메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1289-1292

On how often code is cloned across repositories

Author keywords

Clone detection; Software ecosystems

Indexed keywords

CLONE DETECTION; CODE CLONE; CODE DUPLICATION; LARGE CODE BASIS; SCALE-UP; SINGLE CLONE; SOFTWARE ECOSYSTEMS; SOFTWARE PROJECT; SOURCE CODES;

EID: 84864228150     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2012.6227097     Document Type: Conference Paper
Times cited : (35)

References (12)
  • 1
    • 83455168936 scopus 로고    scopus 로고
    • Internet-scale real-time code clone search via multi-level indexing
    • I. Keivanloo, J. Rilling, and P. Charland, "Internet-scale real-time code clone search via multi-level indexing," in WCRE, 2011, pp. 23-27.
    • (2011) WCRE , pp. 23-27
    • Keivanloo, I.1    Rilling, J.2    Charland, P.3
  • 2
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
    • May
    • C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Sci. Comput. Program., vol. 74, pp. 470-495, May 2009.
    • (2009) Sci. Comput. Program. , vol.74 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 3
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • September
    • M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," SIGSOFT Softw. Eng. Notes, vol. 30, no. 5, pp. 187-196, September 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.5 , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3    Murphy, G.4
  • 4
    • 0036648690 scopus 로고    scopus 로고
    • Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue, "Ccfinder: A multilinguistic token-based code clone detection system for large scale source code," IEEE Trans. Software Eng., vol. 28, no. 7, pp. 654-670, 2002.
    • (2002) IEEE Trans. Software Eng. , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 5
    • 34548789572 scopus 로고    scopus 로고
    • Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder
    • S. Livieri, Y. Higo, M. Matsushita, and K. Inoue, "Very-large scale code clone analysis and visualization of open source programs using distributed ccfinder: D-ccfinder," in ICSE, 2007, pp. 106-115.
    • (2007) ICSE , pp. 106-115
    • Livieri, S.1    Higo, Y.2    Matsushita, M.3    Inoue, K.4
  • 6
    • 83455168943 scopus 로고    scopus 로고
    • On the effectiveness of simhash for detecting near-miss clones in large scale software systems
    • M. S. Uddin, C. K. Roy, K. A. Schneider, and A. Hindle, "On the effectiveness of simhash for detecting near-miss clones in large scale software systems," in WCRE, 2011, pp. 13-22.
    • (2011) WCRE , pp. 13-22
    • Uddin, M.S.1    Roy, C.K.2    Schneider, K.A.3    Hindle, A.4
  • 7
    • 77953740766 scopus 로고    scopus 로고
    • Cloning and copying between gnome projects
    • J. Krinke, N. Gold, Y. Jia, and D. Binkley, "Cloning and copying between gnome projects," in MSR, 2010, pp. 98-101.
    • (2010) MSR , pp. 98-101
    • Krinke, J.1    Gold, N.2    Jia, Y.3    Binkley, D.4
  • 8
    • 78650088347 scopus 로고    scopus 로고
    • Index-based code clone detection: Incremental, distributed, scalable
    • B. Hummel, E. Juergens, L. Heinemann, and M. Conradt, "Index-based code clone detection: incremental, distributed, scalable," in ICSM, 2010, pp. 1-9.
    • (2010) ICSM , pp. 1-9
    • Hummel, B.1    Juergens, E.2    Heinemann, L.3    Conradt, M.4
  • 12
    • 78649426786 scopus 로고    scopus 로고
    • Language-Independent clone detection applied to plagiarism detection
    • R. Brixtel, M. Fontaine, B. Lesner, C. Bazin, and R. Robbes, "Language-Independent clone detection applied to plagiarism detection," in SCAM, 2010, pp. 77-86.
    • (2010) SCAM , pp. 77-86
    • Brixtel, R.1    Fontaine, M.2    Lesner, B.3    Bazin, C.4    Robbes, R.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.