-
1
-
-
0036783855
-
Analyzing cloning evolution in the Linux kernel
-
G. Antoniol, U. Villano, E. Merlo, and M. Di Penta. Analyzing cloning evolution in the Linux kernel. Information and Software Technology, 44(13):755-765, 2002.
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Di Penta, M.4
-
4
-
-
0034503791
-
Advanced clone-analysis to support object-oriented system refactoring
-
IEEE
-
M. Balazinska, E. Merlo, M. Dagenais, B. Laguë, and K. Kontogiannis. Advanced clone-analysis to support object-oriented system refactoring. In Proc. of the 7th WCRE, pages 98-107. IEEE, 2000.
-
(2000)
Proc. of the 7th WCRE
, pp. 98-107
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Laguë, B.4
Kontogiannis, K.5
-
6
-
-
84872320186
-
Evolution of near-miss clones
-
IEEE
-
S. Bazrafshan. Evolution of near-miss clones. In Proc. of the 12th SCAM, pages 74-83. IEEE, 2012.
-
(2012)
Proc. of the 12th SCAM
, pp. 74-83
-
-
Bazrafshan, S.1
-
7
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
Sept
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering, 33(9):577-591, Sept. 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
8
-
-
73449140451
-
An empirical study on inconsistent changes to code clones at release level
-
IEEE
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. E. Hassan. An empirical study on inconsistent changes to code clones at release level. In Proc. of the 27th ICSM, pages 85-94. IEEE, 2009.
-
(2009)
Proc. of the 27th ICSM
, pp. 85-94
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.E.6
-
9
-
-
70849100995
-
Managing code clones using dynamic change tracking and resolution
-
IEEE
-
M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In Proc. of the 25th ICSM, pages 169-178. IEEE, 2009.
-
(2009)
Proc. of the 25th ICSM
, pp. 169-178
-
-
De Wit, M.1
Zaidman, A.2
Van Deursen, A.3
-
10
-
-
72349095898
-
Evolution of type-1 clones
-
IEEE
-
N. Göde. Evolution of type-1 clones. In Proc. of the 9th SCAM, pages 77-86. IEEE, 2009.
-
(2009)
Proc. of the 9th SCAM
, pp. 77-86
-
-
Göde, N.1
-
11
-
-
77954707649
-
Clone removal: Fact or fiction?
-
ACM
-
N. Göde. Clone removal: fact or fiction? In Proc. of the 4th IWSC, pages 33-40. ACM, 2010.
-
(2010)
Proc. of the 4th IWSC
, pp. 33-40
-
-
Göde, N.1
-
13
-
-
79959548460
-
Oops!... I changed it again
-
ACM
-
N. Göde and J. Harder. Oops!... I changed it again. In Proc. of the 5th IWSC, pages 14-20. ACM, 2011.
-
(2011)
Proc. of the 5th IWSC
, pp. 14-20
-
-
Göde, N.1
Harder, J.2
-
14
-
-
79959897807
-
Frequency and risks of changes to clones
-
ACM
-
N. Göde and R. Koschke. Frequency and risks of changes to clones. In Proc. of the 33rd ICSE, pages 311-320. ACM, 2011.
-
(2011)
Proc. of the 33rd ICSE
, pp. 311-320
-
-
Göde, N.1
Koschke, R.2
-
15
-
-
84875386059
-
Studying clone evolution using incremental clone detection
-
N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process, 25(2):165-192, 2013.
-
(2013)
Journal of Software: Evolution and Process
, vol.25
, Issue.2
, pp. 165-192
-
-
Göde, N.1
Koschke, R.2
-
16
-
-
35048850423
-
Refactoring support based on code clone analysis
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In PROFES, pages 220-233, 2004.
-
(2004)
PROFES
, pp. 220-233
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
18
-
-
33747790264
-
Unifying clones with a generative programming technique: A case study
-
S. Jarzabek and S. Li. Unifying clones with a generative programming technique: a case study. J. Softw. Maint. Evol., 18(4):267-292, 2006.
-
(2006)
J. Softw. Maint. Evol
, vol.18
, Issue.4
, pp. 267-292
-
-
Jarzabek, S.1
Li, S.2
-
19
-
-
34548718935
-
Cloning considered harmful
-
considered harmful. IEEE
-
C. Kapser and M. W. Godfrey. "cloning considered harmful" considered harmful. In Proc. of the 13th WCRE, pages 19-28. IEEE, 2006.
-
(2006)
Proc. of the 13th WCRE
, pp. 19-28
-
-
Kapser, C.1
Godfrey, M.W.2
-
20
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
IEEE
-
M. Kim, L. Bergman, T. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. In ISESE. IEEE, 2004.
-
(2004)
ISESE
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
21
-
-
32344450436
-
An empirical study of code clone genealogies
-
ACM
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy. An empirical study of code clone genealogies. In ESEC/FSE, pages 187-196. ACM, 2005.
-
(2005)
ESEC/FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
22
-
-
85121829222
-
Survey of research on software clones
-
Dagstuhl, Germany, IBFI, Schloss Dagstuhl
-
R. Koschke. Survey of research on software clones. In Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. IBFI, Schloss Dagstuhl.
-
(2007)
Duplication, Redundancy, and Similarity in Software, Number 06301 in Dagstuhl Seminar Proceedings
-
-
Koschke, R.1
-
23
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
IEEE
-
J. Krinke. A study of consistent and inconsistent changes to code clones. In Proc. of the 14th WCRE, pages 170-178. IEEE, 2007.
-
(2007)
Proc. of the 14th WCRE
, pp. 170-178
-
-
Krinke, J.1
-
24
-
-
56349141528
-
Is cloned code more stable than non-cloned code?
-
IEEE
-
J. Krinke. Is cloned code more stable than non-cloned code? In Proc. of the 8th SCAM, pages 57-66. IEEE, 2008.
-
(2008)
Proc. of the 8th SCAM
, pp. 57-66
-
-
Krinke, J.1
-
26
-
-
34548718215
-
Analysis of the Linux kernel evolution using code clone coverage
-
IEEE
-
S. Livieri, Y. Higo, M. Matsushita, and K. Inoue. Analysis of the Linux kernel evolution using code clone coverage. In Proc. of the 4th MSR, pages 22-25. IEEE, 2007.
-
(2007)
Proc. of the 4th MSR
, pp. 22-25
-
-
Livieri, S.1
Higo, Y.2
Matsushita, M.3
Inoue, K.4
-
27
-
-
34548735994
-
Evaluating the harmfulness of cloning: A change based experiment
-
IEEE
-
A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In Proc. of the 4th MSR, pages 18-21. IEEE, 2007.
-
(2007)
Proc. of the 4th MSR
, pp. 18-21
-
-
Lozano, A.1
Wermelinger, M.2
Nuseibeh, B.3
-
28
-
-
84863588657
-
Comparative stability of cloned and non-cloned code: An empirical study
-
In
-
M. Mondal, C. K. Roy, M. S. Rahman, R. K. Saha, J. Krinke, and K. A. Schneider. Comparative stability of cloned and non-cloned code: An empirical study. In Proc. of the 27th SAC, 2012.
-
(2012)
Proc. of the 27th SAC
-
-
Mondal, M.1
Roy, C.K.2
Rahman, M.S.3
Saha, R.K.4
Krinke, J.5
Schneider, K.A.6
-
29
-
-
77952114282
-
Clone-aware configuration management
-
IEEE
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen. Clone-aware configuration management. In Proc. of the 24th ASE, pages 123-134. IEEE, 2009.
-
(2009)
Proc. of the 24th ASE
, pp. 123-134
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
31
-
-
78649431588
-
Evaluating code clone genealogies at release level: An empirical study
-
IEEE
-
R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, and K. A. Schneider. Evaluating code clone genealogies at release level: An empirical study. In Proc. of the 10th SCAM, pages 87-96. IEEE, 2010.
-
(2010)
Proc. of the 10th SCAM
, pp. 87-96
-
-
Saha, R.K.1
Asaduzzaman, M.2
Zibran, M.F.3
Roy, C.K.4
Schneider, K.A.5
-
32
-
-
83455169586
-
An automatic framework for extracting and classifying near-miss clone genealogies
-
ACM
-
R. K. Saha, C. K. Roy, and K. A. Schneider. An automatic framework for extracting and classifying near-miss clone genealogies. In Proc. of the 27th ICSM, pages 293-302. ACM, 2011.
-
(2011)
Proc. of the 27th ICSM
, pp. 293-302
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
-
33
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta. An empirical study on the maintenance of source code clones. ESE, 15(1):1-34, 2009.
-
(2009)
ESE
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Di Penta, M.4
-
35
-
-
84864227695
-
Safe clone-based refactoring through stereotype identification and iso-generation
-
IEEE
-
N. Volanschi. Safe clone-based refactoring through stereotype identification and iso-generation. In Proc. of the 6th IWSC, pages 50-56. IEEE, 2012.
-
(2012)
Proc. of the 6th IWSC
, pp. 50-56
-
-
Volanschi, N.1
|