-
1
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones, " in Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007, pp. 96-105.
-
(2007)
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007)
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
3
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code, " IEEE Transactions on Software Engineering, vol. 28, no. 1, pp. 654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.1
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
4
-
-
79959556951
-
Extracting code clones for refactoring using combinations of clone metrics
-
E. Choi, N. Yoshida, T. Ishio, K. Inoue, and T. Sano, "Extracting code clones for refactoring using combinations of clone metrics, " in Proceedings of the 5th International Workshop on Software Clones (IWSC 2011), 2011, pp. 7-13.
-
(2011)
Proceedings of the 5th International Workshop on Software Clones (IWSC 2011)
, pp. 7-13
-
-
Choi, E.1
Yoshida, N.2
Ishio, T.3
Inoue, K.4
Sano, T.5
-
6
-
-
56849129297
-
A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system
-
Y. Higo, S. Kusumoto, and K. Inoue, "A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system, " Journal of Software Maintenance and Evolution: Research and Practice, vol. 20, no. 6, pp. 435-461, 2008.
-
(2008)
Journal of Software Maintenance and Evolution: Research and Practice
, vol.20
, Issue.6
, pp. 435-461
-
-
Higo, Y.1
Kusumoto, S.2
Inoue, K.3
-
7
-
-
56749132226
-
Cloning considered harmful considered harmful: Patterns of cloning in software
-
C. J. Kapser and M. W. Godfrey, ""cloning considered harmful" considered harmful: patterns of cloning in software, " Empirical Software Engineering, vol. 13, no. 6, pp. 645-692, 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
8
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy, "An empirical study of code clone genealogies, " in Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC/ FSE 2005), 2005, pp. 187-196.
-
(2005)
Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/ FSE 2005)
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
9
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools, " IEEE Transations on Software Engineering, vol. 31, no. 10, pp. 804-818, 2007.
-
(2007)
IEEE Transations on Software Engineering
, vol.31
, Issue.10
, pp. 804-818
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
10
-
-
84864206207
-
Clone history analysis using configuration management system
-
S. Kawaguchi, M. Matsushita, and K. Inoue, "Clone history analysis using configuration management system, " IEICE Transactions (in Japanese), vol. J89-D, no. 10, pp. 2279-2287, 2006.
-
(2006)
IEICE Transactions (In Japanese)
, vol.J89-D
, Issue.10
, pp. 2279-2287
-
-
Kawaguchi, S.1
Matsushita, M.2
Inoue, K.3
-
11
-
-
84879652109
-
Clone evolution: A systematic review
-
J. R. Pate, R. Tairas, and N. A. Kraft, "Clone Evolution: A Systematic Review, " Journal of Software Maintenance and Evolution: Research and Practice, vol. 25, no. 3, pp. 261-283, 2013.
-
(2013)
Journal of Software Maintenance and Evolution: Research and Practice
, vol.25
, Issue.3
, pp. 261-283
-
-
Pate, J.R.1
Tairas, R.2
Kraft, N.A.3
-
12
-
-
34547677997
-
How clones are maintained: An empirical study
-
L. Aversano, L. Cerulo, and M. D. Penta, "How clones are maintained: An empirical study, " in Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), 2007, pp. 81-90.
-
(2007)
Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR 2007)
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Penta, M.D.3
-
13
-
-
47349095405
-
Clone smells in software evolution
-
T. Bakota, R. Ferenc, and T. Gyimothy, "Clone smells in software evolution, " in Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007, pp. 24-33.
-
(2007)
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007)
, pp. 24-33
-
-
Bakota, T.1
Ferenc, R.2
Gyimothy, T.3
-
17
-
-
77954339263
-
Clone region descriptors: Representing and tracking duplication in source code
-
E. Duala-Ekoko and M. P. Robillard, "Clone Region Descriptors: Representing and Tracking Duplication in Source Code, " ACM Transactions on Software Engineering and Methodology, vol. 20, no. 1, pp. 3:1-3:31, 2010.
-
(2010)
ACM Transactions on Software Engineering and Methodology
, vol.20
, Issue.1
, pp. 31-331
-
-
Duala-Ekoko, E.1
Robillard, M.P.2
-
18
-
-
84867315180
-
Clone management for evolving software
-
H. A. Nguyen, T. T. Nguyen, N. H. Pham, J. Al-Kofahi, and T. N. Nguyen, "Clone management for evolving software, " IEEE Transactions on Software Engineering, vol. 38, no. 5, pp. 1008-1026, 2012.
-
(2012)
IEEE Transactions on Software Engineering
, vol.38
, Issue.5
, pp. 1008-1026
-
-
Nguyen, H.A.1
Nguyen, T.T.2
Pham, N.H.3
Al-Kofahi, J.4
Nguyen, T.N.5
-
19
-
-
37849051720
-
Context-based detection of clone-related bugs
-
L. Jiang, Z. Su, and E. Chiu, "Context-based detection of clone-related bugs, " in Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2007), 2007, pp. 55-64.
-
(2007)
Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2007)
, pp. 55-64
-
-
Jiang, L.1
Su, Z.2
Chiu, E.3
-
20
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "CP-Miner: Finding copy-paste and related bugs in large-scale software code, " IEEE Transactions on Software Engineering, vol. 32, no. 3, pp. 176-192, 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
21
-
-
84864237176
-
Industrial application of clone change management system
-
Y. Yamanaka, E. Choi, N. Yoshida, K. Inoue, and T. Sano, "Industrial application of clone change management system, " in Proceedings of the 6th International Workshop on Software Clones (IWSC 2012), 2012, pp. 67-71.
-
(2012)
Proceedings of the 6th International Workshop on Software Clones (IWSC 2012)
, pp. 67-71
-
-
Yamanaka, Y.1
Choi, E.2
Yoshida, N.3
Inoue, K.4
Sano, T.5
|