-
1
-
-
56749132226
-
"Cloning Considered Harmful" Considered Harmful: Patterns of cloning in software
-
C. Kapser and M. W. Godfrey. ""Cloning Considered Harmful" Considered Harmful: patterns of cloning in software", J. Empirical Software Engineering, Vol. 13, 2008, pp. 645-692.
-
(2008)
J. Empirical Software Engineering
, vol.13
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.W.2
-
3
-
-
0029222025
-
On finding duplication and near-duplication in large software system
-
B. S. Baker, "On Finding Duplication and Near-Duplication in Large Software System", Proc. WCRE, 1995, pp. 86-95.
-
(1995)
Proc. WCRE
, pp. 86-95
-
-
Baker, B.S.1
-
4
-
-
16244384526
-
Managing duplicated code with linked editing
-
M. Toomim, A. Begel, and S. L. Graham. "Managing duplicated code with linked editing", Proc. VLHCC, 2004, pp 173-180.
-
(2004)
Proc. VLHCC
, pp. 173-180
-
-
Toomim, M.1
Begel, A.2
Graham, S.L.3
-
5
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach", Science of Com. Prog., vol. 74, no. 7, 2009, pp. 470-495.
-
(2009)
Science of Com. Prog.
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
6
-
-
34547333662
-
Comprehension and maintenance of large-scale multi-language software applications
-
K. Kontogiannis, P. Linos, and K. Wong, "Comprehension and maintenance of large-scale multi-language software applications," Proc. ICSM, 2006, pp. 497-500.
-
(2006)
Proc. ICSM
, pp. 497-500
-
-
Kontogiannis, K.1
Linos, P.2
Wong, K.3
-
7
-
-
84872344424
-
-
iText. Website Jul
-
iText. Website: http://itextpdf.com/, (Jul, 2012).
-
(2012)
-
-
-
8
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. "Comparison and Evaluation of Clone Detection Tools", IEEE TSE, Vol. 33 no. 9, 2007, pp. 577-591.
-
(2007)
IEEE TSE
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
9
-
-
0003884297
-
Deducing similarities in Java source from bytecodes
-
B. S. Baker and U. Manber, "Deducing similarities in Java source from bytecodes", Proc. ATEC, 1998, pp. 179-190.
-
(1998)
Proc. ATEC
, pp. 179-190
-
-
Baker, B.S.1
Manber, U.2
-
10
-
-
84872362127
-
Cross-language clone detection
-
N. Kraft, B. Bonds, and R. Smith. "Cross-language clone detection", Proc. SEKE, 2008, pp 54-59.
-
(2008)
Proc. SEKE
, pp. 54-59
-
-
Kraft, N.1
Bonds, B.2
Smith, R.3
-
11
-
-
84872335759
-
-
Mono. Website APR
-
Mono. Website: http://www.mono-project.com/, (APR, 2012).
-
(2012)
-
-
-
12
-
-
84872357653
-
-
ASXGUI. Website APR
-
ASXGUI. Website: http://sourceforge.NET/projects/asxgui/, (APR, 2012).
-
(2012)
-
-
-
14
-
-
0017492836
-
A fast algorithm for computing longest common subsequences
-
J. W. Hunt and T. G. Szymanski. "A fast algorithm for computing longest common subsequences." Communications of the ACM, Vol. 20, no. 5, 1977, pp. 350-353.
-
(1977)
Communications of the ACM
, vol.20
, Issue.5
, pp. 350-353
-
-
Hunt, J.W.1
Szymanski, T.G.2
-
15
-
-
0000390142
-
Binary codes capable of correcting deletions, insertions and reversals
-
(in Russian). English translation in Soviet Phys.-DokI., vol. 10, no. 8, pp. 707-710, 1966.
-
V. I. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals", DAN, vol. 163, 4, 845-848, 1965 (in Russian). English translation in Soviet Phys.-DokI., vol. 10, no. 8, pp. 707-710, 1966.
-
(1965)
DAN
, vol.163
, Issue.4
, pp. 845-848
-
-
Levenshtein, V.I.1
-
16
-
-
83455168943
-
On the effectiveness of simhash for detecting near-miss clones in large scale software systems
-
S. Uddin, C.K. Roy, K.A. Schneider, and A. Hindle, "On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems", Proc. WCRE, 2011, pp. 13-22.
-
(2011)
Proc. WCRE
, pp. 13-22
-
-
Uddin, S.1
Roy, C.K.2
Schneider, K.A.3
Hindle, A.4
-
17
-
-
71149111492
-
NiCad: Accurate detection of nearmiss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy. "NiCad: Accurate Detection of NearMiss Intentional Clones Using Flexible Pretty-Printing and Code Normalization", Proc. ICPC, 2008, pp. 172-18.
-
(2008)
Proc. ICPC
, pp. 172-218
-
-
Roy, C.K.1
Cordy, J.R.2
-
18
-
-
0036040277
-
Similarity estimation techniques from rounding algorithms
-
M. S. Charikar, "Similarity estimation techniques from rounding algorithms". Proc. STOC, 2002, pp. 380-388.
-
(2002)
Proc. STOC
, pp. 380-388
-
-
Charikar, M.S.1
-
19
-
-
84872332154
-
-
iText.NET. Website APR
-
iText.NET. Website: http://www.ujihara.jp/iTextdotNET/en/index.ht ml, (APR 2012).
-
(2012)
-
-
-
20
-
-
84949331034
-
The use of faces to represent points in kdimensional space graphically
-
H. Chernoff, "The use of faces to represent points in kdimensional space graphically", Journal of the American Statistical Association, Vol. 68, no. 342, 1973, pp. 361-368.
-
(1973)
Journal of the American Statistical Association
, vol.68
, Issue.342
, pp. 361-368
-
-
Chernoff, H.1
-
21
-
-
0030679145
-
Glyphs for software visualization
-
M. C. Chuah, S.G. Eick, "Glyphs for software visualization", Proc. IWPC, 1997, pp. 183-191.
-
(1997)
Proc. IWPC
, pp. 183-191
-
-
Chuah, M.C.1
Eick, S.G.2
-
23
-
-
78650666996
-
From whence it came: Detecting source code clones by analyzing assembler
-
I. J. Davis and M. W. Godfrey, "From Whence It Came: Detecting Source Code Clones by Analyzing Assembler", Proc. WCRE, 2010, pp. 242-246.
-
(2010)
Proc. WCRE
, pp. 242-246
-
-
Davis, I.J.1
Godfrey, M.W.2
-
24
-
-
84872336509
-
-
Soot Framework. Website APR
-
Soot Framework. Website: http://www.sable.mcgill.ca/soot, (APR 2012).
-
(2012)
-
-
-
25
-
-
78650667672
-
Enhancing source-based clone detection using intermediate representation
-
G. M. K. Selim, K. C. Foo and Y. Zou. "Enhancing Source-Based Clone Detection Using Intermediate Representation", Proc. WCRE, 2010, pp. 227-236.
-
(2010)
Proc. WCRE
, pp. 227-236
-
-
Selim, G.M.K.1
Foo, K.C.2
Zou, Y.3
-
26
-
-
84859025199
-
Detecting source code similarity using low-level language
-
V. Juricic, "Detecting source code similarity using low-level language", Proc. ITI, 2011, pp. 597-602.
-
(2011)
Proc. ITI
, pp. 597-602
-
-
Juricic, V.1
-
27
-
-
84864228353
-
A novel approach based on formal methods for clone detection
-
A. Cuomo, A. Santone and U. Villano, "A novel approach based on formal methods for clone detection", Proc. IWSC, 2012, pp. 8-14.
-
(2012)
Proc. IWSC
, pp. 8-14
-
-
Cuomo, A.1
Santone, A.2
Villano, U.3
-
28
-
-
84872285113
-
-
The LLVM compiler infrastructure. Website APR
-
The LLVM compiler infrastructure. Website: http://www.llvm.org/, (APR, 2012).
-
(2012)
-
-
|