-
1
-
-
70349694448
-
Using bayesian statistical methods to determine the level of error in large spreadsheets
-
L. Bradley and K. McDaid, "Using bayesian statistical methods to determine the level of error in large spreadsheets," in Proc. of ICSE '09, Companion Volume, 2009, pp. 351-354.
-
(2009)
Proc. of ICSE '09, Companion Volume
, pp. 351-354
-
-
Bradley, L.1
McDaid, K.2
-
2
-
-
33646529552
-
Estimating the numbers of end users and end user programmers
-
C. Scaffidi, M. Shaw, and B. A. Myers, "Estimating the numbers of end users and end user programmers," in Proc. of VL/HCC '05, 2005, pp. 207-214.
-
(2005)
Proc. of VL/HCC '05
, pp. 207-214
-
-
Scaffidi, C.1
Shaw, M.2
Myers, B.A.3
-
3
-
-
84976694438
-
Spreadsheets: A research agenda
-
D. Bell and M. Parr, "Spreadsheets: A research agenda," SIGPLAN Notices, vol. 28, no. 9, pp. 26-28, 1993.
-
(1993)
SIGPLAN Notices
, vol.28
, Issue.9
, pp. 26-28
-
-
Bell, D.1
Parr, M.2
-
4
-
-
84976714533
-
Implication of data quality for spreadsheet analysis
-
D. P. Ballou, H. L. Pazer, S. Belardo, and B. D. Klein, "Implication of data quality for spreadsheet analysis," DATA BASE, vol. 18, no. 3, pp. 13-19, 1987.
-
(1987)
DATA BASE
, vol.18
, Issue.3
, pp. 13-19
-
-
Ballou, D.P.1
Pazer, H.L.2
Belardo, S.3
Klein, B.D.4
-
5
-
-
70849084673
-
Detection and analysis of near-miss software clones
-
C. K. Roy, "Detection and analysis of near-miss software clones," in Proc. of ICSM '09, 2009, pp. 447-450.
-
(2009)
Proc. of ICSM '09
, pp. 447-450
-
-
Roy, C.K.1
-
6
-
-
0001358667
-
Identifying redundancy in source code using fingerprints
-
J. H. Johnson, "Identifying redundancy in source code using fingerprints," in Proc. of CASCON '93, 1993, pp. 171-183.
-
(1993)
Proc. of CASCON '93
, pp. 171-183
-
-
Johnson, J.H.1
-
7
-
-
70349108471
-
The euses spreadsheet corpus: A shared resource for supporting experimentation with spreadsheet dependability mechanisms
-
M. Fisher and G. Rothermel, "The EUSES spreadsheet corpus: a shared resource for supporting experimentation with spreadsheet dependability mechanisms," ACM SIGSOFT Software Engineering Notes, vol. 30, no. 4, pp. 1-5, 2005.
-
(2005)
ACM SIGSOFT Software Engineering Notes
, vol.30
, Issue.4
, pp. 1-5
-
-
Fisher, M.1
Rothermel, G.2
-
8
-
-
84886410860
-
Information and data quality in spreadsheets
-
P. O'Beirne, "Information and data quality in spreadsheets," in Proc. of Eusprig '08, 2008.
-
(2008)
Proc. of Eusprig '08
-
-
Obeirne, P.1
-
9
-
-
30344449773
-
On the use of clone detection for identifying crosscutting concern code
-
M. Bruntink, A. van Deursen, R. van Engelen, and T. Tourwé, "On the use of clone detection for identifying crosscutting concern code," TSE, vol. 31, no. 10, pp. 804-818, 2005.
-
(2005)
TSE
, vol.31
, Issue.10
, pp. 804-818
-
-
Bruntink, M.1
Van Deursen, A.2
Van Engelen, R.3
Tourwe, T.4
-
10
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
S. Ducasse, M. Rieger, and S. Demeyer, "A language independent approach for detecting duplicated code," in Proc. of ICSM '99, 1999, pp. 109-118.
-
(1999)
Proc. of ICSM '99
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
11
-
-
0036648690
-
CCfinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCfinder: A multilinguistic token-based code clone detection system for large scale source code," TSE, vol. 28, no. 7, pp. 654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
12
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. S. Baker, "On finding duplication and near-duplication in large software systems," in Proc. of WCRE '95, 1995, pp. 86-95.
-
(1995)
Proc. of WCRE '95
, pp. 86-95
-
-
Baker, B.S.1
-
13
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. M. de Moura, M. Sant'Anna, and L. Bier, "Clone detection using abstract syntax trees," in Proc. of ICSM '98, 1998, pp. 368-377.
-
(1998)
Proc. of ICSM '98
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
De Moura, L.M.3
Anna, M.S.4
Bier, L.5
-
14
-
-
84890052317
-
Using slicing to identify duplication in source code
-
R. Komondoor and S. Horwitz, "Using slicing to identify duplication in source code," in Proc. of SAS '01, 2001, pp. 40-56.
-
(2001)
Proc. of SAS '01
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
15
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
J. Krinke, "Identifying similar code with program dependence graphs," in Proc. of WCRE '09, 2001, pp. 301-309.
-
(2001)
Proc. of WCRE '09
, pp. 301-309
-
-
Krinke, J.1
-
16
-
-
77950141808
-
Near-miss function clones in open source software: An empirical study
-
C. K. Roy and J. R. Cordy, "Near-miss function clones in open source software: an empirical study," Journal of Software Maintenance, vol. 22, no. 3, pp. 165-189, 2010.
-
(2010)
Journal of Software Maintenance
, vol.22
, Issue.3
, pp. 165-189
-
-
Roy, C.K.1
Cordy, J.R.2
-
17
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Science of Computer Programming, vol. 74, no. 7, pp. 470-495, 2009.
-
(2009)
Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
18
-
-
84873107888
-
Models are code too: Near-miss clone detection for simulink models
-
to appear
-
M. H. Alalfi, J. R. Cordy, T. R. Dean, M. Stephan, and A. Stevenson, "Models are code too: Near-miss clone detection for simulink models," in Proc. of ICSM '12, 2012, to appear.
-
(2012)
Proc. of ICSM '12
-
-
Alalfi, M.H.1
Cordy, J.R.2
Dean, T.R.3
Stephan, M.4
Stevenson, A.5
-
19
-
-
0036612882
-
Testing homogeneous spreadsheet grids with the "what you see is what you test" methodology
-
M. Burnett, A. Sheretov, B. Ren, and G. Rothermel, "Testing homogeneous spreadsheet grids with the "what you see is what you test" methodology," TSE, vol. 28, no. 6, pp. 576-594, 2002.
-
(2002)
TSE
, vol.28
, Issue.6
, pp. 576-594
-
-
Burnett, M.1
Sheretov, A.2
Ren, B.3
Rothermel, G.4
-
20
-
-
77954705103
-
Issues in clone classification for dataflow languages
-
N. Gold, J. Krinke, M. Harman, and D. Binkley, "Issues in clone classification for dataflow languages," in Proc. of IWSC '10, 2010, pp. 83-84.
-
(2010)
Proc. of IWSC '10
, pp. 83-84
-
-
Gold, N.1
Krinke, J.2
Harman, M.3
Binkley, D.4
-
21
-
-
79959868576
-
Supporting professional spreadsheet users by generating leveled dataflow diagrams
-
F. Hermans, M. Pinzger, and A. van Deursen, "Supporting professional spreadsheet users by generating leveled dataflow diagrams," in Proc. of ICSE '11, 2011, pp. 451-460.
-
(2011)
Proc. of ICSE '11
, pp. 451-460
-
-
Hermans, F.1
Pinzger, M.2
Van Deursen, A.3
-
24
-
-
84886430539
-
Exact and near-miss clone detection in spreadsheets
-
F. Hermans, "Exact and near-miss clone detection in spreadsheets," TinyToCS, vol. 1, no. 1, 2012.
-
(2012)
TinyToCS
, vol.1
, Issue.1
-
-
Hermans, F.1
-
25
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, and E. Merlo, "Experiment on the automatic detection of function clones in a software system using metrics," in Proc. of ICSM '96, 1996, pp. 244-.
-
(1996)
Proc. of ICSM '96
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
26
-
-
73449090740
-
Do code clones matter
-
E. J̈urgens, F. Deissenboeck, B. Hummel, and S. Wagner, "Do code clones matter?" in Proc. of ICSE '09, 2009, pp. 485-495.
-
(2009)
Proc. of ICSE '09
, pp. 485-495
-
-
Jurgens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
27
-
-
56749132226
-
"Cloning considered harmful" considered harmful: Patterns of cloning in software
-
C. J. Kapser and M. W. Godfrey, ""cloning considered harmful" considered harmful: patterns of cloning in software," Empirical Software Engineering, vol. 13, no. 6, pp. 645-692, 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
28
-
-
77955035333
-
Automatically extracting class diagrams from spreadsheets
-
F. Hermans, M. Pinzger, and A. van Deursen, "Automatically extracting class diagrams from spreadsheets," in Proc. of ECOOP '10, 2010, pp. 52-75.
-
(2010)
Proc. of ECOOP '10
, pp. 52-75
-
-
Hermans, F.1
Pinzger, M.2
Van Deursen, A.3
-
29
-
-
34247138878
-
Inferring templates from spreadsheets
-
R. Abraham and M. Erwig, "Inferring templates from spreadsheets," in Proc. of ICSE '06, 2006, pp. 182-191.
-
(2006)
Proc. of ICSE '06
, pp. 182-191
-
-
Abraham, R.1
Erwig, M.2
-
30
-
-
73449134446
-
Discovery-based edit assistance for spreadsheets
-
J. Cunha, J. Saraiva, and J. Visser, "Discovery-based edit assistance for spreadsheets," in Proc. of VL/HCC '09, 2009, pp. 233-237.
-
(2009)
Proc. of VL/HCC '09
, pp. 233-237
-
-
Cunha, J.1
Saraiva, J.2
Visser, J.3
-
31
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lagüe, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl, "Assessing the benefits of incorporating function clone detection in a development process," in Proc. of ICSM '97, 1997, pp. 314-321.
-
(1997)
Proc. of ICSM '97
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.P.5
-
32
-
-
16244414893
-
Header and unit inference for spreadsheets through spatial analyses
-
R. Abraham and M. Erwig, "Header and unit inference for spreadsheets through spatial analyses," in Proc. of VL/HCC '04, 2004, pp. 165-172.
-
(2004)
Proc. of VL/HCC '04
, pp. 165-172
-
-
Abraham, R.1
Erwig, M.2
-
34
-
-
1442303452
-
Tracking structural evolution using origin analysis
-
M. Godfrey and Q. Tu, "Tracking structural evolution using origin analysis," in Proc. of IWPSE '02, 2002, pp. 117-119.
-
(2002)
Proc. of IWPSE '02
, pp. 117-119
-
-
Godfrey, M.1
Tu, Q.2
-
35
-
-
84944611721
-
Detecting merging and splitting using origin analysis
-
L. Zou and M. W. Godfrey, "Detecting merging and splitting using origin analysis," in Proc. of WCRE '03, 2003, pp. 146-154.
-
(2003)
Proc. of WCRE '03
, pp. 146-154
-
-
Zou, L.1
Godfrey, M.W.2
-
36
-
-
85085852882
-
Using a clone genealogy extractor for understanding and supporting evolution of code clones
-
M. Kim and D. Notkin, "Using a clone genealogy extractor for understanding and supporting evolution of code clones," in Proc. of MSR '05, 2005.
-
(2005)
Proc. of MSR '05
-
-
Kim, M.1
Notkin, D.2
-
37
-
-
78751652602
-
Tracking the evolution of code clones
-
T. Bakota, "Tracking the evolution of code clones," in Proc. of SOFSEM '11, 2011, pp. 86-98.
-
(2011)
Proc. of SOFSEM '11
, pp. 86-86
-
-
Bakota, T.1
|