-
1
-
-
83455168936
-
Internet-scale real-time code clone search via multi-level indexing
-
I. Keivanloo, J. Rilling, and P. Charland, "Internet-scale real-time code clone search via multi-level indexing," in WCRE, 2011, pp. 23-27.
-
(2011)
WCRE
, pp. 23-27
-
-
Keivanloo, I.1
Rilling, J.2
Charland, P.3
-
2
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Sci. Comput. Program., vol. 74, pp. 470-495, May 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
3
-
-
32344450436
-
An empirical study of code clone genealogies
-
September
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," SIGSOFT Softw. Eng. Notes, vol. 30, no. 5, pp. 187-196, September 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.5
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
4
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "Ccfinder: A multilinguistic token-based code clone detection system for large scale source code," IEEE Trans. Software Eng., vol. 28, no. 7, pp. 654-670, 2002.
-
(2002)
IEEE Trans. Software Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
5
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder
-
S. Livieri, Y. Higo, M. Matsushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder," in ICSE, 2007, pp. 106-115.
-
(2007)
ICSE
, pp. 106-115
-
-
Livieri, S.1
Higo, Y.2
Matsushita, M.3
Inoue, K.4
-
6
-
-
83455168943
-
On the effectiveness of simhash for detecting near-miss clones in large scale software systems
-
M. S. Uddin, C. K. Roy, K. A. Schneider, and A. Hindle, "On the effectiveness of simhash for detecting near-miss clones in large scale software systems," in WCRE, 2011, pp. 13-22.
-
(2011)
WCRE
, pp. 13-22
-
-
Uddin, M.S.1
Roy, C.K.2
Schneider, K.A.3
Hindle, A.4
-
7
-
-
77953740766
-
Cloning and copying between gnome projects
-
J. Krinke, N. Gold, Y. Jia, and D. Binkley, "Cloning and copying between gnome projects," in MSR, 2010, pp. 98-101.
-
(2010)
MSR
, pp. 98-101
-
-
Krinke, J.1
Gold, N.2
Jia, Y.3
Binkley, D.4
-
8
-
-
78650088347
-
Index-based code clone detection: Incremental, distributed, scalable
-
B. Hummel, E. Juergens, L. Heinemann, and M. Conradt, "Index-based code clone detection: incremental, distributed, scalable," in ICSM, 2010, pp. 1-9.
-
(2010)
ICSM
, pp. 1-9
-
-
Hummel, B.1
Juergens, E.2
Heinemann, L.3
Conradt, M.4
-
9
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier, "Clone detection using abstract syntax trees," in ICSM, 1998, pp. 368-377.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
11
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Sep.
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," IEEE Transactions on Software Engineering, vol. 33, no. 9, pp. 577-591, Sep. 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
12
-
-
78649426786
-
Language-Independent clone detection applied to plagiarism detection
-
R. Brixtel, M. Fontaine, B. Lesner, C. Bazin, and R. Robbes, "Language-Independent clone detection applied to plagiarism detection," in SCAM, 2010, pp. 77-86.
-
(2010)
SCAM
, pp. 77-86
-
-
Brixtel, R.1
Fontaine, M.2
Lesner, B.3
Bazin, C.4
Robbes, R.5
|