메뉴 건너뛰기




Volumn , Issue , 2012, Pages 369-378

XIAO: Tuning code clones at hands of engineers in practice

Author keywords

Code clone; Code duplication; Code clone detection; Code clone search; Duplicated security vulnerability

Indexed keywords

ACADEMIC RESEARCH; CODE CLONE; CODE DUPLICATION; CODE FRAGMENTS; CODE-CLONE SEARCH; COPY-AND-PASTE; EMPIRICAL STUDIES; HIGH TUNABILITY; INDUSTRIAL EXPERIENCE; MICROSOFT; QUALITY IMPROVEMENT; REFACTORINGS; SECURITY BUGS; SECURITY VULNERABILITIES; SUCCESS FACTORS; TOOL SUPPORT; VISUAL STUDIOS;

EID: 84872120272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2420950.2421004     Document Type: Conference Paper
Times cited : (49)

References (31)
  • 1
    • 84872114727 scopus 로고    scopus 로고
    • as of Feb. 26, 2011
    • http://en.wiktionary.org/wiki/inversion-pair, as of Feb. 26, 2011.
  • 2
    • 84872116578 scopus 로고    scopus 로고
    • http://www.slideshare.net/icsm2011/lionel-briand-icsm-2011-keynote
  • 3
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • B. S. Baker. On finding duplication and near-duplication in large software systems. In Proc. WCRE, pages 86-95, 1995.
    • (1995) Proc. WCRE , pp. 86-95
    • Baker, B.S.1
  • 4
    • 4544229973 scopus 로고    scopus 로고
    • DMSR: Program transformations for practical scalable software evolution
    • I. D. Baxter, C. Pidgeon, and M. Mehlich. DMSR: Program transformations for practical scalable software evolution. In Proc. ICSE, pages 625-634, 2004.
    • (2004) Proc. ICSE , pp. 625-634
    • Baxter, I.D.1    Pidgeon, C.2    Mehlich, M.3
  • 8
    • 79959572813 scopus 로고    scopus 로고
    • Code clone detection experience at Microsoft
    • Y. Dang, S. Ge, R. Huang, and D. Zhang. Code clone detection experience at Microsoft. In Proc. IWSC, pages 63-64, 2011.
    • (2011) Proc. IWSC , pp. 63-64
    • Dang, Y.1    Ge, S.2    Huang, R.3    Zhang, D.4
  • 10
    • 78650078104 scopus 로고    scopus 로고
    • Scalable and systematic detection of buggy inconsistencies in source code
    • M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su. Scalable and systematic detection of buggy inconsistencies in source code. In Proc. OOPSLA, pages 175-190, 2010.
    • (2010) Proc. OOPSLA , pp. 175-190
    • Gabel, M.1    Yang, J.2    Yu, Y.3    Goldszmidt, M.4    Su, Z.5
  • 11
    • 57349194546 scopus 로고    scopus 로고
    • Scalable detection of semantic clones
    • M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In Proc. ICSE, pages 321-330, 2008.
    • (2008) Proc. ICSE , pp. 321-330
    • Gabel, M.1    Jiang, L.2    Su, Z.3
  • 12
    • 77953769912 scopus 로고    scopus 로고
    • ARIES: Refactoring support tool for code clone
    • Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. ARIES: Refactoring support tool for code clone. In Proc. WoSQ, pages 1-4, 2005.
    • (2005) Proc. WoSQ , pp. 1-4
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 13
    • 84872099143 scopus 로고    scopus 로고
    • ReDeBug: Finding unpatched code clones in entire OS distributions
    • J. Jang, A. Agrawal, and D. Brumley. ReDeBug: Finding unpatched code clones in entire OS distributions. In Proc. S&P, pages 48-62, 2012.
    • (2012) Proc. S&P , pp. 48-62
    • Jang, J.1    Agrawal, A.2    Brumley, D.3
  • 15
    • 37849051720 scopus 로고    scopus 로고
    • Context-based detection of clone-related bugs
    • L. Jiang, Z. Su, and E. Chiu. Context-based detection of clone-related bugs. In Proc. ESEC/FSE, pages 55-64, 2007.
    • (2007) Proc. ESEC/FSE , pp. 55-64
    • Jiang, L.1    Su, Z.2    Chiu, E.3
  • 17
    • 77954720418 scopus 로고    scopus 로고
    • Achieving accurate clone detection results
    • E. Juergens and N. Göde. Achieving accurate clone detection results. In Proc. IWSC, pages 1-8, 2010.
    • (2010) Proc. IWSC , pp. 1-8
    • Juergens, E.1    Göde, N.2
  • 18
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
    • (2002) TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 19
    • 79959862704 scopus 로고    scopus 로고
    • MeCC: Memory comparison-based clone detector
    • H. Kim, Y. Jung, S. Kim, and K. Yi. MeCC: Memory comparison-based clone detector. In Proc. ICSE, pages 301-310, 2011.
    • (2011) Proc. ICSE , pp. 301-310
    • Kim, H.1    Jung, Y.2    Kim, S.3    Yi, K.4
  • 21
    • 84910009447 scopus 로고    scopus 로고
    • CP-Miner: A tool for finding copy-paste and related bugs in operating system code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. Proc. OSDI, pages 289-302, 2004.
    • (2004) Proc. OSDI , pp. 289-302
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 23
    • 84864237204 scopus 로고    scopus 로고
    • CBCD: Cloned buggy code detector
    • J. Li and M. D. Ernst. CBCD: Cloned buggy code detector. In Proc. ICSE, pages 310-320, 2012.
    • (2012) Proc. ICSE , pp. 310-320
    • Li, J.1    Ernst, M.D.2
  • 24
    • 34548789572 scopus 로고    scopus 로고
    • Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder
    • DOI 10.1109/ICSE.2007.97, 4222573, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
    • S. Livieri, Y. Higo, M. Matushita, and K. Inoue. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In Proc. ICSE, pages 106-115, 2007. (Pubitemid 47430646)
    • (2007) Proceedings - International Conference on Software Engineering , pp. 106-115
    • Livieri, S.1    Higo, Y.2    Matushita, M.3    Inoue, K.4
  • 26
    • 78649426786 scopus 로고    scopus 로고
    • Language-independent clone detection applied to plagiarism detection
    • R. Robbes, R. Brixtel, M. Fontaine, B. Lesner, and C. Bazin. Language-independent clone detection applied to plagiarism detection. In Proc. SCAM, pages 77-86, 2010.
    • (2010) Proc. SCAM , pp. 77-86
    • Robbes, R.1    Brixtel, R.2    Fontaine, M.3    Lesner, B.4    Bazin, C.5
  • 27
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
    • C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. In Science of Computer Programming, 74(7):470-495, 2009.
    • (2009) Science of Computer Programming , vol.74 , Issue.7 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 28
    • 72349089357 scopus 로고    scopus 로고
    • An assessment of type-3 clones as detected by state-of-the-art tools
    • R. Tiarks, R. Koschke, and R. Falke. An assessment of type-3 clones as detected by state-of-the-art tools. In Proc. SCAM, pages 67-76, 2009.
    • (2009) Proc. SCAM , pp. 67-76
    • Tiarks, R.1    Koschke, R.2    Falke, R.3
  • 29
    • 84948459152 scopus 로고    scopus 로고
    • Gemini: Maintenance support environment based on code clone analysis
    • Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In Proc. IEEE METRICS, pages 67-76, 2002.
    • (2002) Proc. IEEE METRICS , pp. 67-76
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 31
    • 84872115758 scopus 로고    scopus 로고
    • Improving modularity by refactoring code clones: A feasibility study on Linux
    • L. Yu and S. Ramaswamy. Improving modularity by refactoring code clones: A feasibility study on Linux. In SIGSOFT Notes, 33(2), 2008.
    • (2008) SIGSOFT Notes , vol.33 , Issue.2
    • Yu, L.1    Ramaswamy, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.