-
1
-
-
0036648690
-
CCFinder: A Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code
-
July
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: a Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code," IEEE Trans on Software Engineering, vol. 28, no. 7, pp. 654-670, July 2002.
-
(2002)
IEEE Trans on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
2
-
-
33645819206
-
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
-
March
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code," IEEE Trans on Software Engineering, vol. 32, no. 3, pp. 176-192, March 2006.
-
(2006)
IEEE Trans on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
3
-
-
0033308732
-
A Language Independent Approach for Detecting Duplicated Code
-
IEEE Press, Sept.
-
S. Ducasse, M. Rieger, and S. Demeyer, "A Language Independent Approach for Detecting Duplicated Code," Proc. IEEE intl. conf. on Software Maintenance (ICSM'99), IEEE Press, Sept. 1999, pp. 109-118.
-
(1999)
Proc. IEEE Intl. Conf. on Software Maintenance (ICSM'99)
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
4
-
-
0029222025
-
On Finding Duplication and Near-duplication in Large Software Systems
-
IEEE Press, July
-
B. S. Baker, "On Finding Duplication and Near-duplication in Large Software Systems," Proc. the Second Working Conference on Reverse Engineering, IEEE Press, July 1995, pp. 86-95.
-
(1995)
Proc. the Second Working Conference on Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
5
-
-
34948876329
-
Clone Detection Using Abstract Syntax Suffix Trees
-
IEEE Press, Oct.
-
R. Koschke, R. Falke, and P. Frenzel, "Clone Detection Using Abstract Syntax Suffix Trees," Proc. the 13th Working Conference on Reverse Engineering, IEEE Press, Oct. 2006, pp. 253-262.
-
(2006)
Proc. the 13th Working Conference on Reverse Engineering
, pp. 253-262
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
6
-
-
34548767669
-
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
-
IEEE Press, May
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu, "DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones," Proc. Intl. conf. on Software Engineering (ICSE'07), IEEE Press, May 2007, pp. 96-105.
-
(2007)
Proc. Intl. Conf. on Software Engineering (ICSE'07)
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
9
-
-
33749559863
-
GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis
-
ACM Press, Aug.
-
C. Liu, C. Chen, J. Han, and P. S. Yu, "GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis," Proc. 12th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, ACM Press, Aug. 2006, pp. 872-881.
-
(2006)
Proc. 12th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining
, pp. 872-881
-
-
Liu, C.1
Chen, C.2
Han, J.3
Yu, P.S.4
-
10
-
-
57349194546
-
Scalable Detection of Semantic Clones
-
ACM Press, May
-
M. Gabel, L. Jiang, and Z. Su, "Scalable Detection of Semantic Clones," Proc. Int. Conf. on Software Engineering (ICSE'08), ACM Press, May 2008, pp. 321-330.
-
(2008)
Proc. Int. Conf. on Software Engineering (ICSE'08)
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
11
-
-
0036041421
-
An Empirical Study of Operating Systems Errors
-
ACM Press, Oct.
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler, "An Empirical Study of Operating Systems Errors," Proc. the 8th ACM Symp. on Operating Systems Principles, ACM Press, Oct. 2001, pp. 73-88.
-
(2001)
Proc. the 8th ACM Symp. on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
12
-
-
4644303571
-
(Sub)Graph Isomorphism Algorithm for Matching Large Graphs
-
Oct.
-
L. P. Cordella, P. Foggia, C. Sansone, and M. A. Vento, "(Sub)Graph Isomorphism Algorithm for Matching Large Graphs," IEEE Trans on Pattern Analysis and Machine Intelligence, vol. 26, no. 10, pp. 1367-1372, Oct. 2004.
-
(2004)
IEEE Trans on Pattern Analysis and Machine Intelligence
, vol.26
, Issue.10
, pp. 1367-1372
-
-
Cordella, L.P.1
Foggia, P.2
Sansone, C.3
Vento, M.A.4
-
13
-
-
85025192644
-
The Graph Isomorphism Disease
-
Winter
-
R. C. Read, and D. G. Corneil, "The Graph Isomorphism Disease," Journal of Graph Theory, vol. 1, no. 4, pp. 339-363, Winter 1977.
-
(1977)
Journal of Graph Theory
, vol.1
, Issue.4
, pp. 339-363
-
-
Read, R.C.1
Corneil, D.G.2
-
14
-
-
84885626052
-
-
CodeSurfer: http://www.grammatech.com/products/codesurfer/overview.html
-
CodeSurfer
-
-
-
15
-
-
0023385308
-
The Program Dependence Graph and its Use in Optimization
-
July
-
J. Ferrante, K. J. Ottenstein, and J. D. Warren, "The Program Dependence Graph and its Use in Optimization," ACM Trans on Programming Languages and Systems, vol. 9, no. 3, pp. 319-349, July, 1987.
-
(1987)
ACM Trans on Programming Languages and Systems
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
16
-
-
43349094507
-
The Igraph Software Package for Complex Network Research
-
G. Csárdi and T. Nepusz, "The Igraph Software Package for Complex Network Research," InterJournal Complex Systems, 2006, pp. 1695.
-
(2006)
InterJournal Complex Systems
, pp. 1695
-
-
Csárdi, G.1
Nepusz, T.2
-
17
-
-
0002603293
-
Practical Graph Isomorphism
-
B. D. McKay, "Practical Graph Isomorphism," Congressus Numerantium, 30 (1981), pp. 45-87.
-
(1981)
Congressus Numerantium
, vol.30
, pp. 45-87
-
-
McKay, B.D.1
-
18
-
-
78649770545
-
Detection of Recurring Software Vulnerabilities
-
ACM Press, Sept.
-
N. H. Pham, T. T. Nguyen, H. A. Nguyen, and T. N. Nguyen, "Detection of Recurring Software Vulnerabilities," Proc. Intl. Conf. on Automated Software Engineering (ASE'10), ACM Press, Sept. 2010, pp. 447-456.
-
(2010)
Proc. Intl. Conf. on Automated Software Engineering (ASE'10)
, pp. 447-456
-
-
Pham, N.H.1
Nguyen, T.T.2
Nguyen, H.A.3
Nguyen, T.N.4
-
19
-
-
54249146592
-
Discovering Neglected Conditions in Software by Mining Dependence Graphs
-
Sept.
-
R.-Y. Chang, A. Podgurski and J. Yang, "Discovering Neglected Conditions in Software by Mining Dependence Graphs," IEEE Trans on Software Engineering, vol. 34, no. 5, pp. 579-596, Sept. 2008.
-
(2008)
IEEE Trans on Software Engineering
, vol.34
, Issue.5
, pp. 579-596
-
-
Chang, R.-Y.1
Podgurski, A.2
Yang, J.3
-
20
-
-
37849051720
-
Context-based Detection of Clone-related Bugs
-
ACM Press, Sept.
-
L. Jiang, Z. Su, and E. Chiu, "Context-based Detection of Clone-related Bugs," Proc. 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symp. on The foundations of software engineering (ESCE/FSE'07), ACM Press, Sept. 2007, pp. 55-64.
-
(2007)
Proc. 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symp. on the Foundations of Software Engineering (ESCE/FSE'07)
, pp. 55-64
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
21
-
-
77949896388
-
Complete and Accurate Clone Detection in Graph-based Models
-
IEEE Press, May
-
N. H. Pham, H. A. Nguyen, T. T. Nguyen, J. M. Al-Kofahi, and T. N. Nguyen, "Complete and Accurate Clone Detection in Graph-based Models," Proc. Intl. Conf. on Software Engineering (ICSE'09), IEEE Press, May 2009, pp.276-286.
-
(2009)
Proc. Intl. Conf. on Software Engineering (ICSE'09)
, pp. 276-286
-
-
Pham, N.H.1
Nguyen, H.A.2
Nguyen, T.T.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
22
-
-
77954721050
-
Recurring Bug Fixes in Object Oriented Programs
-
ACM Press, May
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen, "Recurring Bug Fixes in Object Oriented Programs," Proc. Intl. Conf. on Software Engineering (ICSE'10), ACM Press, May 2010, pp. 315-324.
-
(2010)
Proc. Intl. Conf. on Software Engineering (ICSE'10)
, pp. 315-324
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
23
-
-
79551665781
-
Scalable and Systematic Detection of Buggy Inconsistencies in Source Code
-
ACM Press, Oct.
-
M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su, "Scalable and Systematic Detection of Buggy Inconsistencies in Source Code," Proc. ACM intl. conf. on Object Oriented Programming Systems Languages and Applications (OOPSLA'10), ACM Press, Oct. 2010, pp. 175-190.
-
(2010)
Proc. ACM Intl. Conf. on Object Oriented Programming Systems Languages and Applications (OOPSLA'10)
, pp. 175-190
-
-
Gabel, M.1
Yang, J.2
Yu, Y.3
Goldszmidt, M.4
Su, Z.5
-
26
-
-
84864186659
-
-
CloneDR: http://www.semdesigns.com/Products/Clone/
-
CloneDR
-
-
-
27
-
-
64549135034
-
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach," Sci. Comput. Program, vol. 74, no. 7, pp. 470-495, May 2009.
-
(2009)
Sci. Comput. Program
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
28
-
-
78649766952
-
Matching Dependence-related Queries in the System Dependence Graph
-
ACM Press, Sept.
-
X. Wang, D. Lo, J. Cheng, L. Zhang, H. Mei, and J. X. Yu, "Matching Dependence-related Queries in the System Dependence Graph," Proc. Intl. Conf. on Automated Software Engineering (ASE'10), ACM Press, Sept. 2010, pp. 457-466.
-
(2010)
Proc. Intl. Conf. on Automated Software Engineering (ASE'10)
, pp. 457-466
-
-
Wang, X.1
Lo, D.2
Cheng, J.3
Zhang, L.4
Mei, H.5
Yu, J.X.6
-
29
-
-
33745203758
-
Finding Application Errors and Security Flaws using PQL: A Program Query Language
-
ACM Press, Oct
-
M. Martin, B. Livshits, and M. S. Lam, "Finding Application Errors and Security Flaws using PQL: a Program Query Language," Proc. ACM intl. conf. on Object Oriented Programming Systems Languages and Applications (OOPSLA'05), ACM Press, Oct, 2005, pp. 365-383.
-
(2005)
Proc. ACM Intl. Conf. on Object Oriented Programming Systems Languages and Applications (OOPSLA'05)
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
30
-
-
34548228440
-
Comparison and Evaluation of Clone Detection Tools
-
Sept.
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo, "Comparison and Evaluation of Clone Detection Tools," IEEE Trans on Software Engineering, vol. 33, no. 9, pp. 577-591, Sept. 2007.
-
(2007)
IEEE Trans on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
33
-
-
79959862704
-
MeCC: Memory Comparison-Based Clone Detector
-
ACM press, May
-
H. Kim, Y. Jung, S. Kim, and K. Yi, "MeCC: Memory Comparison-Based Clone Detector," Proc. 33rd Intl. Conf. on Software engineering (ICSE '11), ACM press, May 2011, pp. 301-310.
-
(2011)
Proc. 33rd Intl. Conf. on Software Engineering (ICSE '11)
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
34
-
-
33947310939
-
Design Pattern Detection Using Similarity Scoring
-
Nov.
-
N. Tsantalis, A. Chatzigeorgiou, G. Stephanides, and S. T. Halkidis, "Design Pattern Detection Using Similarity Scoring," IEEE Trans. On Software Engineering, vol. 32, no. 11, pp. 896-909, Nov. 2006.
-
(2006)
IEEE Trans. On Software Engineering
, vol.32
, Issue.11
, pp. 896-909
-
-
Tsantalis, N.1
Chatzigeorgiou, A.2
Stephanides, G.3
Halkidis, S.T.4
|