-
1
-
-
34547677997
-
How clones are maintained: An empirical study
-
IEEE
-
L. Aversano, L. Cerulo, and M. Di Penta. How clones are maintained: An empirical study. In CSMR. IEEE, 2007.
-
(2007)
CSMR
-
-
Aversano, L.1
Cerulo, L.2
Di Penta, M.3
-
2
-
-
0013238532
-
Parameterized duplication in strings: Algorithms and an application to software maintenance
-
B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. Journal on Computing, 26(5), 1997.
-
(1997)
Journal on Computing
, vol.26
, Issue.5
-
-
Baker, B.S.1
-
3
-
-
47349095405
-
Clone smells in software evolution
-
IEEE
-
T. Bakota, R. Ferenc, and T. Gyimóthy. Clone smells in software evolution. In ICSM. IEEE, 2007.
-
(2007)
ICSM
-
-
Bakota, T.1
Ferenc, R.2
Gyimóthy, T.3
-
4
-
-
0010643924
-
Advanced clone-analysis to support object-oriented system refactoring
-
IEEE
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lagüe, and K. Kontogiannis. Advanced clone-analysis to support object-oriented system refactoring. In WCRE. IEEE, 2000.
-
(2000)
WCRE
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lagüe, B.4
Kontogiannis, K.5
-
5
-
-
0032311601
-
Clone detection using abstract syntax trees
-
IEEE
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM. IEEE, 1998.
-
(1998)
ICSM
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
6
-
-
70849100995
-
Managing code clones using dynamic change tracking and resolution
-
IEEE
-
M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In ICSM. IEEE, 2009.
-
(2009)
ICSM
-
-
De Wit, M.1
Zaidman, A.2
Van Deursen, A.3
-
7
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
IEEE
-
S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In ICSM. IEEE, 1999.
-
(1999)
ICSM
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
8
-
-
72349095898
-
Evolution of type-1 clones
-
IEEE
-
N. Göde. Evolution of type-1 clones. In SCAM. IEEE, 2009.
-
(2009)
SCAM
-
-
Göde, N.1
-
9
-
-
67649971019
-
Incremental clone detection
-
IEEE
-
N. Göde and R. Koschke. Incremental clone detection. In CSMR. IEEE, 2009.
-
(2009)
CSMR
-
-
Göde, N.1
Koschke, R.2
-
10
-
-
79959864670
-
Studying clone evolution using incremental clone detection
-
N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. JSME, 2010.
-
(2010)
JSME
-
-
Göde, N.1
Koschke, R.2
-
11
-
-
79959883618
-
Quo vadis, clone management?
-
ACM
-
J. Harder and N. Göde. Quo vadis, clone management? In IWSC. ACM, 2010.
-
(2010)
IWSC
-
-
Harder, J.1
Göde, N.2
-
12
-
-
35048850423
-
Refactoring support based on code clone analysis
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. LNCS, 3009, 2004.
-
(2004)
LNCS
, pp. 3009
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
13
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
IEEE
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE. IEEE, 2007.
-
(2007)
ICSE
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
14
-
-
37849051720
-
Context-based detection of clone-related bugs
-
ACM
-
L. Jiang, Z. Su, and E. Chiu. Context-based detection of clone-related bugs. In ESEC/FSE. ACM, 2007.
-
(2007)
ESEC/FSE
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
15
-
-
0001358667
-
Identifying redundancy in source code using fingerprints
-
IBM Press
-
J. H. Johnson. Identifying redundancy in source code using fingerprints. In CASCON. IBM Press, 1993.
-
(1993)
CASCON
-
-
Johnson, J.H.1
-
18
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7), 2002.
-
(2002)
TSE
, vol.28
, Issue.7
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
19
-
-
56749132226
-
"Cloning considered harmful" considered harmful: Patterns of cloning in software
-
C. J. Kapser and M. W. Godfrey. "Cloning considered harmful" considered harmful: patterns of cloning in software. ESE, 13(6), 2008.
-
(2008)
ESE
, vol.13
, Issue.6
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
21
-
-
2942747748
-
Using slicing to identify duplication in source code
-
Springer-Verlag
-
R. V. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS. Springer-Verlag, 2001.
-
(2001)
SAS
-
-
Komondoor, R.V.1
Horwitz, S.2
-
22
-
-
67649933675
-
Survey of research on software clones
-
R. Koschke, E. Merlo, and A. Walenstein, editors, number 06301 in Dagstuhl Seminar Proceedings
-
R. Koschke. Survey of research on software clones. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, 2007.
-
(2007)
Duplication, Redundancy, and Similarity in Software
-
-
Koschke, R.1
-
23
-
-
0242612453
-
Identifying similar code with program dependence graphs
-
IEEE
-
J. Krinke. Identifying similar code with program dependence graphs. In WCRE. IEEE, 2001.
-
(2001)
WCRE
-
-
Krinke, J.1
-
24
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
IEEE
-
J. Krinke. A study of consistent and inconsistent changes to code clones. In WCRE. IEEE, 2007.
-
(2007)
WCRE
-
-
Krinke, J.1
-
25
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: Finding copy-paste and related bugs in large-scale software code. TSE, 32(3), 2006.
-
(2006)
TSE
, vol.32
, Issue.3
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
26
-
-
57849136978
-
Assessing the effect of clones on changeability
-
IEEE
-
A. Lozano and M. Wermelinger. Assessing the effect of clones on changeability. In ICSM. IEEE, 2008.
-
(2008)
ICSM
-
-
Lozano, A.1
Wermelinger, M.2
-
27
-
-
34548735994
-
Evaluating the harmfulness of cloning: A change based experiment
-
IEEE
-
A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In MSR. IEEE, 2007.
-
(2007)
MSR
-
-
Lozano, A.1
Wermelinger, M.2
Nuseibeh, B.3
-
28
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
IEEE
-
J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM. IEEE, 1996.
-
(1996)
ICSM
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
29
-
-
0023012946
-
An O(ND) difference algorithm and its variations
-
E. W. Myers. An O(ND) difference algorithm and its variations. Algorithmica, 1(2), 1986.
-
(1986)
Algorithmica
, vol.1
, Issue.2
-
-
Myers, E.W.1
-
30
-
-
77952114282
-
Clone-aware configuration management
-
IEEE
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen. Clone-aware configuration management. In ASE. IEEE, 2009.
-
(2009)
ASE
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
32
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta. An empirical study on the maintenance of source code clones. ESE, 15(1), 2010.
-
(2010)
ESE
, vol.15
, Issue.1
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
-
34
-
-
84948985305
-
On detection of gapped code clones using gap locations
-
IEEEy
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In APSEC. IEEEy, 2002.
-
(2002)
APSEC
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
|