-
1
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier, "Clone detection using abstract syntax trees," in Procİnt'l Conf. on Software Maintenance, 1998, pp. 368-377.
-
Procİnt'l Conf. on Software Maintenance, 1998
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
2
-
-
85008047921
-
Software defect reduction top 10 list
-
Jan.
-
B. Boehm and V. R. Basili, "Software defect reduction top 10 list," Computer, vol. 34, no. 1, pp. 135-137, Jan. 2001.
-
(2001)
Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehm, B.1
Basili, V.R.2
-
3
-
-
84886661753
-
-
Department of Computer Science, The University of Alabama, Tech. Rep. SERG-2013-01 [Online]. Available
-
D. Chatterji, J. C. Carver, and N. A. Kraft, "Clone research community beliefs about code clones and developer behavior - two surveys," Department of Computer Science, The University of Alabama, Tech. Rep. SERG-2013-01, 2013. [Online]. Available: http://software.eng.ua.edu/reports/ SERG-2013-01
-
(2013)
Clone Research Community Beliefs about Code Clones and Developer Behavior - Two Surveys
-
-
Chatterji, D.1
Carver, J.C.2
Kraft, N.A.3
-
4
-
-
0033687401
-
Leveraging legacy system dollars for e-business
-
May/June
-
L. Erlikh, "Leveraging legacy system dollars for e-business," IT Professional, vol. 2, no. 3, pp. 17-23, May/June 2000.
-
(2000)
IT Professional
, vol.2
, Issue.3
, pp. 17-23
-
-
Erlikh, L.1
-
5
-
-
33745780468
-
Relation of code clones and change couplings
-
R. Geiger, B. Fluri, H. C. Gall, and M. Pinzger, "Relation of code clones and change couplings," in Proc. Int'l Conf. on Fundamental Approaches to Software Engineering, 2006, pp. 411-425.
-
Proc. Int'l Conf. on Fundamental Approaches to Software Engineering, 2006
, pp. 411-425
-
-
Geiger, R.1
Fluri, B.2
Gall, H.C.3
Pinzger, M.4
-
6
-
-
56749132226
-
"cloning considered harmful" considered harmful: Patterns of cloning in software
-
Dec.
-
C. J. Kapser and M. W. Godfrey, ""cloning considered harmful" considered harmful: patterns of cloning in software," Empirical Software Engineering, vol. 13, no. 6, pp. 645-692, Dec. 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, Issue.6
, pp. 645-692
-
-
Kapser, C.J.1
Godfrey, M.W.2
-
7
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in oopl
-
M. Kim, L. Bergman, T. Lau, and D. Notkin, "An ethnographic study of copy and paste programming practices in oopl," in Proc. Int'l Sym. on Empirical Software Engineering, 2004, pp. 83-92.
-
Proc. Int'l Sym. on Empirical Software Engineering, 2004
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
8
-
-
77953766644
-
Clones: What is that smell?
-
F. Rahman, C. Bird, and P. Devanbu, "Clones: What is that smell?" in Proc. IEEE Working Conf. on Mining Software Repositories, 2010, pp. 72-81.
-
Proc. IEEE Working Conf. on Mining Software Repositories, 2010
, pp. 72-81
-
-
Rahman, F.1
Bird, C.2
Devanbu, P.3
-
9
-
-
84864191006
-
How do professional developers comprehend software?
-
T. Roehm, R. Tiarks, R. Koschke, and W. Maalej, "How do professional developers comprehend software?" in Proc. Int'l Conf. on Software Engineering, 2012, pp. 255-265.
-
Proc. Int'l Conf. on Software Engineering, 2012
, pp. 255-265
-
-
Roehm, T.1
Tiarks, R.2
Koschke, R.3
Maalej, W.4
-
10
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Sci. Comput. Program., vol. 74, no. 7, pp. 470-495, May 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
11
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
Feb.
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta, "An empirical study on the maintenance of source code clones," Empirical Software Engineering, vol. 15, no. 1, pp. 1-34, Feb. 2010.
-
(2010)
Empirical Software Engineering
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
-
12
-
-
84873121846
-
Cloning practices: Why developers clone and what can be changed
-
G. Zhang, X. Peng, Z. Xing, and W. Zhao, "Cloning practices: Why developers clone and what can be changed," in Proc. IEEE Int'l Conf. Software Maintenance, 2012, pp. 285-294.
-
Proc. IEEE Int'l Conf. Software Maintenance, 2012
, pp. 285-294
-
-
Zhang, G.1
Peng, X.2
Xing, Z.3
Zhao, W.4
|