-
1
-
-
84860542391
-
Shinobi: A real-time code clone detection tool for software maintenance
-
IEEE Computer Society Press
-
T. Yamashina, H. Uwano, K. Fushida, Y. Kamei, M. Nagura, S. Kawaguchi, and H. Iida, "Shinobi: A real-time code clone detection tool for software maintenance," in Working Conference on Reverse Engineering. IEEE Computer Society Press, 2009, pp. 313-314.
-
(2009)
Working Conference on Reverse Engineering
, pp. 313-314
-
-
Yamashina, T.1
Uwano, H.2
Fushida, K.3
Kamei, Y.4
Nagura, M.5
Kawaguchi, S.6
Iida, H.7
-
2
-
-
83455205912
-
Approximate code search in program histories
-
IEEE Computer Society Press
-
S. Bazrafshan, R. Koschke, and N. Göde, "Approximate code search in program histories," in Working Conference on Reverse Engineering. IEEE Computer Society Press, 2011, pp. 109-118.
-
(2011)
Working Conference on Reverse Engineering
, pp. 109-118
-
-
Bazrafshan, S.1
Koschke, R.2
Göde, N.3
-
3
-
-
84860525995
-
Iman keivanloo and juergen rilling and philippe charland
-
IEEE Computer Society Press
-
S. A. H. A. to Internet-Scale Real-Time Code Clone Search, "Iman keivanloo and juergen rilling and philippe charland," in International Conference on Program Comprehension. IEEE Computer Society Press, 2011, pp. 223-224.
-
(2011)
International Conference on Program Comprehension
, pp. 223-224
-
-
-
4
-
-
83455168936
-
Internet-scale realtime code clone search via multi-level indexing
-
IEEE Computer Society Press
-
I. Keivanloo, J. Rilling, and P. Charland, "Internet-scale realtime code clone search via multi-level indexing," in Working Conference on Reverse Engineering. IEEE Computer Society Press, 2011, pp. 23-27.
-
(2011)
Working Conference on Reverse Engineering
, pp. 23-27
-
-
Keivanloo, I.1
Rilling, J.2
Charland, P.3
-
5
-
-
77956139813
-
A technique for just-intime clone detection in large scale systems
-
IEEE Computer Society Press
-
L. Barbour, H. Yuan, and Y. Zou, "A technique for just-intime clone detection in large scale systems," in International Conference on Program Comprehension. IEEE Computer Society Press, 2010, pp. 76-79.
-
(2010)
International Conference on Program Comprehension
, pp. 76-79
-
-
Barbour, L.1
Yuan, H.2
Zou, Y.3
-
7
-
-
70849100995
-
Managing code clones using dynamic change tracking and resolution
-
IEEE Computer Society Press
-
M. de Wit, A. Zaidman, and A. van Deursen, "Managing code clones using dynamic change tracking and resolution," in International Conference on Software Maintenance. IEEE Computer Society Press, 2009, pp. 169-178.
-
(2009)
International Conference on Software Maintenance
, pp. 169-178
-
-
De Wit, M.1
Zaidman, A.2
Van Deursen, A.3
-
9
-
-
63849324240
-
An evaluation of code similarity identification for the grow-and-prune model
-
March-April
-
T. Mende, R. Koschke, and F. Beckwermert, "An evaluation of code similarity identification for the grow-and-prune model," Journal on Software Maintenance and Evolution, vol. 21, no. 2, pp. 143 - 169, March-April 2009.
-
(2009)
Journal on Software Maintenance and Evolution
, vol.21
, Issue.2
, pp. 143-169
-
-
Mende, T.1
Koschke, R.2
Beckwermert, F.3
-
10
-
-
50249120730
-
Supporting the grow-and-prune model in software product lines evolution using clone detection
-
IEEE Computer Society Press
-
T. Mende, F. Beckwermert, R. Koschke, and G. Meier, "Supporting the grow-and-prune model in software product lines evolution using clone detection," in European Conference on Software Maintenance and Reengineering. IEEE Computer Society Press, 2008, pp. 163-172.
-
(2008)
European Conference on Software Maintenance and Reengineering
, pp. 163-172
-
-
Mende, T.1
Beckwermert, F.2
Koschke, R.3
Meier, G.4
-
12
-
-
84860519340
-
A needle in the stack: Efficient clone detection for huge collections of source code
-
IEEE Computer Society Press
-
B. Hummel, E. Juergens, L. Heinemann, and M. Conradt, "A needle in the stack: efficient clone detection for huge collections of source code," in International Conference on Software Maintenance. IEEE Computer Society Press, 2010, pp. 1-9.
-
(2010)
International Conference on Software Maintenance
, pp. 1-9
-
-
Hummel, B.1
Juergens, E.2
Heinemann, L.3
Conradt, M.4
-
13
-
-
84860500722
-
A needle in the stack: Efficient clone detection for huge collections of source code
-
Jan
-
S. Livieri, D. M. German, and K. Inoue, "A needle in the stack: efficient clone detection for huge collections of source code," University of Osaka, Technical report, Jan. 2010.
-
(2010)
University of Osaka, Technical Report
-
-
Livieri, S.1
German, D.M.2
Inoue, K.3
-
14
-
-
80052416205
-
Exploring large-scale system similarity using incremental clone detection and live scatterplots
-
IEEE Computer Society Press
-
J. R. Cordy, "Exploring large-scale system similarity using incremental clone detection and live scatterplots," in International Conference on Program Comprehension. IEEE Computer Society Press, 2011, pp. 151-160.
-
(2011)
International Conference on Program Comprehension
, pp. 151-160
-
-
Cordy, J.R.1
-
15
-
-
85121829222
-
Survey of research on software clones
-
R. Koschke, E. Merlo, and A. Walenstein, Eds., no. 06301. Dagstuhl, Germany: Dagstuhl. [Online]
-
R. Koschke, "Survey of research on software clones," in Duplication, Redundancy, and Similarity in Software, ser. Dagstuhl Seminar Proceedings, R. Koschke, E. Merlo, and A. Walenstein, Eds., no. 06301. Dagstuhl, Germany: Dagstuhl, 2007. [Online]. Available: http://drops.dagstuhl.de/opus/ volltexte/2007
-
(2007)
Duplication, Redundancy, and Similarity in Software, Ser. Dagstuhl Seminar Proceedings
-
-
Koschke, R.1
-
17
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
Special Issue on Program Comprehension (ICPC 2008)
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Journal of Science of Computer Programming, vol. 74, no. 7, pp. 470-495, 2009, Special Issue on Program Comprehension (ICPC 2008).
-
(2009)
Journal of Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
19
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Sep
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," IEEE Transactions on Software Engineering, vol. 33, no. 9, pp. 577-591, Sep. 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
20
-
-
0036648690
-
CCFinder: A multi- linguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A Multi- Linguistic Token-based Code Clone Detection System for Large Scale Source Code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
21
-
-
34948876329
-
Clone detection using abstract syntax suffix trees
-
IEEE Computer Society Press
-
R. Koschke, R. Falke, and P. Frenzel, "Clone detection using abstract syntax suffix trees," in Working Conference on Reverse Engineering. IEEE Computer Society Press, 2006, pp. 253-262.
-
(2006)
Working Conference on Reverse Engineering
, pp. 253-262
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
22
-
-
56749179725
-
Empirical evaluation of clone detection using syntax suffix trees
-
R. Falke, R. Koschke, and P. Frenzel, "Empirical evaluation of clone detection using syntax suffix trees," Empirical Software Engineering, vol. 13, no. 6, pp. 601-643, 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 601-643
-
-
Falke, R.1
Koschke, R.2
Frenzel, P.3
-
23
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source
-
ACM Press
-
S. Livieri, Y. Higo, M. Matushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source," in International Conference on Software Engineering. ACM Press, 2007, pp. 106-115.
-
(2007)
International Conference on Software Engineering
, pp. 106-115
-
-
Livieri, S.1
Higo, Y.2
Matushita, M.3
Inoue, K.4
-
24
-
-
0016942292
-
A space-economical suffix tree construction algorithm
-
E. McCreight, "A space-economical suffix tree construction algorithm," Journal of the ACM, vol. 32, no. 2, pp. 262-272, 1976.
-
(1976)
Journal of the ACM
, vol.32
, Issue.2
, pp. 262-272
-
-
McCreight, E.1
-
25
-
-
0001704377
-
On-line construction of suffix trees
-
E. Ukkonen, "On-line construction of suffix trees," Algorithmica 14, pp. 249-260, 1995.
-
(1995)
Algorithmica
, vol.14
, pp. 249-260
-
-
Ukkonen, E.1
-
26
-
-
0028516811
-
Sublinear expected time approximate string matching and biological applications
-
W. I. Chang and E. L. Lawler, "Sublinear expected time approximate string matching and biological applications," Algorithmica, vol. 12, pp. 327-344, 1994.
-
(1994)
Algorithmica
, vol.12
, pp. 327-344
-
-
Chang, W.I.1
Lawler, E.L.2
-
29
-
-
34347383992
-
Method and implementation for investigating code clones in a software system
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue, "Method and implementation for investigating code clones in a software system," Information and Software Technology, vol. 49, no. 9-10, pp. 985-998, 2007.
-
(2007)
Information and Software Technology
, vol.49
, Issue.9-10
, pp. 985-998
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
30
-
-
72349089357
-
An assessment of type-3 clones as detected by state-of-the-art tools
-
IEEE Computer Society Press
-
R. Tiarks, R. Koschke, and R. Falke, "An assessment of type-3 clones as detected by state-of-the-art tools," in International Workshop on Source Code Analysis and Manipulation. IEEE Computer Society Press, 2009, pp. 67-76.
-
(2009)
International Workshop on Source Code Analysis and Manipulation
, pp. 67-76
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
-
31
-
-
79952814906
-
An extended assessment of type-3 clones as detected by state-of-the-art tools
-
-, "An extended assessment of type-3 clones as detected by state-of-the-art tools," Software Quality Journal, vol. 19, no. 2, pp. 295-331, 2011.
-
(2011)
Software Quality Journal
, vol.19
, Issue.2
, pp. 295-331
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
-
33
-
-
70449105322
-
Fast optimal algorithms for computing all the repeats in a string
-
S. J. Puglisi, W. F. Smyth, and M. Yusufu, "Fast optimal algorithms for computing all the repeats in a string," in PSC, 2008, pp. 161-169.
-
(2008)
PSC
, pp. 161-169
-
-
Puglisi, S.J.1
Smyth, W.F.2
Yusufu, M.3
-
34
-
-
77953740766
-
Cloning and copying between gnome projects
-
IEEE Computer Society Press
-
J.Krinke, N. Gold, Y. Jia, and D. Binkley, "Cloning and copying between gnome projects," in Working Conference on Mining Software Repositories (MSR). IEEE Computer Society Press, 2010, pp. 98-101.
-
(2010)
Working Conference on Mining Software Repositories (MSR)
, pp. 98-101
-
-
Krinke, J.1
Gold, N.2
Jia, Y.3
Binkley, D.4
-
35
-
-
70349926264
-
Copying 0.03 percent of software code base not "de minimis"
-
N. J. Mertzel, "Copying 0.03 percent of software code base not "de minimis"," Journal of Intellectual Property Law & Practice, vol. 9, no. 3, pp. 547-548, 2008.
-
(2008)
Journal of Intellectual Property Law & Practice
, vol.9
, Issue.3
, pp. 547-548
-
-
Mertzel, N.J.1
|