메뉴 건너뛰기




Volumn , Issue , 2011, Pages 295-304

Analyzing and forecasting near-miss clones in evolving software: An empirical study

Author keywords

[No Author keywords available]

Indexed keywords

ACCIDENTAL ERROR; CODE CLONE; CODE FRAGMENTS; COST ESTIMATIONS; EMPIRICAL STUDIES; OPEN SOURCE SOFTWARE SYSTEMS; PROGRAM SIZE; PROGRAMMING LANGUAGE; SOFTWARE SYSTEMS;

EID: 79960520851     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICECCS.2011.36     Document Type: Conference Paper
Times cited : (44)

References (33)
  • 1
    • 0036783855 scopus 로고    scopus 로고
    • Analyzing cloning evolution in the Linux kernel
    • DOI 10.1016/S0950-5849(02)00123-4, PII S0950584902001234
    • G. Antoniol, U. Villano, E. Merlo and M. D. Penta, "Analyzing cloning evolution in the Linux kernel", Info. & Soft. Tech., 44(13): 755-765, 2002. (Pubitemid 35039930)
    • (2002) Information and Software Technology , vol.44 , Issue.13 , pp. 755-765
    • Antoniol, G.1    Villano, U.2    Merlo, E.3    Di Penta, M.4
  • 3
    • 47349095405 scopus 로고    scopus 로고
    • Clone smells in software evolution
    • T. Bakota, R. Ferenc and T. Gyimothy, "Clone smells in software evolution", Proc. ICSM, pp. 24-33, 2007.
    • (2007) Proc. ICSM , pp. 24-33
    • Bakota, T.1    Ferenc, R.2    Gyimothy, T.3
  • 4
    • 73449140451 scopus 로고    scopus 로고
    • An empirical study on inconsistent changes to code clones at release level
    • N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou and A. E. Hassan, "An empirical study on inconsistent changes to code clones at release level", Proc. WCRE, pp. 85-94, 2009.
    • (2009) Proc. WCRE , pp. 85-94
    • Bettenburg, N.1    Shang, W.2    Ibrahim, W.3    Adams, B.4    Zou, Y.5    Hassan, A.E.6
  • 8
    • 72349095898 scopus 로고    scopus 로고
    • Evolution of type-1 clones
    • N. Göde, "Evolution of Type-1 clones", Proc. SCAM, pp. 77-86, 2009.
    • (2009) Proc. SCAM , pp. 77-86
    • Göde, N.1
  • 9
    • 67649971019 scopus 로고    scopus 로고
    • Incremental clone detection
    • N. Göde and R. Koschke, "Incremental clone detection", Proc. CSMR, pp. 219-228, 2009.
    • (2009) Proc. CSMR , pp. 219-228
    • Göde, N.1    Koschke, R.2
  • 12
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code", IEEE Trans. Softw. Eng., 28(7): 654-670, 2002.
    • (2002) IEEE Trans. Softw. Eng. , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 13
    • 56749132226 scopus 로고    scopus 로고
    • "Cloning considered harmful" considered harmful: Patterns of cloning in software
    • C. J. Kapser and M. W. Godfrey, ""Cloning Considered Harmful" Considered Harmful: Patterns of Cloning in Software", Empirical Softw. Engg., 13(6): 645-692, 2008.
    • (2008) Empirical Softw. Engg. , vol.13 , Issue.6 , pp. 645-692
    • Kapser, C.J.1    Godfrey, M.W.2
  • 14
    • 85085852882 scopus 로고    scopus 로고
    • Using a clone genealogy extractor for understanding and supporting evolution of code clones
    • M. Kim, and D. Notkin, "Using a clone genealogy extractor for understanding and supporting evolution of code clones", Proc. MSR, pp. 17-23, 2005.
    • (2005) Proc. MSR , pp. 17-23
    • Kim, M.1    Notkin, D.2
  • 16
    • 56349141528 scopus 로고    scopus 로고
    • Is cloned code more stable than non-cloned code?
    • J. Krinke, "Is cloned code more stable than non-cloned code?", Proc. SCAM, pp. 57-66, 2008.
    • (2008) Proc. SCAM , pp. 57-66
    • Krinke, J.1
  • 17
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • J. Krinke, "A Study of Consistent and Inconsistent Changes to Code Clones", Proc. WCRE, pp. 170-178, 2007.
    • (2007) Proc. WCRE , pp. 170-178
    • Krinke, J.1
  • 18
    • 0031371549 scopus 로고    scopus 로고
    • Assessing the benefits of incorporating function clone detection in a development process
    • B. Laguë, D. Proulx, J. Mayrand, E. Merlo and J. Hudepohl, "Assessing the Benefits of Incorporating Function Clone Detection in a Development Process", Proc. ICSM, pp. 314-321, 1997.
    • (1997) Proc. ICSM , pp. 314-321
    • Laguë, B.1    Proulx, D.2    Mayrand, J.3    Merlo, E.4    Hudepohl, J.5
  • 19
    • 84910009447 scopus 로고    scopus 로고
    • CP-miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar and Y. Zhou, "CP-Miner: a tool for finding copy-paste and related bugs in operating system code", Proc. OSDI, pp. 289-302, 2004.
    • (2004) Proc. OSDI , pp. 289-302
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 20
    • 57849136978 scopus 로고    scopus 로고
    • Assessing the effect of clones on changeability
    • A. Lozano and M. Wermelinger, "Assessing the effect of clones on changeability", Proc. ICSM, pp. 227-236, 2008.
    • (2008) Proc. ICSM , pp. 227-236
    • Lozano, A.1    Wermelinger, M.2
  • 21
    • 77954743484 scopus 로고    scopus 로고
    • Tracking clones' imprint
    • A. Lozano and M. Wermelinger, "Tracking clones' imprint", Proc. IWSC, pp. 65-72, 2010.
    • (2010) Proc. IWSC , pp. 65-72
    • Lozano, A.1    Wermelinger, M.2
  • 26
    • 69949085058 scopus 로고    scopus 로고
    • A mutation / injection-based automatic framework for evaluating clone detection tools
    • C. K. Roy and J. R. Cordy, "A Mutation / Injection-based Automatic Framework for Evaluating Clone Detection Tools", Proc. Mutation, pp. 157-166, 2009.
    • (2009) Proc. Mutation , pp. 157-166
    • Roy, C.K.1    Cordy, J.R.2
  • 27
    • 57749209364 scopus 로고    scopus 로고
    • An empirical study of function clones in open source software systems
    • C. K. Roy and J. R. Cordy, "An Empirical Study of Function Clones in Open Source Software Systems", Proc. WCRE, pp. 81-90, 2008.
    • (2008) Proc. WCRE , pp. 81-90
    • Roy, C.K.1    Cordy, J.R.2
  • 28
    • 71149111492 scopus 로고    scopus 로고
    • NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
    • C. K. Roy and J. R. Cordy, "NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization", Proc. ICPC, pp. 172-181, 2008.
    • (2008) Proc. ICPC , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 30
    • 77954743167 scopus 로고    scopus 로고
    • Are scripting languages really different?
    • C. K. Roy and J. R. Cordy, "Are Scripting Languages Really Different?", Proc. IWSC, pp. 17-24, 2010.
    • (2010) Proc. IWSC , pp. 17-24
    • Roy, C.K.1    Cordy, J.R.2
  • 31
  • 32
    • 78650018916 scopus 로고    scopus 로고
    • Modeling clones evolution in open source systems through chaos theory
    • D. M. Shawky and A. F. Ali, "Modeling Clones Evolution in Open Source Systems Through Chaos Theory", Proc. ICSTE, pp. V1-159 - V1-164, 2010.
    • (2010) Proc. ICSTE
    • Shawky, D.M.1    Ali, A.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.