-
1
-
-
0039528117
-
A Program for Identifying Duplicated Code
-
B. S. Baker. "A Program for Identifying Duplicated Code". Proc. CSS Interface, 1999, Vol. 24, pp. 49-57.
-
(1999)
Proc. CSS Interface
, vol.24
, pp. 49-57
-
-
Baker, B.S.1
-
2
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant' Anna and L. Bier, "Clone detection using abstract syntax trees", Proc. ICSM, 1998, pp. 368-378.
-
Proc. ICSM, 1998
, pp. 368-378
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant Anna, M.4
Bier, L.5
-
3
-
-
0036040277
-
Similarity estimation techniques from rounding algorithms
-
M. S. Charikar, "Similarity estimation techniques from rounding algorithms". Proc. STOC, 2002, pp. 380-388.
-
Proc. STOC, 2002
, pp. 380-388
-
-
Charikar, M.S.1
-
4
-
-
70349991479
-
Syntax tree fingerprinting for source code similarity detection
-
M. Chilowicz, E. Duris and G. Roussel, "Syntax tree fingerprinting for source code similarity detection" Proc. ICPC, 2009, pp. 243-247.
-
Proc. ICPC, 2009
, pp. 243-247
-
-
Chilowicz, M.1
Duris, E.2
Roussel, G.3
-
5
-
-
33646831658
-
The TXL Source Transformation Language
-
J. R. Cordy, "The TXL Source Transformation Language". Science of Computer Programming, 61(3):190-210, 2006.
-
(2006)
Science of Computer Programming
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
6
-
-
85170282443
-
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise", Proc. KDD, 1996, pp. 226-231.
-
Proc. KDD, 1996
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
7
-
-
44649164477
-
Detecting near-duplicates in large-scale short text databases
-
C. Gong, Y. Huang, X. Cheng and S. Bai. "Detecting near-duplicates in large-scale short text databases", Proc. PAKDD, 2008, pp. 877-883.
-
Proc. PAKDD, 2008
, pp. 877-883
-
-
Gong, C.1
Huang, Y.2
Cheng, X.3
Bai, S.4
-
8
-
-
33750296887
-
Finding near-duplicate web pages: A large-scale evaluation of algorithms
-
M. Henzinger, "Finding near-duplicate web pages: a large-scale evaluation of algorithms", Proc. SIGIR, 2006, pp. 284-291
-
Proc. SIGIR, 2006
, pp. 284-291
-
-
Henzinger, M.1
-
9
-
-
78650088347
-
Index-based code clone detection: Incremental, distributed, scalable
-
B. Hummel, E. Juergens, L. Heinemann and M. Conradt, "Index-based code clone detection: incremental, distributed, scalable", Proc. ICSM, 2010, pp. 1-9.
-
Proc. ICSM, 2010
, pp. 1-9
-
-
Hummel, B.1
Juergens, E.2
Heinemann, L.3
Conradt, M.4
-
10
-
-
34548767669
-
DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
-
L. Jiang, G. Misherghi, Z. Su and S. Glondu. "DECKARD: Scalable and Accurate Tree-based Detection of Code Clones". Proc. ICSE, 2007, pp. 96-105.
-
Proc. ICSE, 2007
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
11
-
-
0001358667
-
Identifying redundancy in source code using fingerprints
-
J. H. Johnson, "Identifying redundancy in source code using fingerprints", Proc. CASCON, 1993, pp. 171-183.
-
Proc. CASCON, 1993
, pp. 171-183
-
-
Johnson, J.H.1
-
12
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code", IEEE TSE, 28(7):654- 670, 2002.
-
(2002)
IEEE TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
13
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lague, D. Proulx, E. Merlo, J. Mayrand and J. Hudepohl, "Assessing the benefits of incorporating function clone detection in a development process," Proc. ICSM, 1997, pp. 314-321.
-
Proc. ICSM, 1997
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Merlo, E.3
Mayrand, J.4
Hudepohl, J.5
-
14
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
Z. Li, S. Lu, S. Myagmar and Y. Zhou. "CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code". IEEE TSE, 32(3):176-192, 2006.
-
(2006)
IEEE TSE
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
15
-
-
35348911985
-
Detecting Near-Duplicates for Web Crawling
-
G. S. Manku, A. Jain and A.D. Sarma, "Detecting Near-Duplicates for Web Crawling", Proc. of WWW, 2007, pp. 141-150.
-
Proc. of WWW, 2007
, pp. 141-150
-
-
Manku, G.S.1
Jain, A.2
Sarma, A.D.3
-
16
-
-
0023012946
-
An O (ND) difference algorithm and its variations
-
E. W. Myers, "An O (ND) difference algorithm and its variations", Algorithmica, 1(1):251-266, 1986.
-
(1986)
Algorithmica
, vol.1
, Issue.1
, pp. 251-266
-
-
Myers, E.W.1
-
17
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, and E. Merlo, "Experiment on the automatic detection of function clones in a software system using metrics", Proc. ICSM, 1996, pp. 244-254.
-
Proc. ICSM, 1996
, pp. 244-254
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
18
-
-
83455241159
-
SimHash-based Effective and Efficient Detecting of Near-Duplicate Short Messages
-
B. Pi, S. Fu, W. Wang and S. Han, "SimHash-based Effective and Efficient Detecting of Near-Duplicate Short Messages", Proc. ISCSCT, 2009, pp. 020-025.
-
Proc. ISCSCT, 2009
, pp. 020-025
-
-
Pi, B.1
Fu, S.2
Wang, W.3
Han, S.4
-
19
-
-
69949085058
-
A mutation / injection-based automatic framework for evaluating code clone detection tools
-
C. K. Roy and J. R. Cordy, "A mutation / injection-based automatic framework for evaluating code clone detection tools", Proc. ICST Mutation Workshop, 2009, pp. 157-166.
-
Proc. ICST Mutation Workshop, 2009
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
20
-
-
64549135034
-
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
-
C.K. Roy, J.R. Cordy and R. Koschke, Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach. Science of Computer Programming, 74 (2009): 470-495, 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.2009
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
21
-
-
71149111492
-
NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
-
C. K. Roy and J. R. Cordy. "NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization", Proc. ICPC, 2008, pp. 172-181
-
Proc. ICPC, 2008
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
22
-
-
78650667672
-
Enhancing Source-Based Clone Detection Using Intermediate Representation
-
G. M. K. Selim, K. C. Foo and Y. Zou. "Enhancing Source-Based Clone Detection Using Intermediate Representation", Proc. WCRE, 2010, pp. 227-236.
-
Proc. WCRE, 2010
, pp. 227-236
-
-
Selim, G.M.K.1
Foo, K.C.2
Zou, Y.3
-
23
-
-
79952815878
-
Detecting and measuring similarity in code clones
-
R. Smith and S. Horwitz, "Detecting and measuring similarity in code clones", Proc. IWSC, 2009, pp. 28-34.
-
Proc. IWSC, 2009
, pp. 28-34
-
-
Smith, R.1
Horwitz, S.2
-
24
-
-
79952814906
-
An extended assessment of type-3 clones as detected by state-of-the-art tools
-
R.Tiarks, R. Koschke, and R. Falke, "An extended assessment of type-3 clones as detected by state-of-the-art tools", Software Quality Journal, 19(2): 295-331, 2011.
-
(2011)
Software Quality Journal
, vol.19
, Issue.2
, pp. 295-331
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
|