-
1
-
-
0036783855
-
Analyzing cloning evolution in the Linux kernel
-
DOI 10.1016/S0950-5849(02)00123-4, PII S0950584902001234
-
G. Antoniol, U. Villano, E. Merlo and M. D. Penta, "Analyzing cloning evolution in the Linux kernel", Info. & Soft. Tech., 44(13): 755-765, 2002. (Pubitemid 35039930)
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Di Penta, M.4
-
2
-
-
77956616360
-
Modeling clones evolution through time series
-
G. Antoniol, G. Casazza, M. Di Penta and E. Merlo, "Modeling clones evolution through time series", Proc. ICSM, pp. 273-280, 2001.
-
(2001)
Proc. ICSM
, pp. 273-280
-
-
Antoniol, G.1
Casazza, G.2
Di Penta, M.3
Merlo, E.4
-
4
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou and A. E. Hassan, "An empirical study on inconsistent changes to code clones at release level", Proc. WCRE, pp. 85-94, 2009.
-
(2009)
Proc. WCRE
, pp. 85-94
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.E.6
-
5
-
-
80053367461
-
Time series analysis, forecasting and control
-
G. Box, E. Pelham and G. Jenkins, "Time Series Analysis, Forecasting and Control", Holden-Day, Incorporated, 1990.
-
(1990)
Holden-day, Incorporated
-
-
Box, G.1
Pelham, E.2
Jenkins, G.3
-
6
-
-
34548805888
-
Tracking code clones in evolving software
-
DOI 10.1109/ICSE.2007.90, 4222578, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
E. Duala-Ekoko and M. P. Robillard, "Tracking code clones in evolving software", Proc. ICSE, pp. 158-167, 2007. (Pubitemid 47430651)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 158-167
-
-
Duala-Ekoko, E.1
Robillard, M.P.2
-
7
-
-
33745780468
-
Relation of code clones and change couplings
-
DOI 10.1007/11693017-31, Fundamental Approaches to Software Engineering - 9th International Conference, FASE 2006. Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Proceedings
-
R. Geiger, B. Fluri, H. C. Gall and M. Pinzger, "Relation of code clones and change couplings", Proc. FASE, pp. 411-425, 2006. (Pubitemid 44019324)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3922
, pp. 411-425
-
-
Geiger, R.1
Fluri, B.2
Gall, H.C.3
Pinzger, M.4
-
8
-
-
72349095898
-
Evolution of type-1 clones
-
N. Göde, "Evolution of Type-1 clones", Proc. SCAM, pp. 77-86, 2009.
-
(2009)
Proc. SCAM
, pp. 77-86
-
-
Göde, N.1
-
9
-
-
67649971019
-
Incremental clone detection
-
N. Göde and R. Koschke, "Incremental clone detection", Proc. CSMR, pp. 219-228, 2009.
-
(2009)
Proc. CSMR
, pp. 219-228
-
-
Göde, N.1
Koschke, R.2
-
11
-
-
73449090740
-
Do code clones matter?
-
E. Juergens, F. Deissenboeck, B. Hummel and S. Wagner, "Do code clones matter?", Proc. ICSE, pp. 485-495, 2009.
-
(2009)
Proc. ICSE
, pp. 485-495
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
12
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code", IEEE Trans. Softw. Eng., 28(7): 654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
13
-
-
56749132226
-
"Cloning considered harmful" considered harmful: Patterns of cloning in software
-
C. J. Kapser and M. W. Godfrey, ""Cloning Considered Harmful" Considered Harmful: Patterns of Cloning in Software", Empirical Softw. Engg., 13(6): 645-692, 2008.
-
(2008)
Empirical Softw. Engg.
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
14
-
-
85085852882
-
Using a clone genealogy extractor for understanding and supporting evolution of code clones
-
M. Kim, and D. Notkin, "Using a clone genealogy extractor for understanding and supporting evolution of code clones", Proc. MSR, pp. 17-23, 2005.
-
(2005)
Proc. MSR
, pp. 17-23
-
-
Kim, M.1
Notkin, D.2
-
15
-
-
32344450436
-
An empirical study of code clone genealogies
-
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
-
M. Kim, V. Sazawal, D. Notkin and G. Murphy, "An empirical study of code clone genealogies", Proc. FSE, pp. 187-196, 2005. (Pubitemid 43218826)
-
(2005)
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
16
-
-
56349141528
-
Is cloned code more stable than non-cloned code?
-
J. Krinke, "Is cloned code more stable than non-cloned code?", Proc. SCAM, pp. 57-66, 2008.
-
(2008)
Proc. SCAM
, pp. 57-66
-
-
Krinke, J.1
-
17
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, "A Study of Consistent and Inconsistent Changes to Code Clones", Proc. WCRE, pp. 170-178, 2007.
-
(2007)
Proc. WCRE
, pp. 170-178
-
-
Krinke, J.1
-
18
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Laguë, D. Proulx, J. Mayrand, E. Merlo and J. Hudepohl, "Assessing the Benefits of Incorporating Function Clone Detection in a Development Process", Proc. ICSM, pp. 314-321, 1997.
-
(1997)
Proc. ICSM
, pp. 314-321
-
-
Laguë, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.5
-
19
-
-
84910009447
-
CP-miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar and Y. Zhou, "CP-Miner: a tool for finding copy-paste and related bugs in operating system code", Proc. OSDI, pp. 289-302, 2004.
-
(2004)
Proc. OSDI
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
20
-
-
57849136978
-
Assessing the effect of clones on changeability
-
A. Lozano and M. Wermelinger, "Assessing the effect of clones on changeability", Proc. ICSM, pp. 227-236, 2008.
-
(2008)
Proc. ICSM
, pp. 227-236
-
-
Lozano, A.1
Wermelinger, M.2
-
22
-
-
52349091762
-
-
Wiley Series in Probability and Statistics, John Wiley and Sons, Inc.
-
D. C. Montgomery, C. L. Jennings and M. Kulahci, "Introduction to Time Series Analysis and ForeCasting", Wiley Series in Probability and Statistics, John Wiley and Sons, Inc., 2008.
-
(2008)
Introduction to Time Series Analysis and ForeCasting
-
-
Montgomery, D.C.1
Jennings, C.L.2
Kulahci, M.3
-
23
-
-
56249125683
-
Cleman: Comprehensive clone group evolution management
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi and T. N. Nguyen, "Cleman: Comprehensive clone group evolution management", Proc. ASE, pp. 451-454, 2008.
-
(2008)
Proc. ASE
, pp. 451-454
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
24
-
-
18144389452
-
Insights into system-wide code duplication
-
Proceedings - 11th Working Conference on Reverse Engineering, WCRE 2004
-
M. Rieger, S. Ducasse and M. Lanza, "Insights into System-Wide Code Duplication", Proc. WCRE, pp. 100-109, 2004. (Pubitemid 40610327)
-
(2004)
Proceedings - Working Conference on Reverse Engineering, WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
26
-
-
69949085058
-
A mutation / injection-based automatic framework for evaluating clone detection tools
-
C. K. Roy and J. R. Cordy, "A Mutation / Injection-based Automatic Framework for Evaluating Clone Detection Tools", Proc. Mutation, pp. 157-166, 2009.
-
(2009)
Proc. Mutation
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
27
-
-
57749209364
-
An empirical study of function clones in open source software systems
-
C. K. Roy and J. R. Cordy, "An Empirical Study of Function Clones in Open Source Software Systems", Proc. WCRE, pp. 81-90, 2008.
-
(2008)
Proc. WCRE
, pp. 81-90
-
-
Roy, C.K.1
Cordy, J.R.2
-
28
-
-
71149111492
-
NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy, "NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization", Proc. ICPC, pp. 172-181, 2008.
-
(2008)
Proc. ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
30
-
-
77954743167
-
Are scripting languages really different?
-
C. K. Roy and J. R. Cordy, "Are Scripting Languages Really Different?", Proc. IWSC, pp. 17-24, 2010.
-
(2010)
Proc. IWSC
, pp. 17-24
-
-
Roy, C.K.1
Cordy, J.R.2
-
31
-
-
78649431588
-
Evaluating code clone genealogies at release level: An empirical study
-
R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy and K. A. Schneider, "Evaluating Code Clone Genealogies at Release level: An Empirical Study", Proc. SCAM, pp. 87 - 96, 2010.
-
(2010)
Proc. SCAM
, pp. 87-96
-
-
Saha, R.K.1
Asaduzzaman, M.2
Zibran, M.F.3
Roy, C.K.4
Schneider, K.A.5
-
32
-
-
78650018916
-
Modeling clones evolution in open source systems through chaos theory
-
D. M. Shawky and A. F. Ali, "Modeling Clones Evolution in Open Source Systems Through Chaos Theory", Proc. ICSTE, pp. V1-159 - V1-164, 2010.
-
(2010)
Proc. ICSTE
-
-
Shawky, D.M.1
Ali, A.F.2
-
33
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano and M. Di Penta, "An empirical study on the maintenance of source code clones", Empirical Softw. Engg., 15(1): 1-34, 2010.
-
(2010)
Empirical Softw. Engg.
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
|