-
1
-
-
34247101896
-
Who should fix this bug?
-
Anvik, J., Hiew, L., Murphy, G. Who should fix this bug? In ICSE, 361-370, 2006.
-
(2006)
ICSE
, pp. 361-370
-
-
Anvik, J.1
Hiew, L.2
Murphy, G.3
-
3
-
-
0031276011
-
Bayesian network classifiers
-
Friedman, N., Geiger, D., and Goldszmidt, M. Bayesian Network Classifiers, Machine Learning, 29(2-3), 131-163, 1997.
-
(1997)
Machine Learning
, vol.29
, Issue.2-3
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
4
-
-
32344450436
-
An empirical study of code clone genealogies
-
Kim, M., Sazawal, V., Notkin, D., and Murphy, G. An empirical study of code clone genealogies, In FSE, 187-196, 2005.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
5
-
-
33749682962
-
-
Frank, E., Hall, M., Holmes, G., Kirkby, R., Pfahringer, B., Witten, I. H., and Trigg, L. Weka, Data Mining and Knowledge Discovery Handbook, 1305-1314, 2005.
-
(2005)
Data Mining and Knowledge Discovery Handbook
, pp. 1305-1314
-
-
Frank, E.1
Hall, M.2
Holmes, G.3
Kirkby, R.4
Pfahringer, B.5
Witten, I.H.6
Trigg, L.W.7
-
6
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Kohavi, R. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection, In IJCAI, 1137-1145, 1995.
-
(1995)
IJCAI
, pp. 1137-1145
-
-
Kohavi, R.1
-
7
-
-
79959897807
-
Frequency and risks of changes to clones
-
Gode, N., Koschke, R. Frequency and risks of changes to clones, In ICSE, 311-320, 2011.
-
(2011)
ICSE
, pp. 311-320
-
-
Gode, N.1
Koschke, R.2
-
8
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
Thummalapenta, S., Cerulo, L., Aversano, L., and Penta, M. D. An empirical study on the maintenance of source code clones, Emprical Software Engineering, 15(1), 1-34, 2010.
-
(2010)
Emprical Software Engineering
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
9
-
-
79953174967
-
An empirical study of long-lived code clones
-
Cai, D., and Kim, M. An Empirical Study of Long-Lived Code Clones, In FASE, 432-446, 2011.
-
(2011)
FASE
, pp. 432-446
-
-
Cai, D.1
Kim, M.2
-
10
-
-
0029222025
-
On finding duplication and near-duplication in large software system
-
Baker, B. S. On finding Duplication and Near-Duplication in Large Software System, In WCRE, 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.S.1
-
11
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
Kamiya, T., Kusumoto, S., Inoue, K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code, TSE, 28(7), 654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
12
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Li, Z., Lu, S., Myagmar, S., and Zhou, Y. CP-Miner: finding copy-paste and related bugs in large-scale software code, TSE, 32(3), 176-192, 2006.
-
(2006)
TSE
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
13
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
Jiang, L., Misherghi, G., Su, Z., and Glondu, S. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones, In ICSE, 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
14
-
-
57349194546
-
Scalable detection of semantic clones
-
Gabel, M., Jiang, L., and Su, Z. Scalable detection of semantic clones, In ICSE, 321-330, 2008.
-
(2008)
ICSE
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
15
-
-
78649766952
-
Matching dependence-related queries in the system dependence graph
-
Wang, X., Lo, D., Cheng, J., Zhang, L., Mei, H., and Yu, J. X.: Matching dependence-related queries in the system dependence graph In ASE, 457-466, 2010.
-
(2010)
ASE
, pp. 457-466
-
-
Wang, X.1
Lo, D.2
Cheng, J.3
Zhang, L.4
Mei, H.5
Yu, J.X.6
-
16
-
-
0345566149
-
A guided tour to approximate string matching
-
Navarro, G. A guided tour to approximate string matching, ACM Computing Surveys, 33(1), 31-88, 2001.
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.1
, pp. 31-88
-
-
Navarro, G.1
-
17
-
-
79959862704
-
MeCC: Memory comparison-based clone detector
-
Kim, H., Jung, Y., Kim, S., and Yi, K. MeCC: memory comparison-based clone detector, In ICSE, 301-310, 2011.
-
(2011)
ICSE
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
18
-
-
79959572813
-
Code clone detection experience at Microsoft
-
Dang, Y., Song, G., Huang, R., and Zhang, D. Code Clone Detection Experience at Microsoft, Proceedings of International Workshop on Software Clones, 63-64, 2011.
-
(2011)
Proceedings of International Workshop on Software Clones
, pp. 63-64
-
-
Dang, Y.1
Song, G.2
Huang, R.3
Zhang, D.4
-
19
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
Menzies, T., Greenwald, J., and Frank, A. Data Mining Static Code Attributes to Learn Defect Predictors, TSE, 33(1), 2-13, 2007.
-
(2007)
TSE
, vol.33
, Issue.1
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
20
-
-
0035152294
-
Comparing case-based reasoning classifiers for predicting high risk software components
-
Emam, K., Benlarbib, S., Goelb, N., Raic, S. N. Comparing case-based reasoning classifiers for predicting high risk software components, JSS, 55(3), 301-320, 2001.
-
(2001)
JSS
, vol.55
, Issue.3
, pp. 301-320
-
-
Emam, K.1
Benlarbib, S.2
Goelb, N.3
Raic, S.N.4
-
21
-
-
79959899057
-
Dealing with noise in defect prediction
-
Kim, S., Zhang, H., Wu, R., and Gong, L. Dealing with noise in defect prediction, In ICSE, 481-490, 2011.
-
(2011)
ICSE
, pp. 481-490
-
-
Kim, S.1
Zhang, H.2
Wu, R.3
Gong, L.4
-
22
-
-
37849051720
-
Context-based detection of clone-related bugs
-
Jiang, L., Su, Z., Chiu, E. Context-based detection of clone-related bugs, In FSE, 55-64, 2007.
-
(2007)
FSE
, pp. 55-64
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
23
-
-
57749209364
-
An empirical study of function clones in open source software
-
Roy, C. and Cordy, J. An Empirical Study of Function Clones in Open Source Software, In WCRE, 81-90, 2008.
-
(2008)
WCRE
, pp. 81-90
-
-
Roy, C.1
Cordy, J.2
-
24
-
-
56749132226
-
Cloning considered harmful" considered harmful: Patterns of cloning
-
Kapser, C. and Godfrey, M. "Cloning considered harmful" considered harmful: patterns of cloning in software Empirical Software Engineering, 13(6), 645-692, 2008.
-
(2008)
Software Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.2
-
25
-
-
77954705962
-
Can clone detection support quality assessments of requirements specifications?
-
Juergens, E., Deissenboeck, F., Feilkas, M., Hummel, B., Schaetz, B., Wagner, S., Domann, C., Streit, J.: Can Clone Detection Support Quality Assessments of Requirements Specifications? In ICSE, 79-88, 2010.
-
(2010)
ICSE
, pp. 79-88
-
-
Juergens, E.1
Deissenboeck, F.2
Feilkas, M.3
Hummel, B.4
Schaetz, B.5
Wagner, S.6
Domann, C.7
Streit, J.8
-
26
-
-
58149412516
-
Weighted kappa: Nominal scale agreement with provision for scaled disagreement or partial credit
-
Cohen, J.: Weighted kappa: Nominal scale agreement with provision for scaled disagreement or partial credit Psychological Bulletin, 70 (4), 213-220, 1968.
-
(1968)
Psychological Bulletin
, vol.70
, Issue.4
, pp. 213-220
-
-
Cohen, J.1
|