메뉴 건너뛰기




Volumn , Issue , 2012, Pages 397-407

Active refinement of clone anomaly reports

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; BUG DETECTION; BUG REPORTS; CLASSIFICATION MODELS; CODE STRUCTURE; FALSE POSITIVE; LINUX KERNEL; PROGRAMMING PATTERNS; REFINEMENT PROCESS; SOFTWARE CLONES; TRUE POSITIVE; USER FEEDBACK;

EID: 84864192776     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2012.6227175     Document Type: Conference Paper
Times cited : (27)

References (42)
  • 1
    • 34548789572 scopus 로고    scopus 로고
    • Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder
    • S. Livieri, Y. Higo, M. Matsushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder," in ICSE, 2007.
    • (2007) ICSE
    • Livieri, S.1    Higo, Y.2    Matsushita, M.3    Inoue, K.4
  • 2
    • 4544229973 scopus 로고    scopus 로고
    • DMS©: Program transformations for practical scalable software evolution
    • I. D. Baxter, C. Pidgeon, and M. Mehlich, "DMS©: Program transformations for practical scalable software evolution," in ICSE, 2004.
    • (2004) ICSE
    • Baxter, I.D.1    Pidgeon, C.2    Mehlich, M.3
  • 3
    • 34548259865 scopus 로고    scopus 로고
    • Finding clones with Dup: Analysis of an experiment
    • B. S. Baker, "Finding clones with Dup: Analysis of an experiment," IEEE TSE, 2007.
    • (2007) IEEE TSE
    • Baker, B.S.1
  • 4
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A multilinguistic token-based code clone detection system for large scale source code," IEEE TSE, 2002.
    • (2002) IEEE TSE
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 5
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and accurate tree-based detection of code clones
    • L. Jiang, G. Misherghi, Z. Su, and S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones," in ICSE, 2007.
    • (2007) ICSE
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 6
    • 56849129297 scopus 로고    scopus 로고
    • A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system
    • Y. Higo, S. Kusumoto, and K. Inoue, "A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system," Journal of Software Maintenance, vol. 20, no. 6, pp. 435-461, 2008.
    • (2008) Journal of Software Maintenance , vol.20 , Issue.6 , pp. 435-461
    • Higo, Y.1    Kusumoto, S.2    Inoue, K.3
  • 7
    • 34548805888 scopus 로고    scopus 로고
    • Tracking code clones in evolving software
    • E. Duala-Ekoko and M. P. Robillard, "Tracking code clones in evolving software," in ICSE, 2007.
    • (2007) ICSE
    • Duala-Ekoko, E.1    Robillard, M.P.2
  • 10
    • 34548718935 scopus 로고    scopus 로고
    • Cloning considered harmful" considered harmful
    • C. Kapser and M. W. Godfrey, ""cloning considered harmful" considered harmful," in WCRE, 2006.
    • (2006) WCRE
    • Kapser, C.1    Godfrey, M.W.2
  • 12
    • 37849051720 scopus 로고    scopus 로고
    • Context-based detection of clone-related bugs
    • L. Jiang, Z. Su, and E. Chiu, "Context-based detection of clone-related bugs," in ESEC/SIGSOFT FSE, 2007.
    • (2007) ESEC/SIGSOFT FSE
    • Jiang, L.1    Su, Z.2    Chiu, E.3
  • 13
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • J. Krinke, "A study of consistent and inconsistent changes to code clones," in WCRE, 2007.
    • (2007) WCRE
    • Krinke, J.1
  • 14
    • 84910009447 scopus 로고    scopus 로고
    • CP-Miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "CP-Miner: A tool for finding copy-paste and related bugs in operating system code," in OSDI, 2004.
    • (2004) OSDI
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 15
    • 78650078104 scopus 로고    scopus 로고
    • Scalable and systematic detection of buggy inconsistencies in source code
    • M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su, "Scalable and systematic detection of buggy inconsistencies in source code," in OOPSLA, 2010.
    • (2010) OOPSLA
    • Gabel, M.1    Yang, J.2    Yu, Y.3    Goldszmidt, M.4    Su, Z.5
  • 16
    • 57349145411 scopus 로고    scopus 로고
    • A criterion for filtering code clone related bugs
    • Y. Hayase, Y. Y. Lee, and K. Inoue, "A criterion for filtering code clone related bugs," in DEFECTS, 2008.
    • (2008) DEFECTS
    • Hayase, Y.1    Lee, Y.Y.2    Inoue, K.3
  • 17
    • 79953173566 scopus 로고    scopus 로고
    • Mining discriminative patterns for classifying trajectories on road networks
    • J.-G. Lee, J. Han, X.Li, and H. Cheng, "Mining discriminative patterns for classifying trajectories on road networks." IEEE Trans. Knowl. Data Eng., 2011.
    • (2011) IEEE Trans. Knowl. Data Eng.
    • Lee, J.-G.1    Han, J.2    Li, X.3    Cheng, H.4
  • 19
    • 0036472965 scopus 로고    scopus 로고
    • Test case prioritization: A family of empirical studies
    • S. Elbaum, A. Malishevsky, and G. Rothermel, "Test case prioritization: A family of empirical studies." IEEE Trans. Software Eng., vol. 28, pp. 159-182, 2002.
    • (2002) IEEE Trans. Software Eng. , vol.28 , pp. 159-182
    • Elbaum, S.1    Malishevsky, A.2    Rothermel, G.3
  • 20
    • 14344258876 scopus 로고    scopus 로고
    • Clone detection in source code by frequent itemset techniques
    • V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer, "Clone detection in source code by frequent itemset techniques," in SCAM, 2004.
    • (2004) SCAM
    • Wahler, V.1    Seipel, D.2    Von Gudenberg, J.W.3    Fischer, G.4
  • 21
    • 2942747748 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • R. Komondoor and S. Horwitz, "Using slicing to identify duplication in source code," in SAS, 2001.
    • (2001) SAS
    • Komondoor, R.1    Horwitz, S.2
  • 22
    • 84864202560 scopus 로고
    • Retrieving reusable software by sampling behavior
    • A. Podgurski and L. Pierce, "Retrieving reusable software by sampling behavior," ACM TOSEM, 1993.
    • (1993) ACM TOSEM
    • Podgurski, A.1    Pierce, L.2
  • 23
    • 85084775790 scopus 로고    scopus 로고
    • Eliminating redundancies with a composition with adaptation" meta-programming technique
    • S. Jarzabek and S. Li, "Eliminating redundancies with a "composition with adaptation" meta-programming technique," in ESEC/FSE, 2003.
    • (2003) ESEC/FSE
    • Jarzabek, S.1    Li, S.2
  • 24
    • 34548787258 scopus 로고    scopus 로고
    • Using server pages to unify clones in web applications: A trade-off analysis
    • D. C. Rajapakse and S. Jarzabek, "Using server pages to unify clones in web applications: A trade-off analysis," in ICSE, 2007.
    • (2007) ICSE
    • Rajapakse, D.C.1    Jarzabek, S.2
  • 25
    • 56249095379 scopus 로고    scopus 로고
    • CReN: A tool for tracking copy-and- Paste code clones and renaming identifiers consistently in the IDE
    • P. Jablonski and D. Hou, "CReN: A tool for tracking copy-and- paste code clones and renaming identifiers consistently in the IDE," in ETX, 2007.
    • (2007) ETX
    • Jablonski, P.1    Hou, D.2
  • 27
    • 37849006243 scopus 로고    scopus 로고
    • Which warnings should i fix first?
    • S. Kim and M. D. Ernst, "Which warnings should i fix first?" in ESEC-FSE, 2007.
    • (2007) ESEC-FSE
    • Kim, S.1    Ernst, M.D.2
  • 28
    • 57349111758 scopus 로고    scopus 로고
    • Predicting accurate and actionable static analysis warnings: An experimental approach
    • J. R. Ruthruff, J. Penix, J. D. Morgenthaler, S. Elbaum, and G. Rothermel, "Predicting accurate and actionable static analysis warnings: an experimental approach," in ICSE, 2008.
    • (2008) ICSE
    • Ruthruff, J.R.1    Penix, J.2    Morgenthaler, J.D.3    Elbaum, S.4    Rothermel, G.5
  • 29
    • 77949378886 scopus 로고    scopus 로고
    • Cross-project defect prediction: A large scale experiment on data vs. domain vs. process
    • T. Zimmermann, N. Nagappan, H. Gall, E. Giger, and B. Murphy, "Cross-project defect prediction: a large scale experiment on data vs. domain vs. process," in ESEC/FSE, 2009.
    • (2009) ESEC/FSE
    • Zimmermann, T.1    Nagappan, N.2    Gall, H.3    Giger, E.4    Murphy, B.5
  • 31
    • 35248882461 scopus 로고    scopus 로고
    • Z-ranking: Using statistical analysis to counter the impact of static analysis approximation
    • T. Kremenek and D. Engler, "Z-ranking: Using statistical analysis to counter the impact of static analysis approximation," in SAS, 2003, pp. 295-315.
    • (2003) SAS , pp. 295-315
    • Kremenek, T.1    Engler, D.2
  • 32
    • 62949138527 scopus 로고    scopus 로고
    • On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques
    • S. Heckman and L. Williams, "On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques," in ESEM, 2008, pp. 41-50.
    • (2008) ESEM , pp. 41-50
    • Heckman, S.1    Williams, L.2
  • 36
    • 84917687527 scopus 로고    scopus 로고
    • Fault localization with nearest neighbor queries
    • M. Renieris and S. Reiss, "Fault localization with nearest neighbor queries," in ASE, 2003, pp. 30-39.
    • (2003) ASE , pp. 30-39
    • Renieris, M.1    Reiss, S.2
  • 38
    • 28544439958 scopus 로고    scopus 로고
    • An effective refinement strategy for knn text classifier
    • S. Tan, "An effective refinement strategy for knn text classifier," Expert Syst. Appl., 2006.
    • (2006) Expert Syst. Appl.
    • Tan, S.1
  • 39
    • 0013155489 scopus 로고    scopus 로고
    • Computer Laboratory, University of Cambridge, Tech. Rep. 209, 1991, extract from Andrew Moore PhD Thesis: Efficient Memory-based Learning for Robot Control
    • A. Moore, "An introductory tutorial on KD-Trees," Computer Laboratory, University of Cambridge, Tech. Rep. 209, 1991, extract from Andrew Moore PhD Thesis: Efficient Memory-based Learning for Robot Control.
    • An Introductory Tutorial on KD-Trees
    • Moore, A.1
  • 40
    • 0026156490 scopus 로고
    • A nearest hyperrectangle learning method
    • S. Salzberg, "A nearest hyperrectangle learning method," Machine Learning, 1991.
    • (1991) Machine Learning
    • Salzberg, S.1
  • 41
    • 84864197132 scopus 로고
    • An experimental comparison of the nearest-neighbour and nearest-hyperrectangle algorithms
    • D. Wettschereck and G. Dietterich, "An experimental comparison of the nearest-neighbour and nearest-hyperrectangle algorithms." Machine Learning, 1994.
    • (1994) Machine Learning
    • Wettschereck, D.1    Dietterich, G.2
  • 42
    • 0004255908 scopus 로고    scopus 로고
    • New York, USA: McGraw-Hill, March
    • T. M. Mitchell, Machine Learning. New York, USA: McGraw-Hill, March 1997.
    • (1997) Machine Learning
    • Mitchell, T.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.