
(2006)
IEEE TSE
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
26
-
-
0030407014
-
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
-
J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM, pp. 244-253, 1996.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
27
-
-
0034770585
-
Generating Robust Parsers using Island Grammars
-
L. Moonen. Generating Robust Parsers using Island Grammars. In WCRE, pp. 13-22, 2001.
-
(2001)
WCRE
, pp. 13-22
-
-
Moonen, L.1
-
28
-
-
70849123239
-
A Survey on Software Clone Detection Reseairh
-
Queen's University, 115 pp
-
C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Reseairh. School of Computing TR 2007-541, Queen's University, 115 pp., 2007.
-
(2007)
School of Computing TR 2007-541
-
-
Roy, C.K.1
Cordy, J.R.2
-
29
-
-
71149091724
-
Scenario-Based Comparison of Clone Detection Techniques
-
C.K. Roy and J.R. Cordy. Scenario-Based Comparison of Clone Detection Techniques. In ICPC, 10 pp., 2008.
-
ICPC
, vol.10
, pp. 2008
-
-
Roy, C.K.1
Cordy, J.R.2
-
30
-
-
27744514010
-
Evaluating Clone Detection Techniques
-
F.V. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques. In ELISA, 12 pp., 2003.
-
ELISA
, vol.12
, pp. 2003
-
-
Rysselberghe, F.V.1
Demeyer, S.2
-
31
-
-
34248359450
-
Phoenix-Based Clone Detection Using Suffix Trees
-
R. Tairas and J. Gray. Phoenix-Based Clone Detection Using Suffix Trees. In ACM-SE, pp. 679-684, 2006.
-
(2006)
ACM-SE
, pp. 679-684
-
-
Tairas, R.1
Gray, J.2
-
32
-
-
84948985305
-
On Detection of Gapped Code Clones Using Gap Locations
-
Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. On Detection of Gapped Code Clones Using Gap Locations. In APSEC, pp. 327-336, 2002.
-
(2002)
APSEC
, pp. 327-336
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
33
-
-
33847207801
-
Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments
-
R. Wettel and R. Marinescu. Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments. In SYNASC, 8 pp., 2005.
-
SYNASC
, vol.8
, pp. 2005
-
-
Wettel, R.1
Marinescu, R.2
|