-
2
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Bellon, S., Koschke, R., Antoniol, G., Krinke, J. and Merlo, E., "Comparison and Evaluation of Clone Detection Tools, " IEEE Transactions on Software Engineering, 33(9): 577-591. 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
3
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
Bettenburg, N., Weyi, S., Ibrahim, W., Adams, B., Ying, Z. and Hassan, A. E. "An empirical study on inconsistent changes to code clones at release level." In Proceedings of the Reverse Engineering, 2009. WCRE '09. 16th Working Conference on. 2009. pp. 85-94.
-
(2009)
Proceedings of the Reverse Engineering, 2009. WCRE '09. 16th Working Conference on
, pp. 85-94
-
-
Bettenburg, N.1
Weyi, S.2
Ibrahim, W.3
Adams, B.4
Ying, Z.5
Hassan, A.E.6
-
4
-
-
85008047921
-
Software defect reduction top 10 list
-
Boehm, B. and Basili, V. R., "Software Defect Reduction Top 10 List, " IEEE Computer, 34(1): 135-137. 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehm, B.1
Basili, V.R.2
-
5
-
-
84055171990
-
Measuring the efficacy of code clone information: An empirical study
-
[Held during SPLASH]. Oct. 18
-
Chatterji, D., Massengill, B., Oslin, J., Carver, J. and Kraft, N. "Measuring the efficacy of code clone information: An empirical study." In Proceedings of the Evaluation and Usability of Programming Languages and Tools (PLATEAU) [Held during SPLASH]. Oct. 18, 2010.
-
(2010)
Proceedings of the Evaluation and Usability of Programming Languages and Tools (PLATEAU)
-
-
Chatterji, D.1
Massengill, B.2
Oslin, J.3
Carver, J.4
Kraft, N.5
-
7
-
-
70849100995
-
Managing code clones using dynamic change tracking and resolution
-
de Wit, M., Zaidman, A. and van Deursen, A. "Managing code clones using dynamic change tracking and resolution." In Proceedings of the Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. 2009. pp. 169-178.
-
(2009)
Proceedings of the Software Maintenance, 2009. ICSM 2009. IEEE International Conference on
, pp. 169-178
-
-
De Wit, M.1
Zaidman, A.2
Van Deursen, A.3
-
9
-
-
0033687401
-
Leveraging legacy system dollars for e-business
-
Erlikh, L., "Leveraging Legacy System Dollars for E-Business, " IEEE IT Professional, 2(3): 17-23. 2000.
-
(2000)
IEEE IT Professional
, vol.2
, Issue.3
, pp. 17-23
-
-
Erlikh, L.1
-
10
-
-
0004061016
-
-
1st ed. Addison-Wesley
-
Fowler, M., Beck, K., Brant, J., Opdyke, W. and Roberts, D., Refactoring: Improving the Design of Existing Code., 1st ed. Addison-Wesley, 1999.
-
(1999)
Refactoring: Improving the Design of Existing Code
-
-
Fowler, M.1
Beck, K.2
Brant, J.3
Opdyke, W.4
Roberts, D.5
-
12
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
Kamiya, T., Kusumoto, S. and Inoue, K., "CCFinder: a multilinguistic token-based code clone detection system for large scale source code, " IEEE Transactions on Software Engineering, 28(7): 654-670. 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
14
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
Kim, M., Bergman, L., Lau, T. and Notkin, D. "An ethnographic study of copy and paste programming practices in OOPL." In Proceedings of the International Symposium on Empirical Software Engineering (ISESE). 2004. pp. 83-92.
-
(2004)
Proceedings of the International Symposium on Empirical Software Engineering (ISESE)
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
16
-
-
33645819206
-
CP-miner: Finding copy-paste and related bugs in large-scale software code
-
Li, Z., Lu, S., Myagmar, S. and Zhou, Y., "CP-Miner: finding copy-paste and related bugs in large-scale software code, " IEEE Transactions on Software Engineering, 32(3): 176-192. 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
18
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
5/1
-
Roy, C. K., Cordy, J. R. and Koschke, R., "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, " Science of Computer Programming, 74(7): 470-495. 5/1. 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
19
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
Thummalapenta, S., Cerulo, L., Aversano, L. and Di Penta, M., "An empirical study on the maintenance of source code clones, " Empirical Software Engineering, 15(1): 1-34. 2010.
-
(2010)
Empirical Software Engineering
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
-
20
-
-
18744370756
-
Software analysis by code clones in open source software
-
April
-
Uchida, S., Monden, A., Ohsugi, N., Kamiya, T., Matsumoto, K. and Kudo, H., "Software Analysis by Code Clones in Open Source Software, " The Journal of Computer Information Systems, XLV(3): 1-11. April. 2005.
-
(2005)
The Journal of Computer Information Systems
, vol.45
, Issue.3
, pp. 1-11
-
-
Uchida, S.1
Monden, A.2
Ohsugi, N.3
Kamiya, T.4
Matsumoto, K.5
Kudo, H.6
|