-
1
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," IEEE Trans. Software Eng., pp. 577-591, 2007.
-
(2007)
IEEE Trans. Software Eng.
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
2
-
-
32344450436
-
An empirical study of code clone genealogies
-
ser. ESEC/FSE-13. New York, NY, USA: ACM
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," in Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, ser. ESEC/FSE-13. New York, NY, USA: ACM, 2005, pp. 187-196.
-
(2005)
Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
3
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta, "An empirical study on the maintenance of source code clones," Empirical Software Engineering, Vol. 15, pp. 1-34, 2010.
-
(2010)
Empirical Software Engineering
, vol.15
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
-
4
-
-
83455201007
-
Late propagation in software clones
-
2011 27th IEEE International Conference on, sept.
-
L. Barbour, F. Khomh, and Y Zou, "Late propagation in software clones," in Software Maintenance (ICSM), 2011 27th IEEE International Conference on, sept. 2011, pp. 273-282.
-
(2011)
Software Maintenance (ICSM)
, pp. 273-282
-
-
Barbour, L.1
Khomh, F.2
Zou, Y.3
-
6
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
IEEE Transactions on jul
-
T. Kamiya, S. Kusumoto, and K. Inoue, "Ccfinder: a multilinguistic token-based code clone detection system for large scale source code," Software Engineering, IEEE Transactions on, Vol. 28, no. 7, pp. 654-670, jul 2002.
-
(2002)
Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
7
-
-
83455201007
-
Late propagation in software clones
-
L. Barbour, F. Khomh, and Y Zou, "Late propagation in software clones," in ICSM'11, 2011, pp. 273-282.
-
(2011)
ICSM'11
, pp. 273-282
-
-
Barbour, L.1
Khomh, F.2
Zou, Y.3
-
8
-
-
34547677997
-
How clones are maintained: An empirical study
-
L. Aversano, L. Cerulo, and M. Di Penta, "How clones are maintained: An empirical study," in 11th European Conference on Software Maintenance and Reengineering, 2007, pp. 81-90.
-
(2007)
11th European Conference on Software Maintenance and Reengineering
, pp. 81-90
-
-
Aversano, L.1
Cerulo, L.2
Di Penta, M.3
-
9
-
-
79960520851
-
Analyzing and forecasting near-miss clones in evolving software: An empirical study
-
M. F. Zibran, R. K. Saha, M. Asaduzzaman, and C. K. Roy, "Analyzing and forecasting near-miss clones in evolving software: An empirical study," in ICECCS'11, 2011, pp. 295-304.
-
(2011)
ICECCS'11
, pp. 295-304
-
-
Zibran, M.F.1
Saha, R.K.2
Asaduzzaman, M.3
Roy, C.K.4
-
10
-
-
70349904977
-
Mapreduce as a general framework to support research in mining software repositories (msr)
-
May
-
W. Shang, Z. M. Jiang, B. Adams, and A. Hassan, "Mapreduce as a general framework to support research in mining software repositories (msr)," in 6th IEEE International Working Conference on Mining Software Repositories, May 2009, pp. 21-30.
-
(2009)
6th IEEE International Working Conference on Mining Software Repositories
, pp. 21-30
-
-
Shang, W.1
Jiang, Z.M.2
Adams, B.3
Hassan, A.4
-
12
-
-
77949906737
-
Predicting faults using the complexity of code changes
-
ser. ICSE '09. Washington, DC, USA: IEEE Computer Society http://dx.doi.org/10.1109/ICSE.2009.5070510
-
A. E. Hassan, "Predicting faults using the complexity of code changes," in Proceedings of the 31st International Conference on Software Engineering, ser. ICSE '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 78-88. [Online]. Available: http://dx.doi.org/10.1109/ICSE.2009.5070510
-
(2009)
Proceedings of the 31st International Conference on Software Engineering
, pp. 78-88
-
-
Hassan, A.E.1
-
14
-
-
71149111492
-
Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy, "Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization," in ICPC'08, 2008, pp. 172-181.
-
(2008)
ICPC'08
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
15
-
-
78650646355
-
Studying the impact of clones on software defects
-
G. M. Selim, L. Barbour, W. Shang, B. Adams, A. E. Hassan, and Y Zou, "Studying the impact of clones on software defects," Working Conference on Reverse Engineering, pp. 13-21, 2010.
-
(2010)
Working Conference on Reverse Engineering
, pp. 13-21
-
-
Selim, G.M.1
Barbour, L.2
Shang, W.3
Adams, B.4
Hassan, A.E.5
Zou, Y.6
-
17
-
-
84889052615
-
Design and methods third edition, 3rd ed
-
R. K. Yin, "Design and methods third edition, 3rd ed." in ICSM'00, 2002.
-
(2002)
ICSM'00
-
-
Yin, R.K.1
-
18
-
-
11244291977
-
Studying the evolution of software systems using evolutionary code extractors
-
A. E. Hassan and R. C. Holt, "Studying the evolution of software systems using evolutionary code extractors," in IWPSE'04, 2004, pp. 76-81.
-
(2004)
IWPSE'04
, pp. 76-81
-
-
Hassan, A.E.1
Holt, R.C.2
-
19
-
-
0034513916
-
Identifying reasons for software changes using historic databases
-
A. Mockus and L. G. Votta, "Identifying reasons for software changes using historic databases," in ICSM'00, 2000, pp. 120-130.
-
(2000)
ICSM'00
, pp. 120-130
-
-
Mockus, A.1
Votta, L.G.2
|