메뉴 건너뛰기




Volumn , Issue , 2011, Pages 183-192

Software bertillonage: Finding the provenance of an entity

Author keywords

bertillonage; code evolution; code fingerprints; provenance

Indexed keywords

19TH CENTURY; BERTILLONAGE; CODE EVOLUTION; CODE FINGERPRINTS; DEPLOYED SOFTWARE; DEVELOPMENT TEAMS; ETHICAL CONCERNS; FACT EXTRACTION; FLOW GRAPH; FORENSIC ANALYSIS; HISTORICAL ANALYSIS; JAVA APPLICATIONS; JAVA LIBRARY; OPEN SOURCES; PROVENANCE; SIGNATURE-MATCHING; SOFTWARE ASSETS; SOFTWARE CLONE DETECTION; SOFTWARE ENTITIES; SOURCE CODES; STRING MATCHING; VERSION INFORMATION;

EID: 79959275002     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985441.1985468     Document Type: Conference Paper
Times cited : (77)

References (16)
  • 4
    • 17644417780 scopus 로고    scopus 로고
    • Using origin analysis to detect merging and splitting of source code entities
    • Feb.
    • M. Godfrey and L. Zou, "Using origin analysis to detect merging and splitting of source code entities," IEEE Transactions on Software Engineering, vol. 31, no. 2, pp. 166-181, Feb. 2005.
    • (2005) IEEE Transactions on Software Engineering , vol.31 , Issue.2 , pp. 166-181
    • Godfrey, M.1    Zou, L.2
  • 5
    • 56349141528 scopus 로고    scopus 로고
    • Is cloned code more stable than non-cloned code?
    • J. Krinke, "Is cloned code more stable than non-cloned code?" in SCAM'08, 2008, pp. 57-66.
    • (2008) SCAM'08 , pp. 57-66
    • Krinke, J.1
  • 6
    • 57849157446 scopus 로고    scopus 로고
    • A methodology to assess the impact of source code flaws in changeability and its application to clones
    • A. Lozano, "A methodology to assess the impact of source code flaws in changeability and its application to clones," in ICSM 08: Proc. of the Int. Conf. of Software Maintenance, 2008, pp. 424-427.
    • ICSM 08: Proc. of the Int. Conf. of Software Maintenance, 2008 , pp. 424-427
    • Lozano, A.1
  • 9
    • 56749132226 scopus 로고    scopus 로고
    • 'Cloning considered harmful' considered harmful: Patterns of cloning in software
    • C. Kapser and M. W. Godfrey, "'Cloning considered harmful' considered harmful: Patterns of cloning in software," Empirical Software Engineering, vol. 13, no. 6, pp. 645-692, 2008.
    • (2008) Empirical Software Engineering , vol.13 , Issue.6 , pp. 645-692
    • Kapser, C.1    Godfrey, M.W.2
  • 10
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," ESEC/FSE, vol. 30, no. 5, pp. 187-196, 2005.
    • (2005) ESEC/FSE , vol.30 , Issue.5 , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3    Murphy, G.4
  • 11
    • 0036648690 scopus 로고    scopus 로고
    • Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue, "Ccfinder: A multilinguistic token-based code clone detection system for large scale source code," IEEE Trans. Software Eng., vol. 28, no. 7, pp. 654-670, 2002.
    • (2002) IEEE Trans. Software Eng. , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 12
    • 34548789572 scopus 로고    scopus 로고
    • Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder
    • S. Livieri, Y. Higo, M. Matsushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder," in ICSE, 2007, pp. 106-115.
    • (2007) ICSE , pp. 106-115
    • Livieri, S.1    Higo, Y.2    Matsushita, M.3    Inoue, K.4
  • 14
    • 33947312500 scopus 로고    scopus 로고
    • Approximate structural context matching: An approach to recommend relevant examples
    • R. Holmes, R. J. Walker, and G. C. Murphy, "Approximate structural context matching: An approach to recommend relevant examples," IEEE Trans. Soft. Eng., vol. 32, no. 12, pp. 952-970, 2006.
    • (2006) IEEE Trans. Soft. Eng. , vol.32 , Issue.12 , pp. 952-970
    • Holmes, R.1    Walker, R.J.2    Murphy, G.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.