-
1
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
DOI 10.1109/TSE.2007.70725
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. on Softw. Engg., 33(9):577-591, 2007. (Pubitemid 47322965)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
2
-
-
84877928105
-
An empirical study on inconsistent changes to code clones at release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan. An empirical study on inconsistent changes to code clones at release level. Science of Computer Programming, 17 pages, 2010.
-
(2010)
Science of Computer Programming
, pp. 17
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
4
-
-
57349188469
-
CloneTracker: Tool support for code clone management
-
E. Duala-Ekoko and M. Robillard. CloneTracker: tool support for code clone management. In ICSE, pages 843-846, 2008.
-
(2008)
ICSE
, pp. 843-846
-
-
Duala-Ekoko, E.1
Robillard, M.2
-
5
-
-
0007508819
-
Algorithms on Strings, Trees, and Sequences
-
Cambridge University Press, 1st edition
-
D. Gusfield. Algorithms on Strings, Trees, and Sequences. Computer and Computational Biology. Cambridge University Press, 1st edition, 1997.
-
(1997)
Computer and Computational Biology
-
-
Gusfield, D.1
-
6
-
-
56249095379
-
CReN: A tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE
-
P. Jablonski and D. Hou. CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE. In ETX, pages 16-20, 2007.
-
(2007)
ETX
, pp. 16-20
-
-
Jablonski, P.1
Hou, D.2
-
7
-
-
77949882149
-
CloneDetective - A workbench for clone detection research
-
E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective - a workbench for clone detection research. In ICSE, pages 603-606, 2009.
-
(2009)
ICSE
, pp. 603-606
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
-
8
-
-
34548718935
-
"Cloning considered harmful" considered harmful
-
C. Kapser and M. Godfrey. "Cloning considered harmful" considered harmful. In WCRE, pages 19-28, 2006.
-
(2006)
WCRE
, pp. 19-28
-
-
Kapser, C.1
Godfrey, M.2
-
9
-
-
73449091494
-
SHINOBI: A tool for automatic code clone detection in the IDE
-
S. Kawaguchi, T. Yamashina, H. Uwano, K. Fushida, Y. Kamei, M. Nagura, and H. Iida. SHINOBI: A tool for automatic code clone detection in the IDE. In WCRE, pages 313-314, 2009.
-
(2009)
WCRE
, pp. 313-314
-
-
Kawaguchi, S.1
Yamashina, T.2
Uwano, H.3
Fushida, K.4
Kamei, Y.5
Nagura, M.6
Iida, H.7
-
10
-
-
0001421462
-
Fast parallel and serial approximate string matching
-
G. Landau and U. Vishkin. Fast parallel and serial approximate string matching. J. Algorithms, 10(2):157-169, 1989.
-
(1989)
J. Algorithms
, vol.10
, Issue.2
, pp. 157-169
-
-
Landau, G.1
Vishkin, U.2
-
11
-
-
78751519375
-
Instant code clone search
-
M. Lee, J. Roh, S. Hwang, and S. Kim. Instant code clone search. In FSE, pages 167-176, 2010.
-
(2010)
FSE
, pp. 167-176
-
-
Lee, M.1
Roh, J.2
Hwang, S.3
Kim, S.4
-
12
-
-
85126165687
-
SDD: High performance code clone detection system for large scale source code
-
S. Lee and I. Jeong. SDD: high performance code clone detection system for large scale source code. In OOPSLA, pages 140-141, 2005.
-
(2005)
OOPSLA
, pp. 140-141
-
-
Lee, S.1
Jeong, I.2
-
13
-
-
77952114282
-
Clone-aware configuration management
-
T. Nguyen, H. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Clone-aware configuration management. In ASE, pages 123-134, 2009.
-
(2009)
ASE
, pp. 123-134
-
-
Nguyen, T.1
Nguyen, H.2
Pham, N.3
Al-Kofahi, J.4
Nguyen, T.5
-
14
-
-
0003676885
-
-
Report TR-15-81, Center for Research in Computing Technology, Harvard University
-
M. Rabin. Fingerprinting by random polynomials. Report TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
-
(1981)
Fingerprinting by Random Polynomials
-
-
Rabin, M.1
-
15
-
-
18144389452
-
Insights into system-wide code duplication
-
M. Rieger, S. Ducasse, and M. Lanza. Insights into system-wide code duplication. In WCRE, pages 100-109, 2004.
-
(2004)
WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
16
-
-
71149111492
-
NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. Roy and J. Cordy. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC, pages 172-181, 2008.
-
(2008)
ICPC
, pp. 172-181
-
-
Roy, C.1
Cordy, J.2
-
17
-
-
69949085058
-
A mutation/injection-based automatic framework for evaluating code clone detection tools
-
C. Roy and J. Cordy. A mutation/injection-based automatic framework for evaluating code clone detection tools. In ICSTW, pages 157-166, 2009.
-
(2009)
ICSTW
, pp. 157-166
-
-
Roy, C.1
Cordy, J.2
-
19
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. Roy, J. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program., 74:470-495, 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, pp. 470-495
-
-
Roy, C.1
Cordy, J.2
Koschke, R.3
-
20
-
-
34248359450
-
Phoenix-based clone detection using suffix trees
-
R. Tairas and J. Gray. Phoenix-based clone detection using suffix trees. In ACM-SE, pages 679-684, 2006.
-
(2006)
ACM-SE
, pp. 679-684
-
-
Tairas, R.1
Gray, J.2
-
21
-
-
72249122818
-
Get to know your clones with CeDAR
-
R. Tairas and J. Gray. Get to know your clones with CeDAR. In OOPSLA, pages 817-818, 2009.
-
(2009)
OOPSLA
, pp. 817-818
-
-
Tairas, R.1
Gray, J.2
-
22
-
-
0001704377
-
On-line construction of suffix trees
-
E. Ukkonen. On-line construction of suffix trees. Algorithmica, 14:249-260, 1995.
-
(1995)
Algorithmica
, vol.14
, pp. 249-260
-
-
Ukkonen, E.1
-
24
-
-
82055196656
-
A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring
-
M. Zibran and C. Roy. A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring. In SCAM, pages 105-114, 2011.
-
(2011)
SCAM
, pp. 105-114
-
-
Zibran, M.1
Roy, C.2
-
25
-
-
79959541424
-
Towards flexible code clone detection, management, and refactoring in IDE
-
M. Zibran and C. Roy. Towards flexible code clone detection, management, and refactoring in IDE. In IWSC, pages 75-76, 2011.
-
(2011)
IWSC
, pp. 75-76
-
-
Zibran, M.1
Roy, C.2
-
26
-
-
79960520851
-
Analyzing and forecasting near-miss clones in evolving software: An empirical study
-
M. Zibran, R. Saha, M. Asaduzzaman, and C. Roy. Analyzing and forecasting near-miss clones in evolving software: An empirical study. In ICECCS, pages 295-304, 2011.
-
(2011)
ICECCS
, pp. 295-304
-
-
Zibran, M.1
Saha, R.2
Asaduzzaman, M.3
Roy, C.4
|