메뉴 건너뛰기




Volumn , Issue , 2011, Pages 13-22

On the effectiveness of simhash for detecting near-miss clones in large scale software systems

Author keywords

clone detection; fingerprinting; simhash; similarity hashing; software clones

Indexed keywords

CLONE DETECTION; FINGERPRINTING; SIMHASH; SIMILARITY HASHING; SOFTWARE CLONES;

EID: 83455168943     PISSN: 10951350     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCRE.2011.12     Document Type: Conference Paper
Times cited : (66)

References (24)
  • 1
    • 0039528117 scopus 로고    scopus 로고
    • A Program for Identifying Duplicated Code
    • B. S. Baker. "A Program for Identifying Duplicated Code". Proc. CSS Interface, 1999, Vol. 24, pp. 49-57.
    • (1999) Proc. CSS Interface , vol.24 , pp. 49-57
    • Baker, B.S.1
  • 3
    • 0036040277 scopus 로고    scopus 로고
    • Similarity estimation techniques from rounding algorithms
    • M. S. Charikar, "Similarity estimation techniques from rounding algorithms". Proc. STOC, 2002, pp. 380-388.
    • Proc. STOC, 2002 , pp. 380-388
    • Charikar, M.S.1
  • 4
    • 70349991479 scopus 로고    scopus 로고
    • Syntax tree fingerprinting for source code similarity detection
    • M. Chilowicz, E. Duris and G. Roussel, "Syntax tree fingerprinting for source code similarity detection" Proc. ICPC, 2009, pp. 243-247.
    • Proc. ICPC, 2009 , pp. 243-247
    • Chilowicz, M.1    Duris, E.2    Roussel, G.3
  • 5
    • 33646831658 scopus 로고    scopus 로고
    • The TXL Source Transformation Language
    • J. R. Cordy, "The TXL Source Transformation Language". Science of Computer Programming, 61(3):190-210, 2006.
    • (2006) Science of Computer Programming , vol.61 , Issue.3 , pp. 190-210
    • Cordy, J.R.1
  • 6
    • 85170282443 scopus 로고    scopus 로고
    • A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
    • M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise", Proc. KDD, 1996, pp. 226-231.
    • Proc. KDD, 1996 , pp. 226-231
    • Ester, M.1    Kriegel, H.-P.2    Sander, J.3    Xu, X.4
  • 7
    • 44649164477 scopus 로고    scopus 로고
    • Detecting near-duplicates in large-scale short text databases
    • C. Gong, Y. Huang, X. Cheng and S. Bai. "Detecting near-duplicates in large-scale short text databases", Proc. PAKDD, 2008, pp. 877-883.
    • Proc. PAKDD, 2008 , pp. 877-883
    • Gong, C.1    Huang, Y.2    Cheng, X.3    Bai, S.4
  • 8
    • 33750296887 scopus 로고    scopus 로고
    • Finding near-duplicate web pages: A large-scale evaluation of algorithms
    • M. Henzinger, "Finding near-duplicate web pages: a large-scale evaluation of algorithms", Proc. SIGIR, 2006, pp. 284-291
    • Proc. SIGIR, 2006 , pp. 284-291
    • Henzinger, M.1
  • 10
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
    • L. Jiang, G. Misherghi, Z. Su and S. Glondu. "DECKARD: Scalable and Accurate Tree-based Detection of Code Clones". Proc. ICSE, 2007, pp. 96-105.
    • Proc. ICSE, 2007 , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 11
    • 0001358667 scopus 로고    scopus 로고
    • Identifying redundancy in source code using fingerprints
    • J. H. Johnson, "Identifying redundancy in source code using fingerprints", Proc. CASCON, 1993, pp. 171-183.
    • Proc. CASCON, 1993 , pp. 171-183
    • Johnson, J.H.1
  • 12
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code", IEEE TSE, 28(7):654- 670, 2002.
    • (2002) IEEE TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 13
    • 0031371549 scopus 로고    scopus 로고
    • Assessing the benefits of incorporating function clone detection in a development process
    • B. Lague, D. Proulx, E. Merlo, J. Mayrand and J. Hudepohl, "Assessing the benefits of incorporating function clone detection in a development process," Proc. ICSM, 1997, pp. 314-321.
    • Proc. ICSM, 1997 , pp. 314-321
    • Lague, B.1    Proulx, D.2    Merlo, E.3    Mayrand, J.4    Hudepohl, J.5
  • 14
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
    • Z. Li, S. Lu, S. Myagmar and Y. Zhou. "CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code". IEEE TSE, 32(3):176-192, 2006.
    • (2006) IEEE TSE , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 16
    • 0023012946 scopus 로고
    • An O (ND) difference algorithm and its variations
    • E. W. Myers, "An O (ND) difference algorithm and its variations", Algorithmica, 1(1):251-266, 1986.
    • (1986) Algorithmica , vol.1 , Issue.1 , pp. 251-266
    • Myers, E.W.1
  • 17
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • J. Mayrand, C. Leblanc, and E. Merlo, "Experiment on the automatic detection of function clones in a software system using metrics", Proc. ICSM, 1996, pp. 244-254.
    • Proc. ICSM, 1996 , pp. 244-254
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 18
    • 83455241159 scopus 로고    scopus 로고
    • SimHash-based Effective and Efficient Detecting of Near-Duplicate Short Messages
    • B. Pi, S. Fu, W. Wang and S. Han, "SimHash-based Effective and Efficient Detecting of Near-Duplicate Short Messages", Proc. ISCSCT, 2009, pp. 020-025.
    • Proc. ISCSCT, 2009 , pp. 020-025
    • Pi, B.1    Fu, S.2    Wang, W.3    Han, S.4
  • 19
    • 69949085058 scopus 로고    scopus 로고
    • A mutation / injection-based automatic framework for evaluating code clone detection tools
    • C. K. Roy and J. R. Cordy, "A mutation / injection-based automatic framework for evaluating code clone detection tools", Proc. ICST Mutation Workshop, 2009, pp. 157-166.
    • Proc. ICST Mutation Workshop, 2009 , pp. 157-166
    • Roy, C.K.1    Cordy, J.R.2
  • 20
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
    • C.K. Roy, J.R. Cordy and R. Koschke, Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach. Science of Computer Programming, 74 (2009): 470-495, 2009.
    • (2009) Science of Computer Programming , vol.74 , Issue.2009 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 21
    • 71149111492 scopus 로고    scopus 로고
    • NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
    • C. K. Roy and J. R. Cordy. "NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization", Proc. ICPC, 2008, pp. 172-181
    • Proc. ICPC, 2008 , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 22
    • 78650667672 scopus 로고    scopus 로고
    • Enhancing Source-Based Clone Detection Using Intermediate Representation
    • G. M. K. Selim, K. C. Foo and Y. Zou. "Enhancing Source-Based Clone Detection Using Intermediate Representation", Proc. WCRE, 2010, pp. 227-236.
    • Proc. WCRE, 2010 , pp. 227-236
    • Selim, G.M.K.1    Foo, K.C.2    Zou, Y.3
  • 23
    • 79952815878 scopus 로고    scopus 로고
    • Detecting and measuring similarity in code clones
    • R. Smith and S. Horwitz, "Detecting and measuring similarity in code clones", Proc. IWSC, 2009, pp. 28-34.
    • Proc. IWSC, 2009 , pp. 28-34
    • Smith, R.1    Horwitz, S.2
  • 24
    • 79952814906 scopus 로고    scopus 로고
    • An extended assessment of type-3 clones as detected by state-of-the-art tools
    • R.Tiarks, R. Koschke, and R. Falke, "An extended assessment of type-3 clones as detected by state-of-the-art tools", Software Quality Journal, 19(2): 295-331, 2011.
    • (2011) Software Quality Journal , vol.19 , Issue.2 , pp. 295-331
    • Tiarks, R.1    Koschke, R.2    Falke, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.