-
1
-
-
78650110447
-
Domain-based change propagation analysis: An enterprise system case study
-
A. Aryani, I. D. Peake, and M. Hamilton. Domain-based change propagation analysis: An enterprise system case study. In Proc. ICSM, pages 1-9, 2010.
-
(2010)
Proc. ICSM
, pp. 1-9
-
-
Aryani, A.1
Peake, I.D.2
Hamilton, M.3
-
2
-
-
70349480593
-
Change propagation analysis using domain information
-
Australia
-
A. Aryani, I. D. Peake, M. Hamilton, H. Schmidt, and M. Winikoff. Change propagation analysis using domain information. In Proc. ASWEC, pages 34-43, Australia, 2009.
-
(2009)
Proc. ASWEC
, pp. 34-43
-
-
Aryani, A.1
Peake, I.D.2
Hamilton, M.3
Schmidt, H.4
Winikoff, M.5
-
3
-
-
83455162533
-
Can we predict dependencies using domain information
-
A. Aryani, F. Perin, M. Lungu, A. N. Mahmood, and O. Nierstrasz. Can we predict dependencies using domain information? In Proc. WCRE, pages 55-64, 2011.
-
(2011)
Proc. WCRE
, pp. 55-64
-
-
Aryani, A.1
Perin, F.2
Lungu, M.3
Mahmood, A.N.4
Nierstrasz, O.5
-
5
-
-
73449090740
-
Do code clones matter
-
E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner. Do code clones matter? In Proc. ICSE, pages 485-495, 2009.
-
(2009)
Proc. ICSE
, pp. 485-495
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
6
-
-
84863588657
-
Comparative stability of cloned and non-cloned code: An empirical study
-
M. Mondal, C. K. Roy, M. S. Rahman, R. K. Saha, J. Krinke, and K. A. Schneider. Comparative stability of cloned and non-cloned code: An empirical study. In Proc. ACM SAC, pages 1227-1234, 2012.
-
(2012)
Proc. ACM SAC
, pp. 1227-1234
-
-
Mondal, M.1
Roy, C.K.2
Rahman, M.S.3
Saha, R.K.4
Krinke, J.5
Schneider, K.A.6
-
7
-
-
71149113238
-
Partial domain comprehension in software evolution and maintenance
-
M. Petrenko, V. Rajlich, and R. Vanciu. Partial domain comprehension in software evolution and maintenance. In Proc. ICPC, pages 13-22, 2008.
-
(2008)
Proc. ICPC
, pp. 13-22
-
-
Petrenko, M.1
Rajlich, V.2
Vanciu, R.3
-
8
-
-
69949085058
-
A mutation/injection-based automatic framework for evaluating code clone detection tools
-
C. Roy and J. Cordy. A mutation/injection-based automatic framework for evaluating code clone detection tools. In Proc. ICSTW, pages 157-166, 2009.
-
(2009)
Proc. ICSTW
, pp. 157-166
-
-
Roy, C.1
Cordy, J.2
-
9
-
-
71149111492
-
NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. Cordy. NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In Proc. ICPC, pages 172-181, 2008.
-
(2008)
Proc. ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.2
-
10
-
-
77950141808
-
Near-miss function clones in open source software: An empirical study
-
C. K. Roy and J. R. Cordy. Near-miss function clones in open source software: An empirical study. Journal of Soft. Maintenance, 22(3):165-189, 2010.
-
(2010)
Journal of Soft. Maintenance
, vol.22
, Issue.3
, pp. 165-189
-
-
Roy, C.K.1
Cordy, J.R.2
-
11
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Comp. Prog., 74:470-495, 2009.
-
(2009)
Science of Comp. Prog
, vol.74
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
12
-
-
0034386765
-
The use of domain knowledge in program understanding
-
S. Rugaber. The use of domain knowledge in program understanding. Annals of Soft. Engg., 9:143-192, 2000.
-
(2000)
Annals of Soft. Engg
, vol.9
, pp. 143-192
-
-
Rugaber, S.1
|