-
1
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
In L. Wills, P. Newcomb, & E. Chikofsky (Eds.)
-
Baker, B. S. (1995). On finding duplication and near-duplication in large software systems. In L. Wills, P. Newcomb, & E. Chikofsky (Eds.), Proceedings of WCRE (pp. 86-95).
-
(1995)
Proceedings of WCRE
, pp. 86-95
-
-
Baker, B.S.1
-
2
-
-
0033353188
-
Measuring clone based reengineering opportunities
-
IEEE Computer Society Press
-
Balazinska, M., Merlo, E. M., Dagenais, M., Lague, B., & Kontogiannis, K. (1999). Measuring clone based reengineering opportunities. In IEEE symposium on software metrics (pp. 292-303). IEEE Computer Society Press.
-
(1999)
IEEE Symposium On Software Metrics
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.M.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
3
-
-
0034503791
-
Advanced clone-analysis to support object-oriented system refactoring
-
IEEE Computer Society Press
-
Balazinska, M., Merlo, E., Dagenais, M., Lague, B., & Kontogiannis, K. (2000). Advanced clone-analysis to support object-oriented system refactoring. In WCRE (pp. 98-107). IEEE Computer Society Press.
-
(2000)
In WCRE
, pp. 98-107
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
4
-
-
0032311601
-
Clone detection using abstract syntax trees
-
In T. M. Koshgoftaar & K. Bennett (Eds.)
-
Baxter, I. D., Yahin, A., Moura, L., Sant'Anna, M., & Bier, L. (1998). Clone detection using abstract syntax trees. In T. M. Koshgoftaar & K. Bennett (Eds.), ICSM, (pp. 368-378).
-
(1998)
ICSM
, pp. 368-378
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
5
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Bellon, S., Koschke, R., Antoniol, G., Krinke, J., & Merlo, E. (2007). Comparison and evaluation of clone detection tools. IEEE Computer Society Transactions on Software Engineering, 33, 577-591.
-
(2007)
IEEE Computer Society Transactions On Software Engineering
, vol.33
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
6
-
-
0033691587
-
A compression algorithm for dna sequences and its applications in genome comparison
-
New York, NY, USA: ACM. doi:10.1145/332306.332352
-
Chen, X., Kwong, S., & Li, M. (2000) A compression algorithm for dna sequences and its applications in genome comparison. In RECOMB'00: Proceedings of the fourth annual international conference on computational molecular biology (p. 107). New York, NY, USA: ACM. doi:10.1145/332306.332352.
-
(2000)
RECOMB'00: Proceedings of the Fourth Annual International Conference On Computational Molecular Biology
, pp. 107
-
-
Chen, X.1
Kwong, S.2
Li, M.3
-
7
-
-
3042606353
-
-
doi:10.1109/TIT.2004.830793
-
Chen, X., Francia, B., Li, M., Mckinnon, B., & Seker, A. (2004). Shared information and program plagiarism detection. Transactions on Information Theory, 50(7), 1545-1551. doi:10.1109/TIT.2004.830793.
-
(2004)
Shared Information and Program Plagiarism Detection. Transactions On Information Theory
, vol.50
, Issue.7
, pp. 1545-1551
-
-
Chen, X.1
Francia, B.2
Li, M.3
McKinnon, B.4
Seker, A.5
-
8
-
-
34147120474
-
A note on two problems in connexion with graphs
-
Dijkstra, E. W. (1959). A note on two problems in connexion with graphs. Numerische Mathematik, 1, 269-271.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
9
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
Washington, DC, USA: IEEE Computer Society
-
Ducasse, S., Rieger, M., & Demeyer, S. (1999). A language independent approach for detecting duplicated code. In ICSM'99: Proceedings of the IEEE international conference on software maintenance (p. 109). Washington, DC, USA: IEEE Computer Society.
-
(1999)
ICSM'99: Proceedings of the IEEE International Conference On Software Maintenance
, pp. 109
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
10
-
-
51149108069
-
Clone detection via structural abstraction
-
Evans, W. S., Fraser, C. W., & Ma, F. (2007). Clone detection via structural abstraction. In WCRE (pp. 150-159).
-
(2007)
In WCRE
, pp. 150-159
-
-
Evans, W.S.1
Fraser, C.W.2
Ma, F.3
-
11
-
-
56749179725
-
Empirical evaluation of clone detection using syntax suffix trees
-
doi:10.1007/s10664-008-9073-9
-
Falke, R., Koschke, R., & Frenzel, P. (2008). Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering, 13(6), 601-643. doi:10.1007/s10664-008-9073-9.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 601-643
-
-
Falke, R.1
Koschke, R.2
Frenzel, P.3
-
12
-
-
51149121673
-
Extending the reflection method for consolidating software variants into product lines
-
IEEE Computer Society Press
-
Frenzel, P., Koschke, R., Breu, A. P. J., & Angstmann, K. (2007). Extending the reflection method for consolidating software variants into product lines. InWCRE (pp. 160-169). IEEE Computer Society Press.
-
(2007)
InWCRE
, pp. 160-169
-
-
Frenzel, P.1
Koschke, R.2
Breu, A.P.J.3
Angstmann, K.4
-
13
-
-
11144222932
-
Aries: Refactoring support environment based on code clone analysis
-
Higo, Y., Kamiya, T., Kusumoto, S., & Inoue, K. (2004). Aries: Refactoring support environment based on code clone analysis. In IASTED Conference on software engineering and applications (pp. 222-229).
-
(2004)
In IASTED Conference On Software Engineering and Applications
, pp. 222-229
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
14
-
-
34347383992
-
Method and implementation for investigating code clones in a software system
-
Higo, Y., Kamiya, T., Kusumoto, S., & Inoue, K. (2007). Method and implementation for investigating code clones in a software system. Information and Software Technology, 49(9-10), 985-998.
-
(2007)
Information and Software Technology
, vol.49
, Issue.9-10
, pp. 985-998
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
15
-
-
72349084213
-
Kclone: A proposed approach to fast precise code clone detection
-
Jia, Y., Binkley, D., Harman, M., Krinke, J., & Matsushita, M. (2009) Kclone: A proposed approach to fast precise code clone detection. In Proceedings of CSMR'09 (pp. 12-16).
-
(2009)
In Proceedings of CSMR'09
, pp. 12-16
-
-
Jia, Y.1
Binkley, D.2
Harman, M.3
Krinke, J.4
Matsushita, M.5
-
16
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
Kamiya, T., Kusumoto, S., & Inoue, K. (2002). CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Computer Society Transactions on Software Engineering, 28(7), 654-670.
-
(2002)
IEEE Computer Society Transactions On Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
17
-
-
78650667803
-
Subjectivity in clone judgment: Can we ever agree?
-
No. 06301
-
Kapser, C., Anderson, P., Godfrey, M., Koschke, R., Rieger, M., van Rysselberghe, F., & Weißgerber, P. (2007). Subjectivity in clone judgment: Can we ever agree? In Duplication, redundancy, and similarity in software, dagstuhl seminar proceedings, No. 06301.
-
(2007)
Duplication, Redundancy, and Similarity In Software, Dagstuhl Seminar Proceedings
-
-
Kapser, C.1
Anderson, P.2
Godfrey, M.3
Koschke, R.4
Rieger, M.5
van Rysselberghe, F.6
Weißgerber, P.7
-
18
-
-
79952815653
-
A taxonomy of clones in source code: The re-engineers most wanted list
-
Kapser, C. J., & Godfrey, M. W. (2003a) A taxonomy of clones in source code: The re-engineers most wanted list. In Proceedings of IWDSC'03.
-
(2003)
Proceedings of IWDSC'03
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
20
-
-
33646429779
-
Supporting the analysis of clones in software systems: Research articles
-
Kapser, C. J., & Godfrey, M. W. (2006). Supporting the analysis of clones in software systems: Research articles. Journal of Software Maintenance and Evolution, 18(2), 61-82.
-
(2006)
Journal of Software Maintenance and Evolution
, vol.18
, Issue.2
, pp. 61-82
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
21
-
-
67649933675
-
Survey of research on software clones
-
In R. Koschke, E. Merlo, & A. Walenstein (Eds.), Dagstuhl seminar proceedings
-
Koschke, R. (2007). Survey of research on software clones. In R. Koschke, E. Merlo, & A. Walenstein (Eds.), Duplication, redundancy, and similarity in software, Dagstuhl seminar proceedings.
-
(2007)
Duplication, Redundancy, and Similarity In Software
-
-
Koschke, R.1
-
24
-
-
0032316684
-
Intermediate representations for reverse engineering
-
IEEE Computer Society Press
-
Koschke, R., Girard, J. F., Würthner, M. (1998). Intermediate representations for reverse engineering. In WCRE (pp. 241-250). IEEE Computer Society Press.
-
(1998)
WCRE
, pp. 241-250
-
-
Koschke, R.1
Girard, J.F.2
-
25
-
-
70349499350
-
Extending the reflexion method for consolidating software variants into product lines
-
Koschke, R., Frenzel, P., Breu, A. P., & Angstmann, K. (2009). Extending the reflexion method for consolidating software variants into product lines. Software Quality Journal, 17(4), 331-366.
-
(2009)
Software Quality Journal
, vol.17
, Issue.4
, pp. 331-366
-
-
Koschke, R.1
Frenzel, P.2
Breu, A.P.3
Angstmann, K.4
-
26
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
Krinke, J. (2001). Identifying similar code with program dependence graphs. In WCRE (pp. 301-309).
-
(2001)
In WCRE
, pp. 301-309
-
-
Krinke, J.1
-
27
-
-
10644294829
-
The similarity metric
-
Li, M., Chen, X., Li, X., Ma, B., & Vitányi, P. M. B. (2004). The similarity metric. Transactions on Information Theory, 50(12), 3250-3264.
-
(2004)
Transactions On Information Theory
, vol.50
, Issue.12
, pp. 3250-3264
-
-
Li, M.1
Chen, X.2
Li, X.3
Ma, B.4
-
28
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
IEEE Computer Society
-
Mayrand, J., Leblanc, C., & Merlo, E. (1996). Experiment on the automatic detection of function clones in a software system using metrics. In ICSM (p. 244). IEEE Computer Society.
-
(1996)
ICSM
, pp. 244
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
29
-
-
50249120730
-
Supporting the grow-and-prune model in software product lines evolution using clone detection
-
IEEE Computer Society Press
-
Mende, T., Beckwermert, F., Koschke, R., & Meier, G. (2008). Supporting the grow-and-prune model in software product lines evolution using clone detection. In European Conference on Software Maintenance and Reengineering (pp. 163-172). IEEE Computer Society Press.
-
(2008)
European Conference On Software Maintenance and Reengineering
, pp. 163-172
-
-
Mende, T.1
Beckwermert, F.2
Koschke, R.3
Meier, G.4
-
30
-
-
63849324240
-
An evaluation of code similarity identification for the growand-prunemodel
-
Mende, T., Koschke, R., & Beckwermert, F. (2009). An evaluation of code similarity identification for the growand-prunemodel. Journal of SoftwareMaintenance andEvolution:Research and Practice, 21(2), 143-169.
-
(2009)
Journal of SoftwareMaintenance AndEvolution:Research and Practice
, vol.21
, Issue.2
, pp. 143-169
-
-
Mende, T.1
Koschke, R.2
Beckwermert, F.3
-
31
-
-
0030679482
-
Linear-time, incremental hierarchy inference for compression
-
Washington, DC, USA: IEEE Computer Society
-
Nevill-Manning, C. G., & Witten, I. H. (1997). Linear-time, incremental hierarchy inference for compression. In DCC (pp. 3-11). Washington, DC, USA: IEEE Computer Society.
-
(1997)
DCC
, pp. 3-11
-
-
Nevill-Manning, C.G.1
Witten, I.H.2
-
34
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
doi: 10.1016/j.scico.2009.02.007, accepted for publication
-
Roy, C. K., Cordy, J. R., & Koschke, R. (2009) Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Journal of Science of Computer Programming doi: 10.1016/j.scico.2009.02.007, accepted for publication.
-
(2009)
Journal of Science of Computer Programming
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
35
-
-
0001122858
-
The tree-to-tree editing problem
-
doi: 10.1016/0020-0190(77)90064-3
-
Selkow, S. M. (1977). The tree-to-tree editing problem. Information Processing Letters, 6(6), 184-186. doi: 10.1016/0020-0190(77)90064-3.
-
(1977)
Information Processing Letters
, vol.6
, Issue.6
, pp. 184-186
-
-
Selkow, S.M.1
-
36
-
-
81255204774
-
Fast parallel algorithms for the unit cost editing distance between trees
-
New York, NY, USA: ACM. doi:10.1145/72935.72949
-
Shasha, D., & Zhang, K. (1989). Fast parallel algorithms for the unit cost editing distance between trees. In SPAA'89: Proceedings of the first annual ACM symposium on parallel algorithms and architectures (pp. 117-126). New York, NY, USA: ACM. doi:10.1145/72935.72949.
-
(1989)
SPAA'89: Proceedings of the First Annual ACM Symposium On Parallel Algorithms and Architectures
, pp. 117-126
-
-
Shasha, D.1
Zhang, K.2
-
38
-
-
0018491659
-
The tree-to-tree correction problem
-
doi:10.1145/322139.322143
-
Tai, K. C. (1979). The tree-to-tree correction problem. J ACM, 26(3), 422-433. doi:10.1145/322139.322143.
-
(1979)
J ACM
, vol.26
, Issue.3
, pp. 422-433
-
-
Tai, K.C.1
-
39
-
-
72349089357
-
An assessment of type-3 clones as detected by state-of-the-art tools
-
IEEE Computer Society Press
-
Tiarks, R., Koschke, R., & Falke, R. (2009). An assessment of type-3 clones as detected by state-of-the-art tools. In Workshop source code analysis and manipulation (pp. 67-76). IEEE Computer Society Press.
-
(2009)
Workshop Source Code Analysis and Manipulation
, pp. 67-76
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
-
41
-
-
79952816908
-
-
Dagstuhl Seminar Proceedings, No. 06301
-
Walenstein, A. (2007). Code clones: Reconsidering terminology. In Duplication, Redundancy, and Similarity in Software, Dagstuhl Seminar Proceedings, No. 06301.
-
(2007)
Code Clones: Reconsidering Terminology
-
-
Walenstein, A.1
-
42
-
-
84944630622
-
Problems creating task-relevant clone detection reference data
-
IEEE Computer Society Press
-
Walenstein, A., Jyoti, N., Li, J., Yang, Y., & Lakhotia, A. (2003). Problems creating task-relevant clone detection reference data. In WCRE. IEEE Computer Society Press.
-
(2003)
WCRE
-
-
Walenstein, A.1
Jyoti, N.2
Li, J.3
Yang, Y.4
Lakhotia, A.5
-
43
-
-
67651248769
-
-
Walenstein, A., El-Ramly, M., Cordy, J. R., SW, Mahdavi, K., Pizka, M., Ramalingam, G., and von Gudenberg, J. W. (2007a). Similarity in programs. In Duplication, redundancy, and similarity in software.
-
(2007)
Similarity In Programs. In Duplication, Redundancy, and Similarity In Software
-
-
Walenstein, A.1
El-Ramly, M.2
Cordy, J.R.3
Mahdavi, K.4
Pizka, M.5
Ramalingam, G.6
von Gudenberg, J.W.7
-
44
-
-
84875656430
-
Exploiting similarity between variants to defeat malware
-
Walenstein, A., Venable, M., Hayes, M., Thompson, C., & Lakhotia, A. (2007b) Exploiting similarity between variants to defeat malware. In Proceedings of BlackHat 2007 DC Briefings.
-
(2007)
Proceedings of BlackHat 2007 DC Briefings
-
-
Walenstein, A.1
Venable, M.2
Hayes, M.3
Thompson, C.4
Lakhotia, A.5
-
45
-
-
0029267579
-
Algorithms for the constrained editing distance between ordered labeled trees and related problems
-
doi:10.1016/0031-3203(94)00109-Y
-
Zhang, K. (1995). Algorithms for the constrained editing distance between ordered labeled trees and related problems. Pattern Recognition, 28(3), 463-474. doi:10.1016/0031-3203(94)00109-Y.
-
(1995)
Pattern Recognition
, vol.28
, Issue.3
, pp. 463-474
-
-
Zhang, K.1
-
46
-
-
0024889169
-
Simple fast algorithms for the editing distance between trees and related problems
-
doi:10.1137/0218082
-
Zhang, K., & Shasha, D. (1989). Simple fast algorithms for the editing distance between trees and related problems. SIAM Journal on Scientific Computing, 18(6), 1245-1262. doi:10.1137/0218082.
-
(1989)
SIAM Journal On Scientific Computing
, vol.18
, Issue.6
, pp. 1245-1262
-
-
Zhang, K.1
Shasha, D.2
-
47
-
-
0017493286
-
A universal algorithm for sequential data compression
-
URL
-
Ziv, J., & Lempel, A. (1977). A universal algorithm for sequential data compression. Transactions on Information Theory, 23(3), 337-343. URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1055714.
-
(1977)
Transactions On Information Theory
, vol.23
, Issue.3
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
|