-
1
-
-
33749047026
-
Cloning by Accident: An Empirical Study of Source Code Cloning Across Software Systems
-
R. Al-Ekram, C. Kapser and M. Godfrey. Cloning by Accident: An Empirical Study of Source Code Cloning Across Software Systems. In ISESE, pp. 376-385, 2005.
-
(2005)
ISESE
, pp. 376-385
-
-
Al-Ekram, R.1
Kapser, C.2
Godfrey, M.3
-
2
-
-
0036783855
-
Analyzing Cloning Evolution in the Linux Kernel
-
G. Antoniol, U. Villano, E. Merlo and M.D. Penta. Analyzing Cloning Evolution in the Linux Kernel. Information and Software Technology, 44 (13):755-765, 2002.
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Penta, M.D.4
-
3
-
-
34547677997
-
How Clones are Maintained: An Empirical Study
-
L. Aversano, L. Cerulo, and Massimiliano Di Penta. How Clones are Maintained: An Empirical Study. In CSMR, pp. 81-90, 2007.
-
(2007)
CSMR
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Di Penta, M.3
-
5
-
-
34548228440
-
Comparison and Evaluation of Clone Detection Tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering, 33(9):577-591, 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
6
-
-
77951101478
-
An Evaluation of Duplicate Code Detection using Anti-unification
-
P. Bulychev and M. Minea. An Evaluation of Duplicate Code Detection using Anti-unification. In IWSC, pp. 22-27, 2009.
-
(2009)
IWSC
, pp. 22-27
-
-
Bulychev, P.1
Minea, M.2
-
8
-
-
56749132226
-
"Cloning Considered Harmful" Considered Harmful: Patterns of Cloning in Software
-
C. Kapser and M.W. Godfrey. "Cloning Considered Harmful" Considered Harmful: Patterns of Cloning in Software. Empirical Software Engineering, 13(6):645-692 (2008).
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.W.2
-
9
-
-
11244324147
-
Toward a Taxonomy of Clones in Source Code: A Case Study
-
C. Kapser and M. Godfrey. Toward a Taxonomy of Clones in Source Code: A Case Study. In ELISA, pp. 67-78, 2003.
-
(2003)
ELISA
, pp. 67-78
-
-
Kapser, C.1
Godfrey, M.2
-
10
-
-
32344450436
-
An Empirical Study of Code Clone Genealogies
-
M. Kim, V. Sazawal, D. Notkin and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187-196, 2005.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
11
-
-
51149095379
-
A Study of Consistent and Inconsistent Changes to Code Clones
-
J. Krinke. A Study of Consistent and Inconsistent Changes to Code Clones. In WCRE, pp. 170-178, 2007.
-
(2007)
WCRE
, pp. 170-178
-
-
Krinke, J.1
-
13
-
-
77950123080
-
An Investigation of Cloning in Web Applications
-
D. C. Rajapakse and S. Jarzabek. An Investigation of Cloning in Web Applications. In WWW, pp. 924-925, 2005.
-
(2005)
WWW
, pp. 924-925
-
-
Rajapakse, D.C.1
Jarzabek, S.2
-
14
-
-
18144389452
-
Insights into System-Wide Code Duplication
-
M. Rieger, S. Ducasse and M. Lanza. Insights into System-Wide Code Duplication. In WCRE, pp. 100-109, 2004.
-
(2004)
WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
16
-
-
77954732982
-
Near-miss Function Clones in Open Source Software: An Empirical Study
-
online October in press
-
C.K. Roy and J.R. Cordy. Near-miss Function Clones in Open Source Software: An Empirical Study. Journal of Software Maintenance and Evolution, 25 pp. (online October 2009, in press)
-
(2009)
Journal of Software Maintenance and Evolution
-
-
Roy, C.K.1
Cordy, J.R.2
-
18
-
-
57749209364
-
An Empirical Study of Function Clones in Open Source Software Systems
-
C.K. Roy and J.R. Cordy. An Empirical Study of Function Clones in Open Source Software Systems. In WCRE, pp. 81-90, 2008.
-
(2008)
WCRE
, pp. 81-90
-
-
Roy, C.K.1
Cordy, J.R.2
-
19
-
-
71149111492
-
Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
-
C.K. Roy and J.R. Cordy. NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, pp. 172-181, 2008.
-
(2008)
ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy NiCad, J.R.2
-
20
-
-
64549135034
-
Comparison and Evaluation of Clone Detection Techniques and Tools: A Qualitative Approach
-
C.K. Roy, J.R. Cordy and R. Koschke. Comparison and Evaluation of Clone Detection Techniques and Tools: A Qualitative Approach. Science of Computer Programming, 74(7):470-495, 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
22
-
-
69949085058
-
A Mutation / Injection-based Automatic Framework for Evaluating Clone Detection Tools
-
C.K. Roy and J.R. Cordy. A Mutation / Injection-based Automatic Framework for Evaluating Clone Detection Tools. In Mutation'09, pp. 157-166, 2009.
-
(2009)
Mutation'09
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
23
-
-
18744370756
-
Software Analysis by Code Clones in Open Source Software
-
S. Uchida, A. Monden, N. Ohsugi and T. Kamiya. Software Analysis by Code Clones in Open Source Software. Journal of Computer Information Systems, XLV(3):1-11, 2005.
-
(2005)
Journal of Computer Information Systems
, vol.45
, Issue.3
, pp. 1-11
-
-
Uchida, S.1
Monden, A.2
Ohsugi, N.3
Kamiya, T.4
-
24
-
-
84948459152
-
Maintenance Support Environment Based on Code Clone Analysis
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. Gemini: Maintenance Support Environment Based on Code Clone Analysis. In METRICS, pp. 67-76, 2002.
-
(2002)
METRICS
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue Gemini, K.4
|