-
2
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. Baxter, A. Yahin, L. Moura, and M. S. Anna. Clone detection using abstract syntax trees. ICSM 1998, pp. 368-377.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Anna, M.S.4
-
3
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
J. Krinke. Identifying similar code with program dependence graphs. WCRE 2001, pp. 301-309.
-
(2001)
WCRE
, pp. 301-309
-
-
Krinke, J.1
-
4
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. ICSM 1996, pp. 244-253.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
5
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. on Soft. Eng., Vol. 28(7): 654-670, 2002.
-
(2002)
IEEE Trans. on Soft. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
6
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. Baker. On finding duplication and near-duplication in large software systems. WCRE 1995, pp. 86-95.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.1
-
7
-
-
18144389452
-
Insights into system wide code duplication
-
M. Rieger, S. Ducasse, and M. Lanza. Insights into system wide code duplication. WCRE 2004, pp. 100-109.
-
(2004)
WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
8
-
-
57849101681
-
Query-based filtering and graphical view generation for clone analysis
-
Y. Zhang, H. A. Basit, S. Jarzabek, D. Anh, and M. Low. Query-based filtering and graphical view generation for clone analysis. ICSM 2008, pp. 376-385.
-
(2008)
ICSM
, pp. 376-385
-
-
Zhang, Y.1
Basit, H.A.2
Jarzabek, S.3
Anh, D.4
Low, M.5
-
9
-
-
11144222932
-
ARIES: Refactoring support environment based on code clone analysis
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. ARIES: Refactoring support environment based on code clone analysis. SEA 2004, pp.222-229.
-
(2004)
SEA
, pp. 222-229
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
10
-
-
15844401604
-
Evaluating clone detection techniques from a refactoring perspective
-
F. V. Rysselberghe and S. Demeyer. Evaluating clone detection techniques from a refactoring perspective. ASE 2004, pp. 336-339.
-
(2004)
ASE
, pp. 336-339
-
-
Rysselberghe, F.V.1
Demeyer, S.2
-
11
-
-
34548718935
-
"Clones considered harmful" considered harmful
-
C. Kapser and M. W. Godfrey. "Clones considered harmful" considered harmful. WCRE 2006, pp. 19-28.
-
(2006)
WCRE
, pp. 19-28
-
-
Kapser, C.1
Godfrey, M.W.2
-
12
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
M. Kim, L. Bergman, T. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. ISESE 2004, pp. 83-92.
-
(2004)
ISESE
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
14
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. on Soft. Eng., Vol. 33(9): 577-591, 2007.
-
(2007)
IEEE Trans. on Soft. Eng.
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
15
-
-
34548812113
-
Evaluating clone detection tools for use during preventative maintenance
-
E. Burd, J. Bailey. Evaluating clone detection tools for use during preventative maintenance. SCAM 2002, pp. 36-43.
-
(2002)
SCAM
, pp. 36-43
-
-
Burd, E.1
Bailey, J.2
-
16
-
-
82055200263
-
A study of cloning in the linux scsi drivers
-
W. Wang and M. Godfrey. A study of cloning in the linux scsi drivers. SCAM 2011, pp. 95-104.
-
(2011)
SCAM
, pp. 95-104
-
-
Wang, W.1
Godfrey, M.2
-
17
-
-
77950141808
-
Near-miss function clones in open source software: An empirical study
-
C. K. Roy and J. R. Cordy. Near-miss function clones in open source software: An empirical study. J. Softw. Maint. Evol.: Res. Pract., Vol. 22(3): 165-189, 2010.
-
(2010)
J. Softw. Maint. Evol.: Res. Pract.
, vol.22
, Issue.3
, pp. 165-189
-
-
Roy, C.K.1
Cordy, J.R.2
-
18
-
-
84863588657
-
Comparative stability of cloned and non-cloned code: An empirical study
-
M. Mondal, C.K. Roy, M.S. Rahman, R.K. Saha, J. Krinke, and K.A. Schneider. Comparative stability of cloned and non-cloned code: An empirical study. SAC 2012.
-
(2012)
SAC
-
-
Mondal, M.1
Roy, C.K.2
Rahman, M.S.3
Saha, R.K.4
Krinke, J.5
Schneider, K.A.6
-
19
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan. An empirical study on inconsistent changes to code clones at release level. WCRE 2009, pp. 85-94.
-
(2009)
WCRE
, pp. 85-94
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
20
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, M. D. Penta. An empirical study on the maintenance of source code clones. Empirical Soft. Eng., Vol. 15(1): 1-34, 2010.
-
(2010)
Empirical Soft. Eng.
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
21
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim and G. Murphy. An empirical study of code clone genealogies. ESEC/SIGSOFT FSE 2005, pp. 187-196.
-
(2005)
ESEC/SIGSOFT FSE
, pp. 187-196
-
-
Kim, M.1
Murphy, G.2
-
22
-
-
79953174967
-
An empirical study of long-lived code clones
-
D. Cai and M. Kim. An empirical study of long-lived code clones. FASE 2011, pp. 432-446.
-
(2011)
FASE
, pp. 432-446
-
-
Cai, D.1
Kim, M.2
-
23
-
-
33749047026
-
Cloning by accident: An empirical study of source code cloning across software systems
-
R. Al-Ekram, C. Kapser, and M. Godfrey. Cloning by accident: an empirical study of source code cloning across software systems. ISESE 2005, pp. 376-385.
-
(2005)
ISESE
, pp. 376-385
-
-
Al-Ekram, R.1
Kapser, C.2
Godfrey, M.3
-
24
-
-
69049086133
-
A data mining approach for detecting higher-level clones in software
-
H. A. Basit, S. Jarzabek: A data mining approach for detecting higher-level clones in software. IEEE Trans. Soft. Eng., Vol. 35(4): 497-514, 2009.
-
(2009)
IEEE Trans. Soft. Eng.
, vol.35
, Issue.4
, pp. 497-514
-
-
Basit, H.A.1
Jarzabek, S.2
|