-
1
-
-
56749132226
-
'Cloning Considered Harmful' considered harmful: Patterns of cloning in software
-
Kapser C, Godfrey MW. 'Cloning Considered Harmful' considered harmful: Patterns of cloning in software. Empirical Software Engineering 2008; 13(6): 645-692.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.W.2
-
2
-
-
34547677997
-
How clones are maintained: An empirical study
-
Aversano L, Cerulo L, Di Penta M. How clones are maintained: An empirical study. CSMR, 2007; 81-90.
-
(2007)
CSMR
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Di Penta, M.3
-
3
-
-
32344450436
-
An empirical study of code clone genealogies
-
Kim M, Sazawal V, Notkin D, Murphy G. An empirical study of code clone genealogies. FSE, 2005; 187-196.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
5
-
-
53849147395
-
Visualizing textual redundancy in legacy source
-
Johnson J. Visualizing textual redundancy in legacy source. CASCON, 1994; 171-183.
-
(1994)
CASCON
, pp. 171-183
-
-
Johnson, J.1
-
6
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Li Z, Lu S, Myagmar S, Zhou Y. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering 2006; 32(3): 176-192.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
7
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
Mayrand J, Leblanc C, Merlo E. Experiment on the automatic detection of function clones in a software system using metrics. ICSM, 1996; 244-253.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
10
-
-
64549135034
-
Comparison and evaluation of clone detection techniques and tools: A qualitative approach
-
Roy CK, Cordy JR, Koschke R. Comparison and evaluation of clone detection techniques and tools: A qualitative approach. Science of Computer Programming 2009; 74: 470-495.
-
(2009)
Science of Computer Programming
, vol.74
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
11
-
-
71149091724
-
Scenario-based comparison of clone detection techniques
-
Roy CK, Cordy JR. Scenario-based comparison of clone detection techniques. ICPC, 2008; 153-162.
-
(2008)
ICPC
, pp. 153-162
-
-
Roy, C.K.1
Cordy, J.R.2
-
13
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E. Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering 2007; 33(9): 577-591.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
14
-
-
56749179725
-
Empirical evaluation of clone detection using syntax suffix trees
-
Falke R, Koschke R, Frenzel P. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering 2008; 13: 601-643.
-
(2008)
Empirical Software Engineering
, vol.13
, pp. 601-643
-
-
Falke, R.1
Koschke, R.2
Frenzel, P.3
-
15
-
-
34548812113
-
Evaluating clone detection tools for use during preventative maintenance
-
Burd E, Bailey J. Evaluating clone detection tools for use during preventative maintenance. SCAM, 2002; 36-43.
-
(2002)
SCAM
, pp. 36-43
-
-
Burd, E.1
Bailey, J.2
-
16
-
-
27744514010
-
Evaluating clone detection techniques
-
Rysselberghe F, Demeyer S. Evaluating clone detection techniques. ELISA, 2003; 12.
-
(2003)
ELISA
, pp. 12
-
-
Rysselberghe, F.1
Demeyer, S.2
-
17
-
-
15844401604
-
Evaluating clone detection techniques from a refactoring perspective
-
Rysselberghe F, Demeyer S. Evaluating clone detection techniques from a refactoring perspective. ASE, 2004; 336-339.
-
(2004)
ASE
, pp. 336-339
-
-
Rysselberghe, F.1
Demeyer, S.2
-
18
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
Krinke J. A study of consistent and inconsistent changes to code clones. WCRE, 2007; 170-178.
-
(2007)
WCRE
, pp. 170-178
-
-
Krinke, J.1
-
19
-
-
11244324147
-
Toward a taxonomy of clones in source code: A case study
-
Kapser C, Godfrey M. Toward a taxonomy of clones in source code: A case study. ELISA, 2003; 67-78.
-
(2003)
ELISA
, pp. 67-78
-
-
Kapser, C.1
Godfrey, M.2
-
20
-
-
33646429779
-
Supporting the analysis of clones in software systems: A case study
-
Kapser C, Godfrey M. Supporting the analysis of clones in software systems: A case study. JSME: Research and Practice 2006; 18(2): 61-82.
-
(2006)
JSME: Research and Practice
, vol.18
, Issue.2
, pp. 61-82
-
-
Kapser, C.1
Godfrey, M.2
-
21
-
-
0036783855
-
Analyzing cloning evolution in the Linux Kernel
-
Antoniol G, Villano U, Merlo E, Di Penta M. Analyzing cloning evolution in the Linux Kernel. Information and Software Technology 2002; 44(13): 755-765.
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Di Penta, M.4
-
22
-
-
77950123080
-
An investigation of cloning in web applications
-
Rajapakse DC, Jarzabek S. An investigation of cloning in web applications. WWW, 2005; 924-925.
-
(2005)
WWW
, pp. 924-925
-
-
Rajapakse, D.C.1
Jarzabek, S.2
-
23
-
-
71149111492
-
NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
Roy CK, Cordy JR. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. ICPC, 2008; 172-181.
-
(2008)
ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
24
-
-
57749209364
-
An empirical study of function clones in open source software systems
-
Roy CK, Cordy JR. An empirical study of function clones in open source software systems. WCRE, 2008; 81-90.
-
(2008)
WCRE
, pp. 81-90
-
-
Roy, C.K.1
Cordy, J.R.2
-
26
-
-
77950138627
-
-
Abyss. Available at: 7 December
-
Abyss. Available at: http://abyss.sourceforge.net/ [7 December 2007].
-
(2007)
-
-
-
27
-
-
77950164383
-
-
3 February
-
Gzip-1.2.4. Available at: http://www.gzip.org/ [3 February 2008].
-
(2008)
-
-
-
28
-
-
77950103932
-
-
2 April
-
Apache-httpd. Available at: http://httpd.apache.org/ [2 April 2008].
-
(2008)
-
-
-
29
-
-
77950177638
-
-
10 March
-
Linux-2.6.24.2. Available at: http://www.linux.org/ [10 March 2008].
-
(2008)
-
-
-
30
-
-
77950150720
-
-
25 January
-
JHotDraw. Available at: http://www.jhotdraw.org/ [25 January 2006].
-
(2006)
-
-
-
31
-
-
77950118660
-
-
5 February
-
The SOURGEFORGE.NET. Available at: http://sourceforge.net/ [5 February 2009].
-
(2009)
-
-
-
32
-
-
69949085058
-
A mutation/injection-based automatic framework for evaluating clone detection tools
-
Roy CK, Cordy JR. A mutation/injection-based automatic framework for evaluating clone detection tools. Mutation'09, 2009; 157-166.
-
(2009)
Mutation'09
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
33
-
-
33749047026
-
Cloning by accident: An empirical study of source code cloning across software systems
-
Al-Ekram R, Kapser C, Godfrey M. Cloning by accident: An empirical study of source code cloning across software systems. ISESE, 2005; 376-385.
-
(2005)
ISESE
, pp. 376-385
-
-
Al-Ekram, R.1
Kapser, C.2
Godfrey, M.3
-
34
-
-
84948459152
-
Gemini: Maintenance support environment based on code clone analysis
-
Ueda Y, Kamiya T, Kusumoto S, Inoue K. Gemini: Maintenance support environment based on code clone analysis. METRICS, 2002; 67-76.
-
(2002)
METRICS
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
35
-
-
18144389452
-
Insights into system-wide code duplication
-
Rieger M, Ducasse S, Lanza M. Insights into system-wide code duplication. WCRE, 2004; 100-109.
-
(2004)
WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
36
-
-
53849102795
-
Identifying clones in the Linux Kernel
-
Casazza G, Antoniol G, Villano U, Merlo E, Di Penta M. Identifying clones in the Linux Kernel. SCAM, 2001; 90-97.
-
(2001)
SCAM
, pp. 90-97
-
-
Casazza, G.1
Antoniol, G.2
Villano, U.3
Merlo, E.4
Di Penta, M.5
-
37
-
-
57849157446
-
A methodology to assess the impact of source code flaws in changeability, and its application to clones
-
Lozano A. A methodology to assess the impact of source code flaws in changeability, and its application to clones. ICSM Doctoral Symposium, 2008; 424-427.
-
(2008)
ICSM Doctoral Symposium
, pp. 424-427
-
-
Lozano, A.1
-
38
-
-
47749155579
-
A framework for studying clones in large software systems
-
Jiang Z, Hassan A. A framework for studying clones in large software systems. SCAM, 2007; 203-212.
-
(2007)
SCAM
, pp. 203-212
-
-
Jiang, Z.1
Hassan, A.2
-
39
-
-
18744370756
-
Software analysis by code clones in open source software
-
Uchida S, Monden A, Ohsugi N, Kamiya T. Software analysis by code clones in open source software. Journal of Computer Information Systems 2005; XLV(3): 1-11.
-
(2005)
Journal of Computer Information Systems
, vol.45
, Issue.3
, pp. 1-11
-
-
Uchida, S.1
Monden, A.2
Ohsugi, N.3
Kamiya, T.4
-
40
-
-
77950155071
-
KClone: A proposed approach to fast precise code clone detection
-
Jia Y, Binkley D, Harman M, Krinke J, Matsushita M. KClone: A proposed approach to fast precise code clone detection. IWSC, 2009; 5.
-
(2009)
IWSC
, pp. 5
-
-
Jia, Y.1
Binkley, D.2
Harman, M.3
Krinke, J.4
Matsushita, M.5
|