-
1
-
-
34547677997
-
How clones are maintained: An empirical study
-
L. Aversano, L. Cerulo, and M. D. Penta, "How clones are maintained: An empirical study," Proc. CSMR, 2007, pp. 81-90.
-
Proc. CSMR, 2007
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Penta, M.D.3
-
2
-
-
47349095405
-
Clone smells in software evolution
-
T. Bakota, R. Ferenc, and T. Gyimothy, "Clone smells in software evolution," Proc. ICSM, 2007, pp. 24-33.
-
Proc. ICSM, 2007
, pp. 24-33
-
-
Bakota, T.1
Ferenc, R.2
Gyimothy, T.3
-
3
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan, "An empirical study on inconsistent changes to code clones at release level," Proc. WCRE, 2009, pp. 85-94.
-
Proc. WCRE, 2009
, pp. 85-94
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
4
-
-
33646831658
-
The TXL source transformation language
-
J. Cordy, "The TXL source transformation language," Sci. of Com. Prog., 61(3):190-210, 2006.
-
(2006)
Sci. of Com. Prog.
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.1
-
5
-
-
77954339263
-
Clone Region Descriptors: Representing and Tracking Duplication in Source Code
-
E. Duala-Ekoko and M. P. Robillard, "Clone Region Descriptors: Representing and Tracking Duplication in Source Code," TOSEM, 20(1)3:1-31, 2010.
-
(2010)
TOSEM
, vol.20
, Issue.1
-
-
Duala-Ekoko, E.1
Robillard, M.P.2
-
6
-
-
79959864670
-
Studying clone evolution using incremental clone detection
-
N. Göde and R. Koschke, "Studying clone evolution using incremental clone detection," JSME, 2010.
-
(2010)
JSME
-
-
Göde, N.1
Koschke, R.2
-
7
-
-
17644417780
-
Using origin analysis to detect merging and splitting of source code entities
-
DOI 10.1109/TSE.2005.28
-
M. Godfrey and L. Zou, "Using origin analysis to detect merging and splitting of source code," entities. IEEE TSE, 31(2):166-181, 2005. (Pubitemid 40556104)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.2
, pp. 166-181
-
-
Godfrey, M.W.1
Zou, L.2
-
8
-
-
79959572195
-
Efficiently Handling Clone Data: RCF and cyclone
-
J. Harder and N. Göde, "Efficiently Handling Clone Data: RCF and cyclone," Proc. IWSC, 2011, pp. 81-82.
-
Proc. IWSC, 2011
, pp. 81-82
-
-
Harder, J.1
Göde, N.2
-
10
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy, "An empirical study of code clone genealogies," Proc. ESEC-FSE, 2005, pp. 187-196.
-
Proc. ESEC-FSE, 2005
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
11
-
-
33845432907
-
When functions change their names: Automatic detection of origin relationships
-
S. Kim, K. Pan, and J. E. Whitehead, "When functions change their names: Automatic detection of origin relationships," Proc. WCRE, 2005, pp. 143-152.
-
Proc. WCRE, 2005
, pp. 143-152
-
-
Kim, S.1
Pan, K.2
Whitehead, J.E.3
-
12
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, "A study of consistent and inconsistent changes to code clones," Proc. WCRE, 2007, pp. 170-178.
-
Proc. WCRE, 2007
, pp. 170-178
-
-
Krinke, J.1
-
13
-
-
56349141528
-
Is cloned code more stable than non-cloned code?
-
J. Krinke, "Is cloned code more stable than non-cloned code?," Proc. SCAM, 2008, pp. 57-66.
-
Proc. SCAM, 2008
, pp. 57-66
-
-
Krinke, J.1
-
15
-
-
70849100692
-
Scalable and Incremental Clone Detection for Evolving Software
-
T. T. Nguyen, H. A. Nguyen, J. M. Al-Kofahi, N. H. Pham, and T. N. Nguyen, "Scalable and Incremental Clone Detection for Evolving Software," Proc. ICSM, 2009, pp. 491-494.
-
Proc. ICSM, 2009
, pp. 491-494
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Al-Kofahi, J.M.3
Pham, N.H.4
Nguyen, T.N.5
-
16
-
-
77953766644
-
Clones: What is that smell?
-
F. Rahman, C. Bird, P. Devanbu, "Clones: What is that smell?," Proc. MSR, 2010, pp. 72-81.
-
Proc. MSR, 2010
, pp. 72-81
-
-
Rahman, F.1
Bird, C.2
Devanbu, P.3
-
17
-
-
69949085058
-
A mutation / injection-based automatic framework for evaluating code clone detection tools
-
C. K. Roy and J. R. Cordy, "A mutation / injection-based automatic framework for evaluating code clone detection tools," Proc. Mutation, 2009, pp. 157-166.
-
Proc. Mutation, 2009
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
18
-
-
71149111492
-
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
-
C. K. Roy and J. R. Cordy, "NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization, "In ICPC, 2008, pp. 172-181.
-
ICPC, 2008
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
19
-
-
77950141808
-
Near-miss Function Clones in Open Source Software: An Empirical Study
-
C. K. Roy and J. R. Cordy, "Near-miss Function Clones in Open Source Software: An Empirical Study," JSME, 22(3):165-189, 2010.
-
(2010)
JSME
, vol.22
, Issue.3
, pp. 165-189
-
-
Roy, C.K.1
Cordy, J.R.2
-
20
-
-
78649431588
-
Evaluating code clone genealogies at release level: An empirical study
-
R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, and K. A. Schneider, "Evaluating code clone genealogies at release level: An empirical study," Proc. SCAM, 2010, pp. 87-96.
-
Proc. SCAM, 2010
, pp. 87-96
-
-
Saha, R.K.1
Asaduzzaman, M.2
Zibran, M.F.3
Roy, C.K.4
Schneider, K.A.5
-
21
-
-
84855202580
-
-
Feb
-
Software Clones. http://www.softwareclones.org/ (Feb 2011)
-
(2011)
Software Clones
-
-
-
22
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. D. Penta, "An empirical study on the maintenance of source code clones," ESE, 15(1):1-34, 2009.
-
(2009)
ESE
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
23
-
-
4644274050
-
Predicting source code changes by mining change history
-
A. T. T. Ying, G. C. Murphy, R. Ng, and M. C. Chu-Carroll, "Predicting source code changes by mining change history," IEEE TSE, 30(9):574-586, 2004.
-
(2004)
IEEE TSE
, vol.30
, Issue.9
, pp. 574-586
-
-
Ying, A.T.T.1
Murphy, G.C.2
Ng, R.3
Chu-Carroll, M.C.4
-
24
-
-
24344509258
-
Mining version histories to guide software changes
-
DOI 10.1109/TSE.2005.72
-
T. Zimmermann, P. Weigerber, S. Diehl, and A. Zeller, "Mining version histories to guide software changes," IEEE TSE, 31(6):429-445, 2005. (Pubitemid 41245067)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.6
, pp. 429-445
-
-
Zimmermann, T.1
Weissgerber, P.2
Diehl, S.3
Zeller, A.4
|