-
1
-
-
0004061016
-
-
(1st edn) Addison-Wesley: Upper Saddle River, NJ, USA
-
Fowler M, Beck K, Brant J, Opdyke W, Roberts D. Refactoring: Improving the Design of Existing Code (1st edn). Addison-Wesley: Upper Saddle River, NJ, USA, 2000.
-
(2000)
Refactoring: Improving the Design of Existing Code
-
-
Fowler, M.1
Beck, K.2
Brant, J.3
Opdyke, W.4
Roberts, D.5
-
2
-
-
32344450436
-
An empirical study of code clone genealogies
-
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
-
KimM, Sazawal V, Notkin D, Murphy G. An empirical study of code clone genealogies. Proceedings of the 10th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005; 187-196, doi:10.1145/1081706.1081737. (Pubitemid 43218826)
-
(2005)
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
3
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
doi:10.1007/s10664-009-9108-x
-
Thummalapenta S, Cerulo L, Aversano L, Penta MD. An empirical study on the maintenance of source code clones. Empirical Software Engineering 2009; 15(1):1-34, doi:10.1007/s10664-009-9108-x.
-
(2009)
Empirical Software Engineering
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
4
-
-
56749132226
-
Cloning considered harmful" considered harmful: Patterns of cloning in software
-
doi:10.1007/s10664-008-9076-6
-
Kapser C, Godfrey M. "Cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering 2008; 13(6):645-692, doi:10.1007/s10664-008-9076-6.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.2
-
7
-
-
64549100783
-
Survey of research on software clones. Duplication, Redundancy, and Similarity in Software no. 06301
-
Koschke R. Survey of research on software clones. Duplication, Redundancy, and Similarity in Software, no. 06301 in Dagstuhl Seminar Proceedings, 2007. http://drops.dagstuhl.de/opus/volltexte/2007/962.
-
(2007)
Dagstuhl Seminar Proceedings
-
-
Koschke, R.1
-
8
-
-
57849136059
-
-
School ofComputing, Queen's University, Kingston, Ontario, Canada Sep 2007
-
Roy C, Cordy J.Asurvey on software clone detection research. Technical Report 2007-541, School ofComputing, Queen's University, Kingston, Ontario, Canada Sep 2007. http://research.cs.queensu.ca/TechReports/Reports/2007-541.pdf.
-
Asurvey on Software Clone Detection Research. Technical Report 2007-541
-
-
Roy, C.1
Cordy, J.2
-
10
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
doi:10.1109/ ISESE 2004 1334896
-
Kim M, Bergman L, Lau T, Notkin D. An ethnographic study of copy and paste programming practices in OOPL. Proceedings of the 3rd International Symposium on Empirical Software Engineering, 2004; 83-92, doi:10.1109/ ISESE.2004.1334896.
-
(2004)
Proceedings of the 3rd International Symposium on Empirical Software Engineering
, vol.83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
13
-
-
44649122227
-
-
EBSE Technical Report EBSE-2007-01, School of Computer Science andMathematics, Keele University and Department of Computer Science, University of Durham Jul 2007
-
Kitchenham B, Charters S. Guidelines for performing systematic literature reviews in software engineering. EBSE Technical Report EBSE-2007-01, School of Computer Science andMathematics, Keele University and Department of Computer Science, University of Durham Jul 2007. http://www.elsevier.com/framework products / promismisc / inf-systrev.pdf.
-
Guidelines for Performing Systematic Literature Reviews in Software Engineering
-
-
Kitchenham, B.1
Charters, S.2
-
14
-
-
77954339263
-
Clone region descriptors: Representing and tracking duplication in source code
-
doi:10.1145/1767751.1767754
-
Duala-Ekoko E, Robillard M. Clone region descriptors: representing and tracking duplication in source code. ACM Transactions on Software Engineering and Methodology 2010; 20(1):3:1-3:31, doi:10.1145/1767751.1767754.
-
(2010)
ACM Transactions on Software Engineering and Methodology
, vol.20
, Issue.1
, pp. 31-331
-
-
Duala-Ekoko, E.1
Robillard, M.2
-
15
-
-
84879665296
-
-
Kapser C, Anderson P, Godfrey M, Koschke R, Rieger M, van Rysselberghe F, Weisgerber P. Subjectivity in clone judgment: can we ever agree? Duplication, Redundancy, and Similarity in Software, no. 06301 in Dagstuhl Seminar Proceedings, 2007. http://drops.dagstuhl.de/opus/volltexte/2007/970.
-
(2007)
Subjectivity in Clone Judgment: Can We Ever Agree? Duplication, Redundancy, and Similarity in Software No. 06301 in Dagstuhl Seminar Proceedings
-
-
Kapser, C.1
Anderson, P.2
Godfrey, M.3
Koschke, R.4
Rieger, M.5
Van Rysselberghe, F.6
Weisgerber, P.7
-
16
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
DOI 10.1109/TSE.2007.70725
-
Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E. Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering 2007; 33(9):577-591, doi:10.1109/TSE.2007.70725. (Pubitemid 47322965)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
17
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
doi:10.1016/j.scico.2009.02.007
-
Roy CK, Cordy JR, Koschke R. Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Science of Computer Programming 2009; 74(7):470-495, doi:10.1016/j.scico.2009.02.007.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
18
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
doi:10.1109/WCRE.2009.51
-
Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A. An empirical study on inconsistent changes to code clones at release level. Proceedings of the 16th Working Conference on Reverse Engineering, 2009; 85-94, doi:10.1109/WCRE.2009.51.
-
(2009)
Proceedings of the 16th Working Conference on Reverse Engineering
, pp. 85-94
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
19
-
-
33846859803
-
A systematic review of theory use in software engineering experiments
-
DOI 10.1109/TSE.2007.12
-
Hannay J, Sjoberg D, Dyba T. A systematic review of theory use in software engineering experiments. IEEE Transactions on Software Engineering 2007; 33(2):87-107. (Pubitemid 46223696)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.2
, pp. 87-107
-
-
Hannay, J.E.1
Sjoberg, D.I.K.2
Dyba, T.3
-
20
-
-
33845788381
-
A systematic review of software development cost estimation studies
-
DOI 10.1109/TSE.2007.256943
-
Jorgensen M, Shepperd M. A systematic review of software development cost estimation studies. IEEE Transactions on Software Engineering 2007; 33(1):33-53. (Pubitemid 46002167)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.1
, pp. 33-53
-
-
Jorgensen, M.1
Shepperd, M.2
-
21
-
-
67349095299
-
A systematic literature review to identify and classify software requirement errors
-
Walia G, Carver J. A systematic literature review to identify and classify software requirement errors. Information and Software Technology 2009; 51(7):1087-1109.
-
(2009)
Information and Software Technology
, vol.51
, Issue.7
, pp. 1087-1109
-
-
Walia, G.1
Carver, J.2
-
22
-
-
70449084875
-
Characterizing software architecture changes: A systematic review
-
Williams B, Carver J. Characterizing software architecture changes: a systematic review. Information and Software Technology 2010; 52(1):31-51.
-
(2010)
Information and Software Technology
, vol.52
, Issue.1
, pp. 31-51
-
-
Williams, B.1
Carver, J.2
-
23
-
-
33746353080
-
Three public enemies: Cut, copy, and paste
-
DOI 10.1109/MC.2006.246
-
Mann Z. Three public enemies: cut, copy, and paste. Computer 2006; 39(7):31-35. (Pubitemid 44111402)
-
(2006)
Computer
, vol.39
, Issue.7
, pp. 31-35
-
-
Mann, Z.A.1
-
25
-
-
32344446001
-
Facilitating software evolution research with kenyon
-
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
-
Bevan J, Whitehead, Jr E, Kim S, Godfrey M. Facilitating software evolution research with Kenyon. SIGSOFT Software Engineering Notes 2005; 30(5):177-186, doi: http://doi.acm.org/10.1145/1095430.1081736. (Pubitemid 43218825)
-
(2005)
ESEC/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)
, pp. 177-186
-
-
Bevan, J.1
Whitehead Jr., E.J.2
Kim, S.3
Godfrey, M.4
-
27
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein V. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics - Doklady 1966; 10(8):707-710.
-
(1966)
Soviet Physics - Doklady
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.1
-
28
-
-
84979020988
-
Comprehending reality - Practical barriers to industrial adoption of software maintenance automation
-
IEEE Computer Society: Washington DC, USA
-
Cordy J. Comprehending reality - practical barriers to industrial adoption of software maintenance automation. Proceedings of the 11th IEEE International Workshop on Program Comprehension, IEEE Computer Society: Washington, DC, USA, 2003; 196.
-
(2003)
Proceedings of the 11th IEEE International Workshop on Program Comprehension
, vol.196
-
-
Cordy, J.1
-
29
-
-
84858732731
-
Measuring the efficacy of code clone information in a bug localization task: An empirical study
-
Chatterji D, Carver J, Massengill B, Oslin J, Kraft N. Measuring the efficacy of code clone information in a bug localization task: an empirical study. Proceeding of the 5th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2011.
-
(2011)
Proceeding of the 5th ACM/ IEEE International Symposium on Empirical Software Engineering and Measurement
-
-
Chatterji, D.1
Carver, J.2
Massengill, B.3
Oslin, J.4
Kraft, N.5
-
30
-
-
58049198405
-
The impact of educational background on the effectiveness of requirements inspections: An empirical study
-
Carver J, Nagappan N, Page A. The impact of educational background on the effectiveness of requirements inspections: an empirical study. IEEE Transactions on Software Engineering 2008; 34(6):800-812.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.6
, pp. 800-812
-
-
Carver, J.1
Nagappan, N.2
Page, A.3
-
34
-
-
84989525001
-
Indexing by latent semantic analysis
-
Deerwester S, Dumais S, Landauer T, Furnas G, Harshman R. Indexing by latent semantic analysis. Journal of the Society for Information Science 1990; 41(6):391-407.
-
(1990)
Journal of the Society for Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Landauer, T.3
Furnas, G.4
Harshman, R.5
-
36
-
-
33846409962
-
Semantic clustering: Identifying topics in source code
-
DOI 10.1016/j.infsof.2006.10.017, PII S0950584906001820
-
Kuhn A, Ducasse S, Girba T. Semantic clustering: identifying topics in source code. Information and Software Technology 2007; 49:230-243. (Pubitemid 46149290)
-
(2007)
Information and Software Technology
, vol.49
, Issue.3
, pp. 230-243
-
-
Kuhn, A.1
Ducasse, S.2
Girba, T.3
-
37
-
-
58149489336
-
An information retrieval process to aid in the analysis of code clones
-
doi: 10.1007/s10664-008-9089-1
-
Tairas R, Gray J. An information retrieval process to aid in the analysis of code clones. Empirical Software Engineering 2009; 14(1), doi: 10.1007/s10664-008-9089-1.
-
(2009)
Empirical Software Engineering
, vol.14
, pp. 1
-
-
Tairas, R.1
Gray, J.2
-
40
-
-
84870276621
-
Hierarchical relational models for document networks
-
Chang J, Blei D. Hierarchical relational models for document networks. Annals of Applied Statistics 2010; 4(1):124-150.
-
(2010)
Annals of Applied Statistics
, vol.4
, Issue.1
, pp. 124-150
-
-
Chang, J.1
Blei, D.2
-
41
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
Kamiya T, Kusumoto S, Inoue K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering 2002; 28(7):654-670.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
43
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
DOI 10.1109/ICSE.2007.30, 4222572, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
Jiang L, Misherghi G, Su Z, Glondu S. DECKARD: scalable and accurate tree-based detection of code clones. Proceedings of the 29th International Conference on Software Engineering, 2007; 96-105. (Pubitemid 47430645)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
44
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics. Proceedings of the 12th International Conference on Software Maintenance, Monterey, CA, USA
-
Mayrand J, Leblanc C, Merlo E. Experiment on the automatic detection of function clones in a software system using metrics. Proceedings of the 12th International Conference on Software Maintenance, Monterey, CA, USA, IEEE Computer Society, 1996; 244-253.
-
(1996)
IEEE Computer Society
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
45
-
-
67649971019
-
Incremental clone detection. Proceedings of the 13th European Conference on Software Maintenance and Reengineering
-
Göde N, Koschke R. Incremental clone detection. Proceedings of the 13th European Conference on Software Maintenance and Reengineering, IEEE Computer Society, 2009; 219-228.
-
(2009)
IEEE Computer Society
, pp. 219-228
-
-
Göde, N.1
Koschke, R.2
|