-
1
-
-
77956616360
-
Modeling clones evolution through time series
-
G. Antoniol, G. Casazza, M. D. Penta, and E. Merlo, "Modeling clones evolution through time series," Proc. ICSM, 2001, pp. 273-280.
-
(2001)
Proc. ICSM
, pp. 273-280
-
-
Antoniol, G.1
Casazza, G.2
Penta, M.D.3
Merlo, E.4
-
2
-
-
34547677997
-
How clones are maintained: An empirical study
-
L. Aversano, L. Cerulo, and M. D. Penta, "How clones are maintained: An empirical study," Proc. CSMR, 2007, pp. 81-90.
-
(2007)
Proc. CSMR
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Penta, M.D.3
-
3
-
-
47349095405
-
Clone smells in software evolution
-
T. Bakota, R. Ferenc, and T. Gyimothy, "Clone smells in software evolution," Proc. ICSM, 2007, pp. 24-33.
-
(2007)
Proc. ICSM
, pp. 24-33
-
-
Bakota, T.1
Ferenc, R.2
Gyimothy, T.3
-
4
-
-
84858996164
-
An empirical study on inconsistent changes to code clones at the release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan, "An Empirical Study on Inconsistent Changes to Code Clones at the Release Level," SCP, 77(6):160-176, 2012.
-
(2012)
SCP
, vol.77
, Issue.6
, pp. 160-176
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
5
-
-
84872320186
-
Evolution of near-miss clones
-
S. Bazrafshan, "Evolution of Near-Miss Clones," Proc. SCAM, 2012, pp. 74-83.
-
(2012)
Proc. SCAM
, pp. 74-83
-
-
Bazrafshan, S.1
-
6
-
-
79953174967
-
An empirical study of long-lived code clones
-
D. Cai and M. Kim, "An empirical study of long-lived code clones," Proc. FASE/ETAPS, 2011, pp. 432-446.
-
(2011)
Proc. FASE/ETAPS
, pp. 432-446
-
-
Cai, D.1
Kim, M.2
-
7
-
-
33646831658
-
The TXL source transformation language
-
J. R. Cordy, "The TXL source transformation language," Sci. of Com. Prog., 61(3):190-210, 2006.
-
(2006)
Sci. of Com. Prog.
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
8
-
-
80052401509
-
The NiCad clone detector
-
J. R. Cordy and C. K. Roy, "The NiCad Clone Detector," Proc. ICPC, 2011, pp. 219-220.
-
(2011)
Proc. ICPC
, pp. 219-220
-
-
Cordy, J.R.1
Roy, C.K.2
-
9
-
-
77954339263
-
Clone region descriptors: Representing and tracking duplication in source code
-
E. Duala-Ekoko and M. P. Robillard, "Clone Region Descriptors: Representing and Tracking Duplication in Source Code," TOSEM, 20(1)3:1-31, 2010.
-
(2010)
TOSEM
, vol.20
, Issue.1
, pp. 31
-
-
Duala-Ekoko, E.1
Robillard, M.P.2
-
10
-
-
72349095898
-
Evolution of type-1 clones
-
N. Göde, "Evolution of Type-1 Clones," Proc. SCAM, 2009, pp. 77-86.
-
(2009)
Proc. SCAM
, pp. 77-86
-
-
Göde, N.1
-
11
-
-
84875386059
-
Studying clone evolution using incremental clone detection
-
N. Göde and R. Koschke, "Studying clone evolution using incremental clone detection," JSME, 25:165-192, 2010.
-
(2010)
JSME
, vol.25
, pp. 165-192
-
-
Göde, N.1
Koschke, R.2
-
12
-
-
79959897807
-
Frequency and risks of changes to clones
-
N. Göde and R. Koschke, "Frequency and Risks of Changes to Clones," Proc. ICSE, 2011, pp. 311-320.
-
(2011)
Proc. ICSE
, pp. 311-320
-
-
Göde, N.1
Koschke, R.2
-
13
-
-
72349097264
-
Modeling clone evolution
-
J. Harder and N. Göde, "Modeling clone evolution," Proc. IWSC, 2009, pp. 17-21.
-
(2009)
Proc. IWSC
, pp. 17-21
-
-
Harder, J.1
Göde, N.2
-
14
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy, "An empirical study of code clone genealogies," Proc. ESEC-FSE, 2005, pp. 187-196.
-
(2005)
Proc. ESEC-FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
15
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, "A study of consistent and inconsistent changes to code clones," Proc. WCRE, 2007, pp. 170-178.
-
(2007)
Proc. WCRE
, pp. 170-178
-
-
Krinke, J.1
-
16
-
-
56349141528
-
Is cloned code more stable than non-cloned code?
-
J. Krinke, "Is cloned code more stable than non-cloned code?," Proc. SCAM, 2008, pp. 57-66.
-
(2008)
Proc. SCAM
, pp. 57-66
-
-
Krinke, J.1
-
18
-
-
77953766644
-
Clones: What is that smell?
-
F. Rahman, C. Bird, P. Devanbu, "Clones: What is that smell?," Proc. MSR, 2010, pp. 72-81.
-
(2010)
Proc. MSR
, pp. 72-81
-
-
Rahman, F.1
Bird, C.2
Devanbu, P.3
-
19
-
-
69949085058
-
A mutation / injection-based automatic framework for evaluating code clone detection tools
-
C. K. Roy and J. R. Cordy, "A mutation / injection-based automatic framework for evaluating code clone detection tools," Proc. Mutation, 2009, pp. 157-166.
-
(2009)
Proc. Mutation
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
20
-
-
71149111492
-
NiCad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy, "NiCad: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization," Proc. ICPC, 2008, pp. 172-181.
-
(2008)
Proc. ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
22
-
-
77950141808
-
Near-miss function clones in open source software: An empirical study
-
C. K. Roy and J. R. Cordy, "Near-miss Function Clones in Open Source Software: An Empirical Study," JSME, 22(3):165-189, 2010.
-
(2010)
JSME
, vol.22
, Issue.3
, pp. 165-189
-
-
Roy, C.K.1
Cordy, J.R.2
-
23
-
-
78649431588
-
Evaluating code clone genealogies at release level: An empirical study
-
R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, and K. A. Schneider, "Evaluating code clone genealogies at release level: An empirical study," Proc. SCAM, 2010, pp. 87-96.
-
(2010)
Proc. SCAM
, pp. 87-96
-
-
Saha, R.K.1
Asaduzzaman, M.2
Zibran, M.F.3
Roy, C.K.4
Schneider, K.A.5
-
24
-
-
83455169586
-
An automatic framework for extracting and classifying near-miss clone genealogies
-
R. K. Saha, C. K. Roy, and K. A. Schneider, "An Automatic Framework for Extracting and Classifying Near-Miss Clone Genealogies," Proc. ICSM, 2011, 293-302.
-
(2011)
Proc. ICSM
, pp. 293-302
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
-
25
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. D. Penta, "An empirical study on the maintenance of source code clones," ESE, 15(1):1-34, 2009.
-
(2009)
ESE
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
26
-
-
79952814906
-
An extended assessment of type-3 clones as detected by state-of-the-art tools
-
R. Tiarks, R. Koschke, and R. Falke, "An extended assessment of type-3 clones as detected by state-of-the-art tools," SQC, 19(2):295-331, 2011.
-
(2011)
SQC
, vol.19
, Issue.2
, pp. 295-331
-
-
Tiarks, R.1
Koschke, R.2
Falke, R.3
-
27
-
-
84866951484
-
Can I clone this piece of code here?
-
X. Wang, Y. Dang, L. Zhang, D. Zhang, E. Lan, and H. Mei, "Can I clone this piece of code here?," Proc. ASE, 2012, 170-179.
-
(2012)
Proc. ASE
, pp. 170-179
-
-
Wang, X.1
Dang, Y.2
Zhang, L.3
Zhang, D.4
Lan, E.5
Mei, H.6
-
28
-
-
79960520851
-
Analyzing and forecasting near-miss clones in evolving software: An empirical study
-
M. Zibran, R. K. Saha, M. Asaduzzaman, and C. K. Roy, "Analyzing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study," Proc. ICECCS, 2011, pp. 295-304.
-
(2011)
Proc. ICECCS
, pp. 295-304
-
-
Zibran, M.1
Saha, R.K.2
Asaduzzaman, M.3
Roy, C.K.4
|