-
1
-
-
34548765475
-
SoftGUESS visualization and exploration of code clones in context
-
E. Adar and M. Kim. SoftGUESS: Visualization and exploration of code clones in context. In ICSE, pages 762-766, 2007.
-
(2007)
ICSE
, pp. 762-766
-
-
Adar, E.1
Kim, M.2
-
2
-
-
84872287323
-
Detecting clones across microsoft net programming languages
-
F. Al-Omari, I. Keivanloo, C. K. Roy, and J. Rilling. Detecting clones across microsoft.net programming languages. In WCRE, pages 405-414, 2012.
-
(2012)
WCRE
, pp. 405-414
-
-
Al-Omari, F.1
Keivanloo, I.2
Roy, C.K.3
Rilling, J.4
-
3
-
-
79959536841
-
VisCad flexible code clone analysis support for niCad
-
M. Asaduzzaman, C. K. Roy, and K. A. Schneider. VisCad: Flexible code clone analysis support for NiCad. In IWSC, pages 77-78, 2011.
-
(2011)
IWSC
, pp. 77-78
-
-
Asaduzzaman, M.1
Roy, C.K.2
Schneider, K.A.3
-
5
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
B. Baker. On finding duplication and near-duplication in large software systems. In WCRE, pages 86-95, 1995.
-
(1995)
WCRE
, pp. 86-95
-
-
Baker, B.1
-
6
-
-
47349095405
-
Clone smells in software evolution
-
T. Bakota, R. Ferenc, and T. Gyimothy. Clone smells in software evolution. In ICSM, pages 24-33, 2007.
-
(2007)
ICSM
, pp. 24-33
-
-
Bakota, T.1
Ferenc, R.2
Gyimothy, T.3
-
7
-
-
0033353188
-
Measuring clone based reengineering opportunities
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague, and K. Kontogiannis. Measuring clone based reengineering opportunities. In METRICS, pages 292-303, 1999.
-
(1999)
METRICS
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
8
-
-
84898414979
-
An empirical study of faults in late propagation clone genealogies
-
(in press). doi: 10.1002/smr.1597
-
L. Barbour, F. Khomh, and Y. Zou. An empirical study of faults in late propagation clone genealogies. Journal of Soft.: Evol. and Proc., pages-, 2013 (in press). doi: 10.1002/smr.1597.
-
(2013)
Journal of Soft.: Evol. and Proc., Pages
-
-
Barbour, L.1
Khomh, F.2
Zou, Y.3
-
9
-
-
32344438117
-
Detecting higher-level similarity patterns in programs
-
H. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. SIGSOFT Softw. Eng. Notes, 30:156-165, 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, pp. 156-165
-
-
Basit, H.1
Jarzabek, S.2
-
10
-
-
84885384152
-
An empirical study on limits of clone unification using generics
-
H. Basit, D. Rajapakse, and S. Jarzabek. An empirical study on limits of clone unification using generics. In SEKE, pages 109-114, 2005.
-
(2005)
SEKE
, pp. 109-114
-
-
Basit, H.1
Rajapakse, D.2
Jarzabek, S.3
-
11
-
-
32344443652
-
Beyond templates a study of clones in the sTL and some general implications
-
H. A. Basit, D. C. Rajapakse, and S. Jarzabek. Beyond templates: a study of clones in the STL and some general implications. In ICSE, pages 451-459, 2005.
-
(2005)
ICSE
, pp. 451-459
-
-
Basit, H.A.1
Rajapakse, D.C.2
Jarzabek, S.3
-
12
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.1
Yahin, A.2
Moura, L.3
Sant'anna, M.4
Bier, L.5
-
13
-
-
84872356449
-
Software clone management towards industrial application (dagstuhl seminar 12071)
-
I. D. Baxter, M. Conradt, J. R. Cordy, and R. Koschke. Software clone management towards industrial application (dagstuhl seminar 12071). Dagstuhl Reports, 2(2):21-57, 2012.
-
(2012)
Dagstuhl Reports
, vol.2
, Issue.2
, pp. 21-57
-
-
Baxter, I.D.1
Conradt, M.2
Cordy, J.R.3
Koschke, R.4
-
14
-
-
84891701161
-
An empirical study of clone removals
-
S. Bazrafshan and R. Koschke. An empirical study of clone removals. In ICSM, pages 50-59, 2013.
-
(2013)
ICSM
, pp. 50-59
-
-
Bazrafshan, S.1
Koschke, R.2
-
15
-
-
34548228440
-
Comparison and evaluation of clone detection tools
-
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Comparison and evaluation of clone detection tools. IEEE Trans. on Softw. Engg., 33(9):577-591, 2007.
-
(2007)
IEEE Trans. on Softw. Engg.
, vol.33
, Issue.9
, pp. 577-591
-
-
Bellon, S.1
Koschke, R.2
Antoniol, G.3
Krinke, J.4
Merlo, E.5
-
16
-
-
84858996164
-
An empirical study on inconsistent changes to code clones at the release level
-
N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan. An empirical study on inconsistent changes to code clones at the release level. Science of Comp. Prog., 77(6):760-776, 2012.
-
(2012)
Science of Comp. Prog.
, vol.77
, Issue.6
, pp. 760-776
-
-
Bettenburg, N.1
Shang, W.2
Ibrahim, W.3
Adams, B.4
Zou, Y.5
Hassan, A.6
-
17
-
-
33750238130
-
A novel approach to optimize clone refactoring activity
-
S. Bouktif, G. Antoniol, M. Neteler, and E. Merlo. A novel approach to optimize clone refactoring activity. In GECCO, pages 1885-1892, 2006.
-
(2006)
GECCO
, pp. 1885-1892
-
-
Bouktif, S.1
Antoniol, G.2
Neteler, M.3
Merlo, E.4
-
18
-
-
84864260699
-
Claims and beliefs about code clones do we agree as a community
-
D. Chatterji, J. C. Carver, and N. A. Kraft. Claims and beliefs about code clones: Do we agree as a community?. a survey. In IWSC, pages 15-21, 2012.
-
(2012)
A Survey. in IWSC
, pp. 15-21
-
-
Chatterji, D.1
Carver, J.C.2
Kraft, N.A.3
-
19
-
-
84886672176
-
Cloning the need to understand developer intent
-
D. Chatterji, J. C. Carver, and N. A. Kraft. Cloning: The need to understand developer intent. In IWSC, pages 14-15, 2013.
-
(2013)
IWSC
, pp. 14-15
-
-
Chatterji, D.1
Carver, J.C.2
Kraft, N.A.3
-
20
-
-
84893357565
-
Effects of cloned code on software maintainability a replicated developer study
-
D. Chatterji, J. C. Carver, N. A. Kraft, and J. Harder. Effects of cloned code on software maintainability: A replicated developer study. In WCRE, pages 112-121, 2013.
-
(2013)
WCRE
, pp. 112-121
-
-
Chatterji, D.1
Carver, J.C.2
Kraft, N.A.3
Harder, J.4
-
22
-
-
84979020988
-
Comprehending reality practical barriers to industrial adoption of software maintenance automation
-
J. R. Cordy. Comprehending reality: Practical barriers to industrial adoption of software maintenance automation. In IWPC, pages 196-206, 2003.
-
(2003)
IWPC
, pp. 196-206
-
-
Cordy, J.R.1
-
23
-
-
80052416205
-
Exploring large-scale system similarity using incremental clone detection and live scatterplots
-
J. R. Cordy. Exploring large-scale system similarity using incremental clone detection and live scatterplots. In ICPC, pages 151-160, 2011.
-
(2011)
ICPC
, pp. 151-160
-
-
Cordy, J.R.1
-
24
-
-
79959550317
-
Live scatterplots
-
J. R. Cordy. Live scatterplots. In IWSC, pages 79-80, 2011.
-
(2011)
IWSC
, pp. 79-80
-
-
Cordy, J.R.1
-
25
-
-
32344442609
-
Practical languageindependent detection of near-miss clones
-
J. R. Cordy, T. R. Dean, and N. Synytskyy. Practical languageindependent detection of near-miss clones. In CASCON, pages 1-12, 2004.
-
(2004)
CASCON
, pp. 1-12
-
-
Cordy, J.R.1
Dean, T.R.2
Synytskyy, N.3
-
26
-
-
84872120272
-
XIAO tuning code clones at hands of engineers in practice
-
Y. Dang, D. Zhang, S. Ge, C. Chu, Y. Qiu, and T. Xie. XIAO: tuning code clones at hands of engineers in practice. In ACSAC, pages 369-378, 2012.
-
(2012)
ACSAC
, pp. 369-378
-
-
Dang, Y.1
Zhang, D.2
Ge, S.3
Chu, C.4
Qiu, Y.5
Xie, T.6
-
27
-
-
77954709520
-
Clone detection by exploiting assembler
-
ACM
-
I. Davis and M. Godfrey. Clone detection by exploiting assembler. In IWSC, pages 77-78. ACM, 2010.
-
(2010)
IWSC
, pp. 77-78
-
-
Davis, I.1
Godfrey, M.2
-
28
-
-
70849100995
-
Managing code clones using dynamic change tracking and resolution
-
M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In ICSM, pages 169-178, 2009.
-
(2009)
ICSM
, pp. 169-178
-
-
De Wit, M.1
Zaidman, A.2
Van Deursen, A.3
-
29
-
-
57349168513
-
Clone detection in automotive model-based development
-
ACM
-
F. Deissenboeck, B. Hummel, E. Jürgens, B. Schätz, S. Wagner, J. Girard, and S. Teuchert. Clone detection in automotive model-based development. In ICSE, pages 603-612. ACM, 2008.
-
(2008)
ICSE
, pp. 603-612
-
-
Deissenboeck, F.1
Hummel, B.2
Jürgens, E.3
Schätz, B.4
Wagner, S.5
Girard, J.6
Teuchert, S.7
-
30
-
-
77954339263
-
Clone region descriptors repre-senting and tracking duplication in source code
-
E. Duala-Ekoko and M. Robillard. Clone region descriptors: Repre-senting and tracking duplication in source code. ACM Trans. Softw. Eng. Methodol., 20:3:1-3:31, 2010.
-
(2010)
ACM Trans. Softw. Eng. Methodol
, vol.20
, pp. 31-331
-
-
Duala-Ekoko, E.1
Robillard, M.2
-
31
-
-
84877261131
-
An exploratory study of cloning in industrial software product lines
-
Y. Dubinsky, J. Rubin, T. Berger, S. Duszynski, M. Becker, and K. Czarnecki. An exploratory study of cloning in industrial software product lines. In CSMR, pages 25-34, 2013.
-
(2013)
CSMR
, pp. 25-34
-
-
Dubinsky, Y.1
Rubin, J.2
Berger, T.3
Duszynski, S.4
Becker, M.5
Czarnecki, K.6
-
32
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In ICSM, pages 109-118, 1999.
-
(1999)
ICSM
, pp. 109-118
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
33
-
-
56749179725
-
Empirical evaluation of clone detection using syntax suffix trees
-
R. Falke, P. Frenzel, and R. Koschke. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering, 13:601-643, 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, pp. 601-643
-
-
Falke, R.1
Frenzel, P.2
Koschke, R.3
-
34
-
-
84870849774
-
Doppel-Code a clone visualization tool for prioritizing global and local clone impacts
-
C. Forbes, I. Keivanloo, and J. Rilling. Doppel-Code: A clone visualization tool for prioritizing global and local clone impacts. In COMPSAC, pages 366-367, 2012.
-
(2012)
COMPSAC
, pp. 366-367
-
-
Forbes, C.1
Keivanloo, I.2
Rilling, J.3
-
35
-
-
0004061016
-
-
Addison Wesley
-
M. Fowler, K. Beck, J.Brant, W. Opdyke, and D. Roberts. Refactoring: Improving the Design of Existing Code. Addison Wesley, 1999.
-
(1999)
Refactoring: Improving the Design of Existing Code
-
-
Fowler, M.1
Beck, K.2
Brant, J.3
Opdyke, W.4
Roberts, D.5
-
36
-
-
76349108267
-
Code clone graph metrics for detecting diffused code clones
-
Y. Fukushima, R. Kula, S. Kawaguchi, K. Fushida, M. Nagura, and H. Iida. Code clone graph metrics for detecting diffused code clones. In APSEC, pages 373-380, 2009.
-
(2009)
APSEC
, pp. 373-380
-
-
Fukushima, Y.1
Kula, R.2
Kawaguchi, S.3
Fushida, K.4
Nagura, M.5
Iida, H.6
-
37
-
-
84944696785
-
Generic modelling of code clones
-
S. Giesecke. Generic modelling of code clones. In DRSS, pages 1-23, 2007.
-
(2007)
DRSS
, pp. 1-23
-
-
Giesecke, S.1
-
39
-
-
79959897807
-
Frequency and risks of changes to clones
-
N. Göde and R. Koschke. Frequency and risks of changes to clones. In ICSE, pages 311-320, 2011.
-
(2011)
ICSE
, pp. 311-320
-
-
Göde, N.1
Koschke, R.2
-
40
-
-
84875386059
-
Studying clone evolution using incremental clone detection
-
N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. J. of Soft.: Evol. and Proc., 25(2):165-192, 2013.
-
(2013)
J. of Soft.: Evol. and Proc.
, vol.25
, Issue.2
, pp. 165-192
-
-
Göde, N.1
Koschke, R.2
-
41
-
-
0034226738
-
Predicting fault incidence using software change history
-
T. L Graves, A. F. Karr, J. S. Marron, and H. Siy. Predicting fault incidence using software change history. IEEE Tran. on Soft. Engg., 26(7):653-661, 2000.
-
(2000)
IEEE Tran. on Soft. Engg.
, vol.26
, Issue.7
, pp. 653-661
-
-
Graves, T.L.1
Karr, A.F.2
Marron, J.S.3
Siy, H.4
-
42
-
-
84886647037
-
The limits of clone model standardization
-
J. Harder. The limits of clone model standardization. In IWSC, pages 10-11, 2013.
-
(2013)
IWSC
, pp. 10-11
-
-
Harder, J.1
-
43
-
-
77954704110
-
Quo vadis, clone management
-
J. Harder and N. Göde. Quo vadis, clone management?. In IWSC, pages 85-86, 2010.
-
(2010)
IWSC
, pp. 85-86
-
-
Harder, J.1
Göde, N.2
-
44
-
-
79959572195
-
Efficiently handling clone data rCF and cyclone
-
ACM
-
J. Harder and N. Göde. Efficiently handling clone data: RCF and cyclone. In IWSC, pages 81-82. ACM, 2011.
-
(2011)
IWSC
, pp. 81-82
-
-
Harder, J.1
Göde, N.2
-
46
-
-
84883681660
-
Data clone detection and visualization in spreadsheets
-
F. Hermans, B. Sedee, M. Pinzger, and A. van Deursen. Data clone detection and visualization in Spreadsheets. In ICSE, pages 292-301, 2013.
-
(2013)
ICSE
, pp. 292-301
-
-
Hermans, F.1
Sedee, B.2
Pinzger, M.3
Van Deursen, A.4
-
47
-
-
73449120719
-
Enhancing quality of code clone detection with program dependency graph
-
Y. Higo and S. Kusumoto. Enhancing quality of code clone detection with program dependency graph. In WCRE, pages 315-316, 2009.
-
(2009)
WCRE
, pp. 315-316
-
-
Higo, Y.1
Kusumoto, S.2
-
48
-
-
35048850423
-
Refactoring support based on code clone analysis
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. PROFES, pages 220-233, 2004.
-
(2004)
PROFES
, pp. 220-233
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
49
-
-
83455205954
-
Incremental code clone detection a pDG-based approach
-
Y. Higo, U. Yasushi, M. Nishino, and S. Kusumoto. Incremental code clone detection: A PDG-based approach. In WCRE, pages 3-12, 2011.
-
(2011)
WCRE
, pp. 3-12
-
-
Higo, Y.1
Yasushi, U.2
Nishino, M.3
Kusumoto, S.4
-
50
-
-
78649993696
-
Is duplicate code more frequently modified than non-duplicate code in software evolution? An empirical study on open source software
-
K. Hotta, Y. Sano, Y. Higo, and S. Kusumoto. Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In IWPSE-EVOL, pages 73-82, 2010.
-
(2010)
IWPSE-EVOL
, pp. 73-82
-
-
Hotta, K.1
Sano, Y.2
Higo, Y.3
Kusumoto, S.4
-
51
-
-
70349991481
-
CnP towards an environment for the proactive management of copy-and-paste programming
-
D. Hou, P. Jablonski, and F. Jacob. CnP: Towards an environment for the proactive management of copy-and-paste programming. In ICPC, pages 238-242, 2009.
-
(2009)
ICPC
, pp. 238-242
-
-
Hou, D.1
Jablonski, P.2
Jacob, F.3
-
52
-
-
77951580427
-
Exploring the design space of proactive tool support for copy-and-paste programming
-
D. Hou, F. Jacob, and P. Jablonski. Exploring the design space of proactive tool support for copy-and-paste programming. In CASCON, pages 188-202, 2009.
-
(2009)
CASCON
, pp. 188-202
-
-
Hou, D.1
Jacob, F.2
Jablonski, P.3
-
53
-
-
78650088347
-
Index-based code clone detection incremental, distributed, scalable
-
B. Hummel, E. Juergens, L. Heinemann, and M. Conradt. Index-based code clone detection: incremental, distributed, scalable. In ICSM, pages 1-9, 2010.
-
(2010)
ICSM
, pp. 1-9
-
-
Hummel, B.1
Juergens, E.2
Heinemann, L.3
Conradt, M.4
-
54
-
-
56249095379
-
CReN a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the iDE
-
P. Jablonski and D. Hou. CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE. In ETX, pages 16-20, 2007.
-
(2007)
ETX
, pp. 16-20
-
-
Jablonski, P.1
Hou, D.2
-
55
-
-
33747790264
-
Unifying clones with a generative programming technique a case study
-
S. Jarzabek and S. Li. Unifying clones with a generative programming technique: a case study. Journal of Software: Evolution and Process, 18(4):267-292, 2006.
-
(2006)
Journal of Software: Evolution and Process
, vol.18
, Issue.4
, pp. 267-292
-
-
Jarzabek, S.1
Li, S.2
-
56
-
-
34548767669
-
DECKARD scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
57
-
-
47749155579
-
A framework for studying clones in large software systems
-
Z. Jiang and A. Hassan. A framework for studying clones in large software systems. In SCAM, pages 203-212, 2007.
-
(2007)
SCAM
, pp. 203-212
-
-
Jiang, Z.1
Hassan, A.2
-
58
-
-
46149127124
-
Visualizing clone cohesion and coupling
-
Z. Jiang, A. Hassan, and R. Holt. Visualizing clone cohesion and coupling. In APSEC, pages 467-476, 2006.
-
(2006)
APSEC
, pp. 467-476
-
-
Jiang, Z.1
Hassan, A.2
Holt, R.3
-
59
-
-
84962184978
-
Substring matching for clone detection and change tracking
-
J. Johnson. Substring matching for clone detection and change tracking. In ICSM, pages 120-126, 1994.
-
(1994)
ICSM
, pp. 120-126
-
-
Johnson, J.1
-
60
-
-
53849147395
-
Visualizing textual redundancy in legacy source
-
IBM Press
-
J. Johnson. Visualizing textual redundancy in legacy source. In CASCON, pages 32-41. IBM Press, 1994.
-
(1994)
CASCON
, pp. 32-41
-
-
Johnson, J.1
-
61
-
-
3743089117
-
Navigating the textual redundancy web in legacy source
-
IBM Press
-
J. Johnson. Navigating the textual redundancy web in legacy source. In CASCON, pages 16-25. IBM Press, 1996.
-
(1996)
CASCON
, pp. 16-25
-
-
Johnson, J.1
-
62
-
-
79959543320
-
Research in cloning beyond code a first roadmap
-
E. Juergens. Research in cloning beyond code: a first roadmap. In IWSC, pages 67-68, 2011.
-
(2011)
IWSC
, pp. 67-68
-
-
Juergens, E.1
-
64
-
-
77949882149
-
CloneDetective-A workbench for clone detection research
-
E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective-A workbench for clone detection research. In ICSE, pages 603-606, 2009.
-
(2009)
ICSE
, pp. 603-606
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
-
65
-
-
77954705962
-
Can clone detection support quality assessments of requirements specifications
-
E. Juergens, F. Deissenboeck, M. Feilkas, B. Hummel, B. Schaetz, S. Wagner, C. Domann, and J. Streit. Can clone detection support quality assessments of requirements specifications?. In ICSE, pages 79-88, 2010.
-
(2010)
ICSE
, pp. 79-88
-
-
Juergens, E.1
Deissenboeck, F.2
Feilkas, M.3
Hummel, B.4
Schaetz, B.5
Wagner, S.6
Domann, C.7
Streit, J.8
-
66
-
-
0036648690
-
CCFinder a multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7):654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
68
-
-
56749132226
-
Cloning considered harmful" considered harmful patterns of cloning in software
-
C. Kapser and M. Godfrey. Cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering, 13:645-692, 2008.
-
(2008)
Empirical Software Engineering
, vol.13
, pp. 645-692
-
-
Kapser, C.1
Godfrey, M.2
-
69
-
-
11244253656
-
Aiding comprehension of cloning through categorization
-
C. Kapser and M. W. Godfrey. Aiding comprehension of cloning through categorization. In IWPSE, pages 85-94, 2004.
-
(2004)
IWPSE
, pp. 85-94
-
-
Kapser, C.1
Godfrey, M.W.2
-
70
-
-
33646409529
-
Improved tool support for the investigation of duplication in software
-
C. Kapser and M. W. Godfrey. Improved tool support for the investigation of duplication in software. In ICSM, pages 305-314, 2005.
-
(2005)
ICSM
, pp. 305-314
-
-
Kapser, C.1
Godfrey, M.W.2
-
71
-
-
33646429779
-
Supporting the analysis of clones in software systems a case study
-
C. Kapser and M. W. Godfrey. Supporting the analysis of clones in software systems: A case study. J. Softw. Maint. Evol., 18:61-82, 2006.
-
(2006)
J. Softw. Maint. Evol.
, vol.18
, pp. 61-82
-
-
Kapser, C.1
Godfrey, M.W.2
-
72
-
-
84864251840
-
A common conceptual model for clone detection results
-
C. Kapser, J. Harder, and I. Baxter. A common conceptual model for clone detection results. In IWSC, pages 72-73, 2012.
-
(2012)
IWSC
, pp. 72-73
-
-
Kapser, C.1
Harder, J.2
Baxter, I.3
-
73
-
-
73449091494
-
SHINOBI a tool for automatic code clone detection in the iDE
-
S. Kawaguchi, T. Yamashina, H. Uwano, K. Fushida, Y. Kamei, M. Nagura, and H. Iida. SHINOBI: A tool for automatic code clone detection in the IDE. In WCRE, pages 313-314, 2009.
-
(2009)
WCRE
, pp. 313-314
-
-
Kawaguchi, S.1
Yamashina, T.2
Uwano, H.3
Fushida, K.4
Kamei, Y.5
Nagura, M.6
Iida, H.7
-
74
-
-
84928686991
-
SeByte scalable clone and similarity search for bytecode
-
(in press). Doi
-
I. Keivanloo, C. K. Roy, and J. Rilling. SeByte: Scalable clone and similarity search for bytecode. Science of Comp. Prog., pages-, 2013 (in press). doi: http://dx.doi.org/10.1016/j.scico.2013.10.006.
-
(2013)
Science of Comp. Prog
-
-
Keivanloo, I.1
Roy, C.K.2
Rilling, J.3
-
76
-
-
79959862704
-
MeCC memory comparison-based clone detector
-
H. Kim, Y. Jung, S. Kim, and K. Yi. MeCC: memory comparison-based clone detector. In ICSE, pages 301-310, 2011.
-
(2011)
ICSE
, pp. 301-310
-
-
Kim, H.1
Jung, Y.2
Kim, S.3
Yi, K.4
-
77
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy. An empirical study of code clone genealogies. In FSE, pages 187-196, 2005.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
78
-
-
84890052317
-
Using slicing to identify duplication in source code
-
R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40-56, 2001.
-
(2001)
SAS
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
79
-
-
0031346714
-
Evaluation experiments on the detection of programming patterns using software metrics
-
K. Kontogiannis. Evaluation experiments on the detection of programming patterns using software metrics. In WCRE, pages 44-54, 1997.
-
(1997)
WCRE
, pp. 44-54
-
-
Kontogiannis, K.1
-
80
-
-
72449205838
-
Survey of research on software clones
-
R. Koschke. Survey of research on software clones. In DRSS, pages 1-24, 2006.
-
(2006)
DRSS
, pp. 1-24
-
-
Koschke, R.1
-
81
-
-
56349141528
-
Is cloned code more stable than non-cloned code
-
J. Krinke. Is cloned code more stable than non-cloned code?. SCAM, 0:57-66, 2008.
-
(2008)
SCAM
, pp. 57-66
-
-
Krinke, J.1
-
83
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lague, D. Proulx, J. Mayrand, E. Merlo, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314-321, 1997.
-
(1997)
ICSM
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.5
-
84
-
-
85126165687
-
SDD high performance code clone detection system for large scale source code
-
S. Lee and I. Jeong. SDD: high performance code clone detection system for large scale source code. In OOPSLA, pages 140-141, 2005.
-
(2005)
OOPSLA
, pp. 140-141
-
-
Lee, S.1
Jeong, I.2
-
85
-
-
79952838956
-
Automated scheduling for clone-based refactoring using a competent ga
-
S. Lee, G. Bae, H. Chae, D. Bae, and Y. Kwon. Automated scheduling for clone-based refactoring using a competent ga. Softw. Pract. Exper., 41(5):521-550, 2010.
-
(2010)
Softw. Pract. Exper.
, vol.41
, Issue.5
, pp. 521-550
-
-
Lee, S.1
Bae, G.2
Chae, H.3
Bae, D.4
Kwon, Y.5
-
86
-
-
46149113708
-
Detecting duplications in sequence diagrams based on suffix trees
-
H. Liu, Z. Ma, L. Zhang, and W. Shao. Detecting duplications in sequence diagrams based on suffix trees. In APSEC, pages 269-276, 2006.
-
(2006)
APSEC
, pp. 269-276
-
-
Liu, H.1
Ma, Z.2
Zhang, L.3
Shao, W.4
-
87
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source programs using distributed cCFinder: D-CCFinder
-
S. Livieri, Y. Higo, M. Matushita, and K. Inoue. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In ICSE, pages 106-115, 2007.
-
(2007)
ICSE
, pp. 106-115
-
-
Livieri, S.1
Higo, Y.2
Matushita, M.3
Inoue, K.4
-
88
-
-
0010645736
-
Evaluating the benefits of clone detection in the software maintenance activities in large scale systems
-
J. Mayrand, B. Lague, and J. Hudepohl. Evaluating the benefits of clone detection in the software maintenance activities in large scale systems. In WESS, 1996.
-
(1996)
WESS
-
-
Mayrand, J.1
Lague, B.2
Hudepohl, J.3
-
89
-
-
0030407014
-
Experiment on the automatic detection of function clones in a software system using metrics
-
J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, pages 244-253, 1996.
-
(1996)
ICSM
, pp. 244-253
-
-
Mayrand, J.1
Leblanc, C.2
Merlo, E.3
-
90
-
-
84863588657
-
Comparative stability of cloned and non-cloned code an empirical study
-
M. Mondal, C. K. Roy, M. Rahman, R. K. Saha, J. Krinke, and K. A. Schneider. Comparative stability of cloned and non-cloned code: An empirical study. In ACM-SAC, pages 1227-1234, 2012.
-
(2012)
ACM-SAC
, pp. 1227-1234
-
-
Mondal, M.1
Roy, C.K.2
Rahman, M.3
Saha, R.K.4
Krinke, J.5
Schneider, K.A.6
-
91
-
-
84891686218
-
An empirical study on clone stability
-
M. Mondal, C. K. Roy, and K. A. Schneider. An empirical study on clone stability. ACM Applied Comp. Review, 12(3):20-36, 2012.
-
(2012)
ACM Applied Comp. Review
, vol.12
, Issue.3
, pp. 20-36
-
-
Mondal, M.1
Roy, C.K.2
Schneider, K.A.3
-
92
-
-
84954360374
-
An insight into the dispersion of changes in cloned and non-cloned code a genealogy based empirical study
-
(in press)
-
M. Mondal, C. K. Roy, and K. A. Schneider. An insight into the dispersion of changes in cloned and non-cloned code: A genealogy based empirical study. Sci. of Comp. Prog., pages-, 2013 (in press).
-
(2013)
Sci. of Comp. Prog
-
-
Mondal, M.1
Roy, C.K.2
Schneider, K.A.3
-
93
-
-
84898404595
-
Automatic ranking of clones for refactoring through mining association rules
-
(to appear)
-
M. Mondal, C. K. Roy, and K. A. Schneider. Automatic ranking of clones for refactoring through mining association rules. In CSMR-18/WCRE-21 Software Evolution Week, page 10, 2014 (to appear).
-
(2014)
CSMR-18/WCRE-21 Software Evolution Week
, pp. 10
-
-
Mondal, M.1
Roy, C.K.2
Schneider, K.A.3
-
94
-
-
56149091812
-
Source code enhancement using reduction of duplicated code
-
S. Nasehi, G. Sotudeh, and M. Gomrokchi. Source code enhancement using reduction of duplicated code. In IASTED, pages 192-197, 2007.
-
(2007)
IASTED
, pp. 192-197
-
-
Nasehi, S.1
Sotudeh, G.2
Gomrokchi, M.3
-
95
-
-
84864220655
-
Clone management for evolving software
-
H. Nguyen, T. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Clone management for evolving software. IEEE Trans. on Softw. Engg., 1(1): 1-19, 2011.
-
(2011)
IEEE Trans. on Softw. Engg.
, vol.1
, Issue.1
, pp. 1-19
-
-
Nguyen, H.1
Nguyen, T.2
Pham, N.3
Al-Kofahi, J.4
Nguyen, T.5
-
96
-
-
56249125683
-
Cleman comprehensive clone group evolution management
-
T. Nguyen, H. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Cleman: Comprehensive clone group evolution management. In ASE, pages 451-454, 2008.
-
(2008)
ASE
, pp. 451-454
-
-
Nguyen, T.1
Nguyen, H.2
Pham, N.3
Al-Kofahi, J.4
Nguyen, T.5
-
97
-
-
70849100692
-
Scalable and incremental clone detection for evolving software
-
T. Nguyen, H. Nguyen, J. Al-Kofahi, N. Pham, and T. Nguyen. Scalable and incremental clone detection for evolving software. In ICSM, pages 491-494, 2009.
-
(2009)
ICSM
, pp. 491-494
-
-
Nguyen, T.1
Nguyen, H.2
Al-Kofahi, J.3
Pham, N.4
Nguyen, T.5
-
98
-
-
77952114282
-
Cloneaware configuration management
-
T. Nguyen, H. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Cloneaware configuration management. In ASE, pages 123-134, 2009.
-
(2009)
ASE
, pp. 123-134
-
-
Nguyen, T.1
Nguyen, H.2
Pham, N.3
Al-Kofahi, J.4
Nguyen, T.5
-
100
-
-
77949896388
-
Complete and accurate clone detection in graph-based models
-
N. Pham, H. Nguyen, T. Nguyen, J. Al-Kofahi, and T. Nguyen. Complete and accurate clone detection in graph-based models. In ICSE, pages 276-286, 2009.
-
(2009)
ICSE
, pp. 276-286
-
-
Pham, N.1
Nguyen, H.2
Nguyen, T.3
Al-Kofahi, J.4
Nguyen, T.5
-
101
-
-
84886386931
-
On the relationships between domain-based coupling and code clones an exploratory study
-
M. S. Rahman, A. Aryani, C. K. Roy, and F. Perin. On the relationships between domain-based coupling and code clones: an exploratory study. In ICSE, pages 1265-1268, 2013.
-
(2013)
ICSE
, pp. 1265-1268
-
-
Rahman, M.S.1
Aryani, A.2
Roy, C.K.3
Perin, F.4
-
102
-
-
84877921938
-
Software clone detection a systematic review
-
D. Rattan, R. Bhatia, and M. Singh. Software clone detection: A systematic review. Infor. and Soft. Tech., 55(7):1165-1199, 2013.
-
(2013)
Infor. and Soft. Tech.
, vol.55
, Issue.7
, pp. 1165-1199
-
-
Rattan, D.1
Bhatia, R.2
Singh, M.3
-
103
-
-
18144389452
-
Insights into system-wide code duplication
-
M. Rieger, S. Ducasse, and M. Lanza. Insights into system-wide code duplication. In WCRE, pages 100-109, 2004.
-
(2004)
WCRE
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
104
-
-
57849136059
-
A survey on software clone detection research
-
Queens University
-
C. K. Roy and J. R. Cordy. A survey on software clone detection research. Tech Report TR 2007-541, Queens University, 2007.
-
(2007)
Tech Report TR 2007-541
-
-
Roy, C.K.1
Cordy, J.R.2
-
105
-
-
71149111492
-
NICAD accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
-
C. K. Roy and J. R. Cordy. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC, pages 172-181, 2008.
-
(2008)
ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
106
-
-
69949085058
-
A mutation/injection-based automatic framework for evaluating code clone detection tools
-
C. K. Roy and J. R. Cordy. A mutation/injection-based automatic framework for evaluating code clone detection tools. In ICSTW, pages 157-166, 2009.
-
(2009)
ICSTW
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
107
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools a qualitative approach
-
C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program., 74:470-495, 2009.
-
(2009)
Sci. Comput. Program.
, vol.74
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
108
-
-
78649431588
-
Evaluating code clone genealogies at release level an empirical study
-
R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, and K. A. Schneider. Evaluating code clone genealogies at release level: An empirical study. In SCAM, pages 87-96, 2010.
-
(2010)
SCAM
, pp. 87-96
-
-
Saha, R.K.1
Asaduzzaman, M.2
Zibran, M.F.3
Roy, C.K.4
Schneider, K.A.5
-
109
-
-
79959553623
-
Visualizing the evolution of code clones
-
ACM
-
R. K. Saha, C. K. Roy, and K. A. Schneider. Visualizing the evolution of code clones. In IWSC, pages 71-72. ACM, 2011.
-
(2011)
IWSC
, pp. 71-72
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
-
110
-
-
83455169586
-
An automatic framework for extracting and classifying near-miss clone genealogies
-
R. K. Saha, C. K. Roy, and K. A. Schneider. An automatic framework for extracting and classifying near-miss clone genealogies. In ICSM, pages 293-302, 2011.
-
(2011)
ICSM
, pp. 293-302
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
-
111
-
-
84891704605
-
Gcad a near-miss clone genealogy extractor to support clone evolution analysis
-
R. K. Saha, C. K. Roy, and K. A. Schneider. gcad: A near-miss clone genealogy extractor to support clone evolution analysis. In ICSM, pages 488-491, 2013.
-
(2013)
ICSM
, pp. 488-491
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
-
112
-
-
84889033372
-
Understanding the evolution of type-3 clones an exploratory study
-
R. K. Saha, C. K. Roy, K. A. Schneider, and D. E. Perry. Understanding the evolution of type-3 clones: an exploratory study. In MSR, pages 139-148, 2013.
-
(2013)
MSR
, pp. 139-148
-
-
Saha, R.K.1
Roy, C.K.2
Schneider, K.A.3
Perry, D.E.4
-
113
-
-
79959563521
-
Clone detection through process algebras and java bytecode
-
ACM
-
A. Santone. Clone detection through process algebras and Java bytecode. In IWSC, pages 73-74. ACM, 2011.
-
(2011)
IWSC
, pp. 73-74
-
-
Santone, A.1
-
114
-
-
77954706752
-
Advanced analysis for code clone removal
-
S. Schulze and M. Kuhlemann. Advanced analysis for code clone removal. In WSR, pages 1-2, 2009.
-
(2009)
WSR
, pp. 1-2
-
-
Schulze, S.1
Kuhlemann, M.2
-
115
-
-
72249085983
-
Towards a refactoring guideline using code clone classification
-
S. Schulze, M. Kuhlemann, and M. Rosenmüller. Towards a refactoring guideline using code clone classification. In WRT, pages 6:1-6:4, 2008.
-
(2008)
WRT
, pp. 61-64
-
-
Schulze, S.1
Kuhlemann, M.2
Rosenmüller, M.3
-
116
-
-
84864228150
-
On how often code is cloned across repositories
-
N. Schwarz, M. Lungu, and R. Robbes. On how often code is cloned across repositories. In ICSE-NIER, pages 1289-1292, 2012.
-
(2012)
ICSE-NIER
, pp. 1289-1292
-
-
Schwarz, N.1
Lungu, M.2
Robbes, R.3
-
117
-
-
78149384656
-
Towards clone detection in uML domain models
-
H. Störrle. Towards clone detection in UML domain models. In ECSA, pages 285-293, 2010.
-
(2010)
ECSA
, pp. 285-293
-
-
Störrle, H.1
-
118
-
-
84886651387
-
Scaling classical clone detection tools for ultra-large datasets an exploratory study
-
J. Svajlenko, I. Keivanloo, and C. K. Roy. Scaling classical clone detection tools for ultra-large datasets: An exploratory study. In IWSC, pages 16-22, 2013.
-
(2013)
IWSC
, pp. 16-22
-
-
Svajlenko, J.1
Keivanloo, I.2
Roy, C.K.3
-
119
-
-
84886666391
-
A mutation analysis based benchmarking framework for clone detectors
-
J. Svajlenko, C. K. Roy, and J. R. Cordy. A mutation analysis based benchmarking framework for clone detectors. In IWSC, pages 8-9, 2013.
-
(2013)
IWSC
, pp. 8-9
-
-
Svajlenko, J.1
Roy, C.K.2
Cordy, J.R.3
-
120
-
-
84871342914
-
-
(last access: Dec.)
-
R. Tairas. Code clones literature, (last access: Dec. 2013). URL http: //students.cis.uab.edu/tairasr/clones/literature/.
-
(2013)
Code Clones Literature
-
-
Tairas, R.1
-
121
-
-
34248359450
-
Phoenix-based clone detection using suffix trees
-
R. Tairas and J. Gray. Phoenix-based clone detection using suffix trees. In ACM-SE, pages 679-684, 2006.
-
(2006)
ACM-SE
, pp. 679-684
-
-
Tairas, R.1
Gray, J.2
-
122
-
-
72249122818
-
Get to know your clones with ceDAR
-
R. Tairas and J. Gray. Get to know your clones with CeDAR. In OOPSLA, pages 817-818, 2009.
-
(2009)
OOPSLA
, pp. 817-818
-
-
Tairas, R.1
Gray, J.2
-
123
-
-
84865722976
-
Increasing clone maintenance support by unifying clone detection and refactoring activities
-
R. Tairas and J. Gray. Increasing clone maintenance support by unifying clone detection and refactoring activities. Info. &Soft. Tech., 54(12):1297-1307, 2012.
-
(2012)
Info. &Soft. Tech.
, vol.54
, Issue.12
, pp. 1297-1307
-
-
Tairas, R.1
Gray, J.2
-
124
-
-
73449133306
-
Visualizing clone detection results
-
ACM
-
R. Tairas, J. Gray, and I. Baxter. Visualizing clone detection results. In ASE, pages 549-550. ACM, 2007.
-
(2007)
ASE
, pp. 549-550
-
-
Tairas, R.1
Gray, J.2
Baxter, I.3
-
125
-
-
16244384526
-
Managing duplicated code with linked editing
-
M. Toomim, A. Begel, and S. Graham. Managing duplicated code with linked editing. In VLHCC, pages 173-180, 2004.
-
(2004)
VLHCC
, pp. 173-180
-
-
Toomim, M.1
Begel, A.2
Graham, S.3
-
126
-
-
83455168943
-
On the effectiveness of simhash for detecting near-miss clones in large scale software systems
-
M. Uddin, C. K. Roy, K. A. Schneider, and A. Hindle. On the effectiveness of simhash for detecting near-miss clones in large scale software systems. In WCRE, pages 13-22, 2011.
-
(2011)
WCRE
, pp. 13-22
-
-
Uddin, M.1
Roy, C.K.2
Schneider, K.A.3
Hindle, A.4
-
127
-
-
84948459152
-
Gemini maintenance support environment based on code clone analysis
-
IEEE Computer Society Press
-
Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In METRICS, pages 67-76. IEEE Computer Society Press, 2002.
-
(2002)
METRICS
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
128
-
-
84886673916
-
Prioritizing code clone detection results for clone management
-
R. D. Venkatasubramanyam, S. Gupta, and H. K. Singh. Prioritizing code clone detection results for clone management. In IWSC, pages 30-36, 2013.
-
(2013)
IWSC
, pp. 30-36
-
-
Venkatasubramanyam, R.D.1
Gupta, S.2
Singh, H.K.3
-
129
-
-
84883701791
-
Searching for better configurations a rigorous approach to clone evaluation
-
T. Wang, M. Harman, Y. Jia, and J. Krinke. Searching for better configurations: a rigorous approach to clone evaluation. In ESEC/SIGSOFT FSE, pages 455-465, 2013.
-
(2013)
ESEC/SIGSOFT FSE
, pp. 455-465
-
-
Wang, T.1
Harman, M.2
Jia, Y.3
Krinke, J.4
-
130
-
-
84866951484
-
Can i clone this piece of code here
-
X. Wang, Y. Dang, L. Zhang, D. Zhang, E. Lan, and H. Mei. Can i clone this piece of code here?. In ASE, pages 170-179, 2012.
-
(2012)
ASE
, pp. 170-179
-
-
Wang, X.1
Dang, Y.2
Zhang, L.3
Zhang, D.4
Lan, E.5
Mei, H.6
-
132
-
-
84889077392
-
An empirical study of the faultproneness of clone mutation and clone migration
-
S. Xie, F. Khomh, and Y. Zou. An empirical study of the faultproneness of clone mutation and clone migration. In MSR, pages 149-158, 2013.
-
(2013)
MSR
, pp. 149-158
-
-
Xie, S.1
Khomh, F.2
Zou, Y.3
-
133
-
-
84898406717
-
An empirical study on the fault-proneness of clone migration in clone genealogies
-
(to appear)
-
S. Xie, F. Khomh, Y. Zou, and I. Keivanloo. An empirical study on the fault-proneness of clone migration in clone genealogies. In CSMR-18/WCRE-21 Software Evolution Week, page 10, 2014 (to appear).
-
(2014)
CSMR-18/WCRE-21 Software Evolution Week
, pp. 10
-
-
Xie, S.1
Khomh, F.2
Zou, Y.3
Keivanloo, I.4
-
134
-
-
84893379503
-
Distilling useful clones by contextual differencing
-
Z. Xing, Y. Xue, and S. Jarzabek. Distilling useful clones by contextual differencing. In WCRE, pages 102-111, 2013.
-
(2013)
WCRE
, pp. 102-111
-
-
Xing, Z.1
Xue, Y.2
Jarzabek, S.3
-
135
-
-
84885973880
-
Applying clone change notification system into an industrial development process
-
Y. Yamanaka, E. Choi, N. Yoshida, K. Inoue, and T.i Sano. Applying clone change notification system into an industrial development process. In ICPC, pages 199-206, 2013.
-
(2013)
ICPC
, pp. 199-206
-
-
Yamanaka, Y.1
Choi, E.2
Yoshida, N.3
Inoue, K.4
Sano, T.I.5
-
136
-
-
33749041482
-
On refactoring support based on code clone dependency relation
-
N. Yoshida, Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. On refactoring support based on code clone dependency relation. In METRICS, pages 16-25, 2005.
-
(2005)
METRICS
, pp. 16-25
-
-
Yoshida, N.1
Higo, Y.2
Kamiya, T.3
Kusumoto, S.4
Inoue, K.5
-
137
-
-
84873121846
-
Cloning practices why developers clone and what can be changed
-
G. Zhang, X. Peng, Z. Xing, and W. Zhao. Cloning practices: Why developers clone and what can be changed. In ICSM, pages 285-294, 2012.
-
(2012)
ICSM
, pp. 285-294
-
-
Zhang, G.1
Peng, X.2
Xing, Z.3
Zhao, W.4
-
138
-
-
84893582102
-
Towards contextual and on-demand code clone management by continuous monitoring
-
G. Zhang, X. Peng, Z. Xing, S. Jiang, H. Wang, and W. Zhao. Towards contextual and on-demand code clone management by continuous monitoring. In ASE, pages 497-507, 2013.
-
(2013)
ASE
, pp. 497-507
-
-
Zhang, G.1
Peng, X.2
Xing, Z.3
Jiang, S.4
Wang, H.5
Zhao, W.6
-
139
-
-
57849101681
-
Query-based filtering and graphical view generation for clone analysis
-
Y. Zhang, H. Basit, S. Jarzabek, D Anh, and M. Low. Query-based filtering and graphical view generation for clone analysis. In ICSM, pages 376-385, 2008.
-
(2008)
ICSM
, pp. 376-385
-
-
Zhang, Y.1
Basit, H.2
Jarzabek, S.3
Anh, D.4
Low, M.5
-
140
-
-
79959541424
-
Towards flexible code clone detection, management, and refactoring in iDE
-
M. F. Zibran and C. K. Roy. Towards flexible code clone detection, management, and refactoring in IDE. In IWSC, pages 75-76, 2011.
-
(2011)
IWSC
, pp. 75-76
-
-
Zibran, M.F.1
Roy, C.K.2
-
141
-
-
82055196656
-
A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring
-
M. F. Zibran and C. K. Roy. A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring. In SCAM, pages 105-114, 2011.
-
(2011)
SCAM
, pp. 105-114
-
-
Zibran, M.F.1
Roy, C.K.2
-
142
-
-
80052420320
-
Conflict-aware optimal scheduling of code clone refactoring a constraint programming approach
-
M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of code clone refactoring: A constraint programming approach. In ICPC, pages 266-269, 2011.
-
(2011)
ICPC
, pp. 266-269
-
-
Zibran, M.F.1
Roy, C.K.2
-
143
-
-
84863558744
-
IDE-based real-time focused search for near-miss clones
-
M. F. Zibran and C. K. Roy. IDE-based real-time focused search for near-miss clones. In ACM-SAC, pages 1235-1242, 2012.
-
(2012)
ACM-SAC
, pp. 1235-1242
-
-
Zibran, M.F.1
Roy, C.K.2
-
144
-
-
84879668288
-
Conflict-aware optimal scheduling of prioritized code clone refactoring
-
M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of prioritized code clone refactoring. IET Software, 7(3), 2013.
-
(2013)
IET Software
, vol.7
, Issue.3
-
-
Zibran, M.F.1
Roy, C.K.2
-
145
-
-
79960520851
-
Analyzing and forecasting near-miss clones in evolving software an empirical study
-
M. F. Zibran, R. K. Saha, M. Asaduzzaman, and C. K. Roy. Analyzing and forecasting near-miss clones in evolving software: An empirical study. In ICECCS, pages 295-304, 2011.
-
(2011)
ICECCS
, pp. 295-304
-
-
Zibran, M.F.1
Saha, R.K.2
Asaduzzaman, M.3
Roy, C.K.4
-
146
-
-
84877970919
-
Evaluating the conventional wisdom in clone removal a genealogy-based empirical study
-
M. F. Zibran, R. K. Saha, C. K. Roy, and K. A. Schneider. Evaluating the conventional wisdom in clone removal: a genealogy-based empirical study. In SAC, pages 1123-1130, 2013.
-
(2013)
SAC
, pp. 1123-1130
-
-
Zibran, M.F.1
Saha, R.K.2
Roy, C.K.3
Schneider, K.A.4
|