-
1
-
-
84872114727
-
-
as of Feb. 26, 2011
-
http://en.wiktionary.org/wiki/inversion-pair, as of Feb. 26, 2011.
-
-
-
-
2
-
-
84872116578
-
-
http://www.slideshare.net/icsm2011/lionel-briand-icsm-2011-keynote
-
-
-
-
3
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. S. Baker. On finding duplication and near-duplication in large software systems. In Proc. WCRE, pages 86-95, 1995.
-
(1995)
Proc. WCRE
, pp. 86-95
-
-
Baker, B.S.1
-
4
-
-
4544229973
-
DMSR: Program transformations for practical scalable software evolution
-
I. D. Baxter, C. Pidgeon, and M. Mehlich. DMSR: Program transformations for practical scalable software evolution. In Proc. ICSE, pages 625-634, 2004.
-
(2004)
Proc. ICSE
, pp. 625-634
-
-
Baxter, I.D.1
Pidgeon, C.2
Mehlich, M.3
-
5
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Proc. ICSM, pages 368-377, 1998.
-
(1998)
Proc. ICSM
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'anna, M.4
Bier, L.5
-
6
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
DOI 10.1109/TSE.2007.70725
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and evaluation of clone detection tools, TSE, 33(9):577-591, 2007. (Pubitemid 47322965)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
7
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, C. Henri-Gros, A. Kamsky, S. McPeak, and D. R. Engler: A few billion lines of code later: using static analysis to find bugs in the real world. Commun. ACM 53(2):66-75, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Bessey, A.1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
Henri-Gros, C.7
Kamsky, A.8
McPeak, S.9
Engler, D.R.10
-
8
-
-
79959572813
-
Code clone detection experience at Microsoft
-
Y. Dang, S. Ge, R. Huang, and D. Zhang. Code clone detection experience at Microsoft. In Proc. IWSC, pages 63-64, 2011.
-
(2011)
Proc. IWSC
, pp. 63-64
-
-
Dang, Y.1
Ge, S.2
Huang, R.3
Zhang, D.4
-
10
-
-
78650078104
-
Scalable and systematic detection of buggy inconsistencies in source code
-
M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and Z. Su. Scalable and systematic detection of buggy inconsistencies in source code. In Proc. OOPSLA, pages 175-190, 2010.
-
(2010)
Proc. OOPSLA
, pp. 175-190
-
-
Gabel, M.1
Yang, J.2
Yu, Y.3
Goldszmidt, M.4
Su, Z.5
-
11
-
-
57349194546
-
Scalable detection of semantic clones
-
M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In Proc. ICSE, pages 321-330, 2008.
-
(2008)
Proc. ICSE
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
12
-
-
77953769912
-
ARIES: Refactoring support tool for code clone
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. ARIES: Refactoring support tool for code clone. In Proc. WoSQ, pages 1-4, 2005.
-
(2005)
Proc. WoSQ
, pp. 1-4
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
13
-
-
84872099143
-
ReDeBug: Finding unpatched code clones in entire OS distributions
-
J. Jang, A. Agrawal, and D. Brumley. ReDeBug: Finding unpatched code clones in entire OS distributions. In Proc. S&P, pages 48-62, 2012.
-
(2012)
Proc. S&P
, pp. 48-62
-
-
Jang, J.1
Agrawal, A.2
Brumley, D.3
-
14
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
DOI 10.1109/ICSE.2007.30, 4222572, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. Proc. ICSE, pages 96-105, 2007. (Pubitemid 47430645)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
15
-
-
37849051720
-
Context-based detection of clone-related bugs
-
L. Jiang, Z. Su, and E. Chiu. Context-based detection of clone-related bugs. In Proc. ESEC/FSE, pages 55-64, 2007.
-
(2007)
Proc. ESEC/FSE
, pp. 55-64
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
16
-
-
73449090740
-
Do code clones matter?
-
E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner, Do code clones matter? In Proc. ICSE, pages 485-495, 2009.
-
(2009)
Proc. ICSE
, pp. 485-495
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
17
-
-
77954720418
-
Achieving accurate clone detection results
-
E. Juergens and N. Göde. Achieving accurate clone detection results. In Proc. IWSC, pages 1-8, 2010.
-
(2010)
Proc. IWSC
, pp. 1-8
-
-
Juergens, E.1
Göde, N.2
-
18
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
19
-
-
79959862704
-
MeCC: Memory comparison-based clone detector
-
H. Kim, Y. Jung, S. Kim, and K. Yi. MeCC: Memory comparison-based clone detector. In Proc. ICSE, pages 301-310, 2011.
-
(2011)
Proc. ICSE
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
21
-
-
84910009447
-
CP-Miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. Proc. OSDI, pages 289-302, 2004.
-
(2004)
Proc. OSDI
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
22
-
-
84872117230
-
Instant code clone search
-
M. Li, J. Roh, S. Hwang, and S. Kim. Instant code clone search, In Proc. ESEC/FSE, pages 167-176, 2010.
-
(2010)
Proc. ESEC/FSE
, pp. 167-176
-
-
Li, M.1
Roh, J.2
Hwang, S.3
Kim, S.4
-
23
-
-
84864237204
-
CBCD: Cloned buggy code detector
-
J. Li and M. D. Ernst. CBCD: Cloned buggy code detector. In Proc. ICSE, pages 310-320, 2012.
-
(2012)
Proc. ICSE
, pp. 310-320
-
-
Li, J.1
Ernst, M.D.2
-
24
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder
-
DOI 10.1109/ICSE.2007.97, 4222573, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
S. Livieri, Y. Higo, M. Matushita, and K. Inoue. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In Proc. ICSE, pages 106-115, 2007. (Pubitemid 47430646)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 106-115
-
-
Livieri, S.1
Higo, Y.2
Matushita, M.3
Inoue, K.4
-
26
-
-
78649426786
-
Language-independent clone detection applied to plagiarism detection
-
R. Robbes, R. Brixtel, M. Fontaine, B. Lesner, and C. Bazin. Language-independent clone detection applied to plagiarism detection. In Proc. SCAM, pages 77-86, 2010.
-
(2010)
Proc. SCAM
, pp. 77-86
-
-
Robbes, R.1
Brixtel, R.2
Fontaine, M.3
Lesner, B.4
Bazin, C.5
-
27
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. In Science of Computer Programming, 74(7):470-495, 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
28
-
-
72349089357
-
An assessment of type-3 clones as detected by state-of-the-art tools
-
R. Tiarks, R. Koschke, and R. Falke. An assessment of type-3 clones as detected by state-of-the-art tools. In Proc. SCAM, pages 67-76, 2009.
-
(2009)
Proc. SCAM
, pp. 67-76
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
-
29
-
-
84948459152
-
Gemini: Maintenance support environment based on code clone analysis
-
Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In Proc. IEEE METRICS, pages 67-76, 2002.
-
(2002)
Proc. IEEE METRICS
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
31
-
-
84872115758
-
Improving modularity by refactoring code clones: A feasibility study on Linux
-
L. Yu and S. Ramaswamy. Improving modularity by refactoring code clones: A feasibility study on Linux. In SIGSOFT Notes, 33(2), 2008.
-
(2008)
SIGSOFT Notes
, vol.33
, Issue.2
-
-
Yu, L.1
Ramaswamy, S.2
|