-
3
-
-
34347383992
-
Method and implementation for investigating code clones in a software system
-
DOI 10.1016/j.infsof.2006.10.005, PII S0950584906001443
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Method and Implementation for Investigating Code Clones in a Software System. Information and Software Technology, 49(9-10):985-998, 2007. (Pubitemid 47023145)
-
(2007)
Information and Software Technology
, vol.49
, Issue.9-10
, pp. 985-998
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
4
-
-
56849129297
-
A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system
-
Y. Higo, S. Kusumoto, and K. Inoue. A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system. J. Softw. Maint. Evol.: Res. Pract., 20:435-461, 2008.
-
(2008)
J. Softw. Maint. Evol.: Res. Pract.
, vol.20
, pp. 435-461
-
-
Higo, Y.1
Kusumoto, S.2
Inoue, K.3
-
5
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
DOI 10.1109/ICSE.2007.30, 4222572, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In Proc. of ICSE 2007, pages 96-105, 2007. (Pubitemid 47430645)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
6
-
-
47749155579
-
A framework for studying clones in large software systems
-
Z. M. Jiang and A. E. Hassan. A framework for studying clones in large software systems. In Proc. of SCAM 2007, pages 203-212, 2007.
-
(2007)
Proc. of SCAM 2007
, pp. 203-212
-
-
Jiang, Z.M.1
Hassan, A.E.2
-
8
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7):654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
9
-
-
56749132226
-
"Cloning considered harmful" considered harmful: Patterns of cloning in software
-
C. J. Kapser and M. W. Godfrey. "Cloning considered harmful" considered harmful: patterns of cloning in software. Empir Software Eng, 13:645-692, 2008.
-
(2008)
Empir Software Eng
, vol.13
, pp. 645-692
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
10
-
-
32344450436
-
An empirical study of code clone genealogies
-
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy. An empirical study of code clone genealogies. In Proc. of ESEC/FSE 2005, pages 187-196, 2005. (Pubitemid 43218826)
-
(2005)
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
11
-
-
71149091724
-
Scenario-based comparison of clone detection techniques
-
C. Roy and J. Cordy. Scenario-based comparison of clone detection techniques. In Proc. of ICPC 2008, pages 153-162, 2008.
-
(2008)
Proc. of ICPC 2008
, pp. 153-162
-
-
Roy, C.1
Cordy, J.2
-
12
-
-
84948459152
-
Gemini: Maintenance support environment based on code clone analysis
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In Proc. of METRICS 2002, pages 67-76, 2002.
-
(2002)
Proc. of METRICS 2002
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
|