-
1
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder
-
S. Livieri, Y. Higo, M. Matsushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder," in ICSE, 2007.
-
(2007)
ICSE
-
-
Livieri, S.1
Higo, Y.2
Matsushita, M.3
Inoue, K.4
-
2
-
-
4544229973
-
DMS©: Program transformations for practical scalable software evolution
-
I. D. Baxter, C. Pidgeon, and M. Mehlich, "DMS©: Program transformations for practical scalable software evolution," in ICSE, 2004.
-
(2004)
ICSE
-
-
Baxter, I.D.1
Pidgeon, C.2
Mehlich, M.3
-
3
-
-
34548259865
-
Finding clones with Dup: Analysis of an experiment
-
B. S. Baker, "Finding clones with Dup: Analysis of an experiment," IEEE TSE, 2007.
-
(2007)
IEEE TSE
-
-
Baker, B.S.1
-
4
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A multilinguistic token-based code clone detection system for large scale source code," IEEE TSE, 2002.
-
(2002)
IEEE TSE
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
5
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones," in ICSE, 2007.
-
(2007)
ICSE
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
6
-
-
56849129297
-
A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system
-
Y. Higo, S. Kusumoto, and K. Inoue, "A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system," Journal of Software Maintenance, vol. 20, no. 6, pp. 435-461, 2008.
-
(2008)
Journal of Software Maintenance
, vol.20
, Issue.6
, pp. 435-461
-
-
Higo, Y.1
Kusumoto, S.2
Inoue, K.3
-
7
-
-
34548805888
-
Tracking code clones in evolving software
-
E. Duala-Ekoko and M. P. Robillard, "Tracking code clones in evolving software," in ICSE, 2007.
-
(2007)
ICSE
-
-
Duala-Ekoko, E.1
Robillard, M.P.2
-
8
-
-
77952114282
-
Clone-aware configuration management
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen, "Clone-aware configuration management," in ASE, 2009.
-
(2009)
ASE
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
9
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," in ESEC/FSE, 2005.
-
(2005)
ESEC/FSE
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
10
-
-
34548718935
-
Cloning considered harmful" considered harmful
-
C. Kapser and M. W. Godfrey, ""cloning considered harmful" considered harmful," in WCRE, 2006.
-
(2006)
WCRE
-
-
Kapser, C.1
Godfrey, M.W.2
-
12
-
-
37849051720
-
Context-based detection of clone-related bugs
-
L. Jiang, Z. Su, and E. Chiu, "Context-based detection of clone-related bugs," in ESEC/SIGSOFT FSE, 2007.
-
(2007)
ESEC/SIGSOFT FSE
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
13
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, "A study of consistent and inconsistent changes to code clones," in WCRE, 2007.
-
(2007)
WCRE
-
-
Krinke, J.1
-
14
-
-
84910009447
-
CP-Miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "CP-Miner: A tool for finding copy-paste and related bugs in operating system code," in OSDI, 2004.
-
(2004)
OSDI
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
15
-
-
78650078104
-
Scalable and systematic detection of buggy inconsistencies in source code
-
M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su, "Scalable and systematic detection of buggy inconsistencies in source code," in OOPSLA, 2010.
-
(2010)
OOPSLA
-
-
Gabel, M.1
Yang, J.2
Yu, Y.3
Goldszmidt, M.4
Su, Z.5
-
16
-
-
57349145411
-
A criterion for filtering code clone related bugs
-
Y. Hayase, Y. Y. Lee, and K. Inoue, "A criterion for filtering code clone related bugs," in DEFECTS, 2008.
-
(2008)
DEFECTS
-
-
Hayase, Y.1
Lee, Y.Y.2
Inoue, K.3
-
19
-
-
0036472965
-
Test case prioritization: A family of empirical studies
-
S. Elbaum, A. Malishevsky, and G. Rothermel, "Test case prioritization: A family of empirical studies." IEEE Trans. Software Eng., vol. 28, pp. 159-182, 2002.
-
(2002)
IEEE Trans. Software Eng.
, vol.28
, pp. 159-182
-
-
Elbaum, S.1
Malishevsky, A.2
Rothermel, G.3
-
20
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer, "Clone detection in source code by frequent itemset techniques," in SCAM, 2004.
-
(2004)
SCAM
-
-
Wahler, V.1
Seipel, D.2
Von Gudenberg, J.W.3
Fischer, G.4
-
21
-
-
2942747748
-
Using slicing to identify duplication in source code
-
R. Komondoor and S. Horwitz, "Using slicing to identify duplication in source code," in SAS, 2001.
-
(2001)
SAS
-
-
Komondoor, R.1
Horwitz, S.2
-
22
-
-
84864202560
-
Retrieving reusable software by sampling behavior
-
A. Podgurski and L. Pierce, "Retrieving reusable software by sampling behavior," ACM TOSEM, 1993.
-
(1993)
ACM TOSEM
-
-
Podgurski, A.1
Pierce, L.2
-
23
-
-
85084775790
-
Eliminating redundancies with a composition with adaptation" meta-programming technique
-
S. Jarzabek and S. Li, "Eliminating redundancies with a "composition with adaptation" meta-programming technique," in ESEC/FSE, 2003.
-
(2003)
ESEC/FSE
-
-
Jarzabek, S.1
Li, S.2
-
24
-
-
34548787258
-
Using server pages to unify clones in web applications: A trade-off analysis
-
D. C. Rajapakse and S. Jarzabek, "Using server pages to unify clones in web applications: A trade-off analysis," in ICSE, 2007.
-
(2007)
ICSE
-
-
Rajapakse, D.C.1
Jarzabek, S.2
-
25
-
-
56249095379
-
CReN: A tool for tracking copy-and- Paste code clones and renaming identifiers consistently in the IDE
-
P. Jablonski and D. Hou, "CReN: A tool for tracking copy-and- paste code clones and renaming identifiers consistently in the IDE," in ETX, 2007.
-
(2007)
ETX
-
-
Jablonski, P.1
Hou, D.2
-
26
-
-
34548793480
-
Predicting faults from cached history
-
S. Kim, T. Zimmermann, E. J. W. Jr., and A. Zeller, "Predicting faults from cached history," in ICSE, 2007.
-
(2007)
ICSE
-
-
Kim, S.1
Zimmermann, T.2
W Jr., E.J.3
Zeller, A.4
-
27
-
-
37849006243
-
Which warnings should i fix first?
-
S. Kim and M. D. Ernst, "Which warnings should i fix first?" in ESEC-FSE, 2007.
-
(2007)
ESEC-FSE
-
-
Kim, S.1
Ernst, M.D.2
-
28
-
-
57349111758
-
Predicting accurate and actionable static analysis warnings: An experimental approach
-
J. R. Ruthruff, J. Penix, J. D. Morgenthaler, S. Elbaum, and G. Rothermel, "Predicting accurate and actionable static analysis warnings: an experimental approach," in ICSE, 2008.
-
(2008)
ICSE
-
-
Ruthruff, J.R.1
Penix, J.2
Morgenthaler, J.D.3
Elbaum, S.4
Rothermel, G.5
-
29
-
-
77949378886
-
Cross-project defect prediction: A large scale experiment on data vs. domain vs. process
-
T. Zimmermann, N. Nagappan, H. Gall, E. Giger, and B. Murphy, "Cross-project defect prediction: a large scale experiment on data vs. domain vs. process," in ESEC/FSE, 2009.
-
(2009)
ESEC/FSE
-
-
Zimmermann, T.1
Nagappan, N.2
Gall, H.3
Giger, E.4
Murphy, B.5
-
30
-
-
0037587321
-
Automated support for classifying software failure reports
-
A. Podgurski, D. Leon, P. Francis, W. Masri, M. Minch, J. Sun, and B. Wang, "Automated support for classifying software failure reports," in ICSE, 2003, pp. 465-477.
-
(2003)
ICSE
, pp. 465-477
-
-
Podgurski, A.1
Leon, D.2
Francis, P.3
Masri, W.4
Minch, M.5
Sun, J.6
Wang, B.7
-
31
-
-
35248882461
-
Z-ranking: Using statistical analysis to counter the impact of static analysis approximation
-
T. Kremenek and D. Engler, "Z-ranking: Using statistical analysis to counter the impact of static analysis approximation," in SAS, 2003, pp. 295-315.
-
(2003)
SAS
, pp. 295-315
-
-
Kremenek, T.1
Engler, D.2
-
32
-
-
62949138527
-
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
-
S. Heckman and L. Williams, "On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques," in ESEM, 2008, pp. 41-50.
-
(2008)
ESEM
, pp. 41-50
-
-
Heckman, S.1
Williams, L.2
-
36
-
-
84917687527
-
Fault localization with nearest neighbor queries
-
M. Renieris and S. Reiss, "Fault localization with nearest neighbor queries," in ASE, 2003, pp. 30-39.
-
(2003)
ASE
, pp. 30-39
-
-
Renieris, M.1
Reiss, S.2
-
38
-
-
28544439958
-
An effective refinement strategy for knn text classifier
-
S. Tan, "An effective refinement strategy for knn text classifier," Expert Syst. Appl., 2006.
-
(2006)
Expert Syst. Appl.
-
-
Tan, S.1
-
39
-
-
0013155489
-
-
Computer Laboratory, University of Cambridge, Tech. Rep. 209, 1991, extract from Andrew Moore PhD Thesis: Efficient Memory-based Learning for Robot Control
-
A. Moore, "An introductory tutorial on KD-Trees," Computer Laboratory, University of Cambridge, Tech. Rep. 209, 1991, extract from Andrew Moore PhD Thesis: Efficient Memory-based Learning for Robot Control.
-
An Introductory Tutorial on KD-Trees
-
-
Moore, A.1
-
40
-
-
0026156490
-
A nearest hyperrectangle learning method
-
S. Salzberg, "A nearest hyperrectangle learning method," Machine Learning, 1991.
-
(1991)
Machine Learning
-
-
Salzberg, S.1
-
41
-
-
84864197132
-
An experimental comparison of the nearest-neighbour and nearest-hyperrectangle algorithms
-
D. Wettschereck and G. Dietterich, "An experimental comparison of the nearest-neighbour and nearest-hyperrectangle algorithms." Machine Learning, 1994.
-
(1994)
Machine Learning
-
-
Wettschereck, D.1
Dietterich, G.2
-
42
-
-
0004255908
-
-
New York, USA: McGraw-Hill, March
-
T. M. Mitchell, Machine Learning. New York, USA: McGraw-Hill, March 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.M.1
|