메뉴 건너뛰기




Volumn , Issue , 2014, Pages 18-33

The vision of software clone management: Past, present, and future (Keynote paper)

Author keywords

Clone Analysis; Clone Management; Code Clones; Future Research Directions

Indexed keywords

COMPUTER SOFTWARE MAINTENANCE; COST BENEFIT ANALYSIS; REENGINEERING; RESEARCH; REVERSE ENGINEERING; SURVEYS;

EID: 84898402943     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSMR-WCRE.2014.6747168     Document Type: Conference Paper
Times cited : (129)

References (146)
  • 1
    • 34548765475 scopus 로고    scopus 로고
    • SoftGUESS visualization and exploration of code clones in context
    • E. Adar and M. Kim. SoftGUESS: Visualization and exploration of code clones in context. In ICSE, pages 762-766, 2007.
    • (2007) ICSE , pp. 762-766
    • Adar, E.1    Kim, M.2
  • 2
    • 84872287323 scopus 로고    scopus 로고
    • Detecting clones across microsoft net programming languages
    • F. Al-Omari, I. Keivanloo, C. K. Roy, and J. Rilling. Detecting clones across microsoft.net programming languages. In WCRE, pages 405-414, 2012.
    • (2012) WCRE , pp. 405-414
    • Al-Omari, F.1    Keivanloo, I.2    Roy, C.K.3    Rilling, J.4
  • 3
    • 79959536841 scopus 로고    scopus 로고
    • VisCad flexible code clone analysis support for niCad
    • M. Asaduzzaman, C. K. Roy, and K. A. Schneider. VisCad: Flexible code clone analysis support for NiCad. In IWSC, pages 77-78, 2011.
    • (2011) IWSC , pp. 77-78
    • Asaduzzaman, M.1    Roy, C.K.2    Schneider, K.A.3
  • 5
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • B. Baker. On finding duplication and near-duplication in large software systems. In WCRE, pages 86-95, 1995.
    • (1995) WCRE , pp. 86-95
    • Baker, B.1
  • 6
    • 47349095405 scopus 로고    scopus 로고
    • Clone smells in software evolution
    • T. Bakota, R. Ferenc, and T. Gyimothy. Clone smells in software evolution. In ICSM, pages 24-33, 2007.
    • (2007) ICSM , pp. 24-33
    • Bakota, T.1    Ferenc, R.2    Gyimothy, T.3
  • 8
    • 84898414979 scopus 로고    scopus 로고
    • An empirical study of faults in late propagation clone genealogies
    • (in press). doi: 10.1002/smr.1597
    • L. Barbour, F. Khomh, and Y. Zou. An empirical study of faults in late propagation clone genealogies. Journal of Soft.: Evol. and Proc., pages-, 2013 (in press). doi: 10.1002/smr.1597.
    • (2013) Journal of Soft.: Evol. and Proc., Pages
    • Barbour, L.1    Khomh, F.2    Zou, Y.3
  • 9
    • 32344438117 scopus 로고    scopus 로고
    • Detecting higher-level similarity patterns in programs
    • H. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. SIGSOFT Softw. Eng. Notes, 30:156-165, 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , pp. 156-165
    • Basit, H.1    Jarzabek, S.2
  • 10
    • 84885384152 scopus 로고    scopus 로고
    • An empirical study on limits of clone unification using generics
    • H. Basit, D. Rajapakse, and S. Jarzabek. An empirical study on limits of clone unification using generics. In SEKE, pages 109-114, 2005.
    • (2005) SEKE , pp. 109-114
    • Basit, H.1    Rajapakse, D.2    Jarzabek, S.3
  • 11
    • 32344443652 scopus 로고    scopus 로고
    • Beyond templates a study of clones in the sTL and some general implications
    • H. A. Basit, D. C. Rajapakse, and S. Jarzabek. Beyond templates: a study of clones in the STL and some general implications. In ICSE, pages 451-459, 2005.
    • (2005) ICSE , pp. 451-459
    • Basit, H.A.1    Rajapakse, D.C.2    Jarzabek, S.3
  • 12
    • 0032311601 scopus 로고    scopus 로고
    • Clone detection using abstract syntax trees
    • I. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
    • (1998) ICSM , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Sant'anna, M.4    Bier, L.5
  • 13
    • 84872356449 scopus 로고    scopus 로고
    • Software clone management towards industrial application (dagstuhl seminar 12071)
    • I. D. Baxter, M. Conradt, J. R. Cordy, and R. Koschke. Software clone management towards industrial application (dagstuhl seminar 12071). Dagstuhl Reports, 2(2):21-57, 2012.
    • (2012) Dagstuhl Reports , vol.2 , Issue.2 , pp. 21-57
    • Baxter, I.D.1    Conradt, M.2    Cordy, J.R.3    Koschke, R.4
  • 14
    • 84891701161 scopus 로고    scopus 로고
    • An empirical study of clone removals
    • S. Bazrafshan and R. Koschke. An empirical study of clone removals. In ICSM, pages 50-59, 2013.
    • (2013) ICSM , pp. 50-59
    • Bazrafshan, S.1    Koschke, R.2
  • 16
    • 84858996164 scopus 로고    scopus 로고
    • An empirical study on inconsistent changes to code clones at the release level
    • N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan. An empirical study on inconsistent changes to code clones at the release level. Science of Comp. Prog., 77(6):760-776, 2012.
    • (2012) Science of Comp. Prog. , vol.77 , Issue.6 , pp. 760-776
    • Bettenburg, N.1    Shang, W.2    Ibrahim, W.3    Adams, B.4    Zou, Y.5    Hassan, A.6
  • 17
    • 33750238130 scopus 로고    scopus 로고
    • A novel approach to optimize clone refactoring activity
    • S. Bouktif, G. Antoniol, M. Neteler, and E. Merlo. A novel approach to optimize clone refactoring activity. In GECCO, pages 1885-1892, 2006.
    • (2006) GECCO , pp. 1885-1892
    • Bouktif, S.1    Antoniol, G.2    Neteler, M.3    Merlo, E.4
  • 18
    • 84864260699 scopus 로고    scopus 로고
    • Claims and beliefs about code clones do we agree as a community
    • D. Chatterji, J. C. Carver, and N. A. Kraft. Claims and beliefs about code clones: Do we agree as a community?. a survey. In IWSC, pages 15-21, 2012.
    • (2012) A Survey. in IWSC , pp. 15-21
    • Chatterji, D.1    Carver, J.C.2    Kraft, N.A.3
  • 19
    • 84886672176 scopus 로고    scopus 로고
    • Cloning the need to understand developer intent
    • D. Chatterji, J. C. Carver, and N. A. Kraft. Cloning: The need to understand developer intent. In IWSC, pages 14-15, 2013.
    • (2013) IWSC , pp. 14-15
    • Chatterji, D.1    Carver, J.C.2    Kraft, N.A.3
  • 20
    • 84893357565 scopus 로고    scopus 로고
    • Effects of cloned code on software maintainability a replicated developer study
    • D. Chatterji, J. C. Carver, N. A. Kraft, and J. Harder. Effects of cloned code on software maintainability: A replicated developer study. In WCRE, pages 112-121, 2013.
    • (2013) WCRE , pp. 112-121
    • Chatterji, D.1    Carver, J.C.2    Kraft, N.A.3    Harder, J.4
  • 22
    • 84979020988 scopus 로고    scopus 로고
    • Comprehending reality practical barriers to industrial adoption of software maintenance automation
    • J. R. Cordy. Comprehending reality: Practical barriers to industrial adoption of software maintenance automation. In IWPC, pages 196-206, 2003.
    • (2003) IWPC , pp. 196-206
    • Cordy, J.R.1
  • 23
    • 80052416205 scopus 로고    scopus 로고
    • Exploring large-scale system similarity using incremental clone detection and live scatterplots
    • J. R. Cordy. Exploring large-scale system similarity using incremental clone detection and live scatterplots. In ICPC, pages 151-160, 2011.
    • (2011) ICPC , pp. 151-160
    • Cordy, J.R.1
  • 24
    • 79959550317 scopus 로고    scopus 로고
    • Live scatterplots
    • J. R. Cordy. Live scatterplots. In IWSC, pages 79-80, 2011.
    • (2011) IWSC , pp. 79-80
    • Cordy, J.R.1
  • 25
    • 32344442609 scopus 로고    scopus 로고
    • Practical languageindependent detection of near-miss clones
    • J. R. Cordy, T. R. Dean, and N. Synytskyy. Practical languageindependent detection of near-miss clones. In CASCON, pages 1-12, 2004.
    • (2004) CASCON , pp. 1-12
    • Cordy, J.R.1    Dean, T.R.2    Synytskyy, N.3
  • 26
    • 84872120272 scopus 로고    scopus 로고
    • XIAO tuning code clones at hands of engineers in practice
    • Y. Dang, D. Zhang, S. Ge, C. Chu, Y. Qiu, and T. Xie. XIAO: tuning code clones at hands of engineers in practice. In ACSAC, pages 369-378, 2012.
    • (2012) ACSAC , pp. 369-378
    • Dang, Y.1    Zhang, D.2    Ge, S.3    Chu, C.4    Qiu, Y.5    Xie, T.6
  • 27
    • 77954709520 scopus 로고    scopus 로고
    • Clone detection by exploiting assembler
    • ACM
    • I. Davis and M. Godfrey. Clone detection by exploiting assembler. In IWSC, pages 77-78. ACM, 2010.
    • (2010) IWSC , pp. 77-78
    • Davis, I.1    Godfrey, M.2
  • 28
    • 70849100995 scopus 로고    scopus 로고
    • Managing code clones using dynamic change tracking and resolution
    • M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In ICSM, pages 169-178, 2009.
    • (2009) ICSM , pp. 169-178
    • De Wit, M.1    Zaidman, A.2    Van Deursen, A.3
  • 30
    • 77954339263 scopus 로고    scopus 로고
    • Clone region descriptors repre-senting and tracking duplication in source code
    • E. Duala-Ekoko and M. Robillard. Clone region descriptors: Repre-senting and tracking duplication in source code. ACM Trans. Softw. Eng. Methodol., 20:3:1-3:31, 2010.
    • (2010) ACM Trans. Softw. Eng. Methodol , vol.20 , pp. 31-331
    • Duala-Ekoko, E.1    Robillard, M.2
  • 32
    • 0033308732 scopus 로고    scopus 로고
    • A language independent approach for detecting duplicated code
    • S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In ICSM, pages 109-118, 1999.
    • (1999) ICSM , pp. 109-118
    • Ducasse, S.1    Rieger, M.2    Demeyer, S.3
  • 33
    • 56749179725 scopus 로고    scopus 로고
    • Empirical evaluation of clone detection using syntax suffix trees
    • R. Falke, P. Frenzel, and R. Koschke. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering, 13:601-643, 2008.
    • (2008) Empirical Software Engineering , vol.13 , pp. 601-643
    • Falke, R.1    Frenzel, P.2    Koschke, R.3
  • 34
    • 84870849774 scopus 로고    scopus 로고
    • Doppel-Code a clone visualization tool for prioritizing global and local clone impacts
    • C. Forbes, I. Keivanloo, and J. Rilling. Doppel-Code: A clone visualization tool for prioritizing global and local clone impacts. In COMPSAC, pages 366-367, 2012.
    • (2012) COMPSAC , pp. 366-367
    • Forbes, C.1    Keivanloo, I.2    Rilling, J.3
  • 37
    • 84944696785 scopus 로고    scopus 로고
    • Generic modelling of code clones
    • S. Giesecke. Generic modelling of code clones. In DRSS, pages 1-23, 2007.
    • (2007) DRSS , pp. 1-23
    • Giesecke, S.1
  • 39
    • 79959897807 scopus 로고    scopus 로고
    • Frequency and risks of changes to clones
    • N. Göde and R. Koschke. Frequency and risks of changes to clones. In ICSE, pages 311-320, 2011.
    • (2011) ICSE , pp. 311-320
    • Göde, N.1    Koschke, R.2
  • 40
    • 84875386059 scopus 로고    scopus 로고
    • Studying clone evolution using incremental clone detection
    • N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. J. of Soft.: Evol. and Proc., 25(2):165-192, 2013.
    • (2013) J. of Soft.: Evol. and Proc. , vol.25 , Issue.2 , pp. 165-192
    • Göde, N.1    Koschke, R.2
  • 41
    • 0034226738 scopus 로고    scopus 로고
    • Predicting fault incidence using software change history
    • T. L Graves, A. F. Karr, J. S. Marron, and H. Siy. Predicting fault incidence using software change history. IEEE Tran. on Soft. Engg., 26(7):653-661, 2000.
    • (2000) IEEE Tran. on Soft. Engg. , vol.26 , Issue.7 , pp. 653-661
    • Graves, T.L.1    Karr, A.F.2    Marron, J.S.3    Siy, H.4
  • 42
    • 84886647037 scopus 로고    scopus 로고
    • The limits of clone model standardization
    • J. Harder. The limits of clone model standardization. In IWSC, pages 10-11, 2013.
    • (2013) IWSC , pp. 10-11
    • Harder, J.1
  • 43
    • 77954704110 scopus 로고    scopus 로고
    • Quo vadis, clone management
    • J. Harder and N. Göde. Quo vadis, clone management?. In IWSC, pages 85-86, 2010.
    • (2010) IWSC , pp. 85-86
    • Harder, J.1    Göde, N.2
  • 44
    • 79959572195 scopus 로고    scopus 로고
    • Efficiently handling clone data rCF and cyclone
    • ACM
    • J. Harder and N. Göde. Efficiently handling clone data: RCF and cyclone. In IWSC, pages 81-82. ACM, 2011.
    • (2011) IWSC , pp. 81-82
    • Harder, J.1    Göde, N.2
  • 46
    • 84883681660 scopus 로고    scopus 로고
    • Data clone detection and visualization in spreadsheets
    • F. Hermans, B. Sedee, M. Pinzger, and A. van Deursen. Data clone detection and visualization in Spreadsheets. In ICSE, pages 292-301, 2013.
    • (2013) ICSE , pp. 292-301
    • Hermans, F.1    Sedee, B.2    Pinzger, M.3    Van Deursen, A.4
  • 47
    • 73449120719 scopus 로고    scopus 로고
    • Enhancing quality of code clone detection with program dependency graph
    • Y. Higo and S. Kusumoto. Enhancing quality of code clone detection with program dependency graph. In WCRE, pages 315-316, 2009.
    • (2009) WCRE , pp. 315-316
    • Higo, Y.1    Kusumoto, S.2
  • 48
    • 35048850423 scopus 로고    scopus 로고
    • Refactoring support based on code clone analysis
    • Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. PROFES, pages 220-233, 2004.
    • (2004) PROFES , pp. 220-233
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 49
    • 83455205954 scopus 로고    scopus 로고
    • Incremental code clone detection a pDG-based approach
    • Y. Higo, U. Yasushi, M. Nishino, and S. Kusumoto. Incremental code clone detection: A PDG-based approach. In WCRE, pages 3-12, 2011.
    • (2011) WCRE , pp. 3-12
    • Higo, Y.1    Yasushi, U.2    Nishino, M.3    Kusumoto, S.4
  • 50
    • 78649993696 scopus 로고    scopus 로고
    • Is duplicate code more frequently modified than non-duplicate code in software evolution? An empirical study on open source software
    • K. Hotta, Y. Sano, Y. Higo, and S. Kusumoto. Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In IWPSE-EVOL, pages 73-82, 2010.
    • (2010) IWPSE-EVOL , pp. 73-82
    • Hotta, K.1    Sano, Y.2    Higo, Y.3    Kusumoto, S.4
  • 51
    • 70349991481 scopus 로고    scopus 로고
    • CnP towards an environment for the proactive management of copy-and-paste programming
    • D. Hou, P. Jablonski, and F. Jacob. CnP: Towards an environment for the proactive management of copy-and-paste programming. In ICPC, pages 238-242, 2009.
    • (2009) ICPC , pp. 238-242
    • Hou, D.1    Jablonski, P.2    Jacob, F.3
  • 52
    • 77951580427 scopus 로고    scopus 로고
    • Exploring the design space of proactive tool support for copy-and-paste programming
    • D. Hou, F. Jacob, and P. Jablonski. Exploring the design space of proactive tool support for copy-and-paste programming. In CASCON, pages 188-202, 2009.
    • (2009) CASCON , pp. 188-202
    • Hou, D.1    Jacob, F.2    Jablonski, P.3
  • 53
    • 78650088347 scopus 로고    scopus 로고
    • Index-based code clone detection incremental, distributed, scalable
    • B. Hummel, E. Juergens, L. Heinemann, and M. Conradt. Index-based code clone detection: incremental, distributed, scalable. In ICSM, pages 1-9, 2010.
    • (2010) ICSM , pp. 1-9
    • Hummel, B.1    Juergens, E.2    Heinemann, L.3    Conradt, M.4
  • 54
    • 56249095379 scopus 로고    scopus 로고
    • CReN a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the iDE
    • P. Jablonski and D. Hou. CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE. In ETX, pages 16-20, 2007.
    • (2007) ETX , pp. 16-20
    • Jablonski, P.1    Hou, D.2
  • 55
    • 33747790264 scopus 로고    scopus 로고
    • Unifying clones with a generative programming technique a case study
    • S. Jarzabek and S. Li. Unifying clones with a generative programming technique: a case study. Journal of Software: Evolution and Process, 18(4):267-292, 2006.
    • (2006) Journal of Software: Evolution and Process , vol.18 , Issue.4 , pp. 267-292
    • Jarzabek, S.1    Li, S.2
  • 56
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD scalable and accurate tree-based detection of code clones
    • L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
    • (2007) ICSE , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 57
    • 47749155579 scopus 로고    scopus 로고
    • A framework for studying clones in large software systems
    • Z. Jiang and A. Hassan. A framework for studying clones in large software systems. In SCAM, pages 203-212, 2007.
    • (2007) SCAM , pp. 203-212
    • Jiang, Z.1    Hassan, A.2
  • 58
    • 46149127124 scopus 로고    scopus 로고
    • Visualizing clone cohesion and coupling
    • Z. Jiang, A. Hassan, and R. Holt. Visualizing clone cohesion and coupling. In APSEC, pages 467-476, 2006.
    • (2006) APSEC , pp. 467-476
    • Jiang, Z.1    Hassan, A.2    Holt, R.3
  • 59
    • 84962184978 scopus 로고
    • Substring matching for clone detection and change tracking
    • J. Johnson. Substring matching for clone detection and change tracking. In ICSM, pages 120-126, 1994.
    • (1994) ICSM , pp. 120-126
    • Johnson, J.1
  • 60
    • 53849147395 scopus 로고
    • Visualizing textual redundancy in legacy source
    • IBM Press
    • J. Johnson. Visualizing textual redundancy in legacy source. In CASCON, pages 32-41. IBM Press, 1994.
    • (1994) CASCON , pp. 32-41
    • Johnson, J.1
  • 61
    • 3743089117 scopus 로고    scopus 로고
    • Navigating the textual redundancy web in legacy source
    • IBM Press
    • J. Johnson. Navigating the textual redundancy web in legacy source. In CASCON, pages 16-25. IBM Press, 1996.
    • (1996) CASCON , pp. 16-25
    • Johnson, J.1
  • 62
    • 79959543320 scopus 로고    scopus 로고
    • Research in cloning beyond code a first roadmap
    • E. Juergens. Research in cloning beyond code: a first roadmap. In IWSC, pages 67-68, 2011.
    • (2011) IWSC , pp. 67-68
    • Juergens, E.1
  • 64
    • 77949882149 scopus 로고    scopus 로고
    • CloneDetective-A workbench for clone detection research
    • E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective-A workbench for clone detection research. In ICSE, pages 603-606, 2009.
    • (2009) ICSE , pp. 603-606
    • Juergens, E.1    Deissenboeck, F.2    Hummel, B.3
  • 66
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder a multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7):654-670, 2002.
    • (2002) IEEE Trans. Softw. Eng. , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 68
    • 56749132226 scopus 로고    scopus 로고
    • Cloning considered harmful" considered harmful patterns of cloning in software
    • C. Kapser and M. Godfrey. Cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering, 13:645-692, 2008.
    • (2008) Empirical Software Engineering , vol.13 , pp. 645-692
    • Kapser, C.1    Godfrey, M.2
  • 69
    • 11244253656 scopus 로고    scopus 로고
    • Aiding comprehension of cloning through categorization
    • C. Kapser and M. W. Godfrey. Aiding comprehension of cloning through categorization. In IWPSE, pages 85-94, 2004.
    • (2004) IWPSE , pp. 85-94
    • Kapser, C.1    Godfrey, M.W.2
  • 70
    • 33646409529 scopus 로고    scopus 로고
    • Improved tool support for the investigation of duplication in software
    • C. Kapser and M. W. Godfrey. Improved tool support for the investigation of duplication in software. In ICSM, pages 305-314, 2005.
    • (2005) ICSM , pp. 305-314
    • Kapser, C.1    Godfrey, M.W.2
  • 71
    • 33646429779 scopus 로고    scopus 로고
    • Supporting the analysis of clones in software systems a case study
    • C. Kapser and M. W. Godfrey. Supporting the analysis of clones in software systems: A case study. J. Softw. Maint. Evol., 18:61-82, 2006.
    • (2006) J. Softw. Maint. Evol. , vol.18 , pp. 61-82
    • Kapser, C.1    Godfrey, M.W.2
  • 72
    • 84864251840 scopus 로고    scopus 로고
    • A common conceptual model for clone detection results
    • C. Kapser, J. Harder, and I. Baxter. A common conceptual model for clone detection results. In IWSC, pages 72-73, 2012.
    • (2012) IWSC , pp. 72-73
    • Kapser, C.1    Harder, J.2    Baxter, I.3
  • 74
    • 84928686991 scopus 로고    scopus 로고
    • SeByte scalable clone and similarity search for bytecode
    • (in press). Doi
    • I. Keivanloo, C. K. Roy, and J. Rilling. SeByte: Scalable clone and similarity search for bytecode. Science of Comp. Prog., pages-, 2013 (in press). doi: http://dx.doi.org/10.1016/j.scico.2013.10.006.
    • (2013) Science of Comp. Prog
    • Keivanloo, I.1    Roy, C.K.2    Rilling, J.3
  • 76
    • 79959862704 scopus 로고    scopus 로고
    • MeCC memory comparison-based clone detector
    • H. Kim, Y. Jung, S. Kim, and K. Yi. MeCC: memory comparison-based clone detector. In ICSE, pages 301-310, 2011.
    • (2011) ICSE , pp. 301-310
    • Kim, H.1    Jung, Y.2    Kim, S.3    Yi, K.4
  • 77
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • M. Kim, V. Sazawal, D. Notkin, and G. C. Murphy. An empirical study of code clone genealogies. In FSE, pages 187-196, 2005.
    • (2005) FSE , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3    Murphy, G.C.4
  • 78
    • 84890052317 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40-56, 2001.
    • (2001) SAS , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 79
    • 0031346714 scopus 로고    scopus 로고
    • Evaluation experiments on the detection of programming patterns using software metrics
    • K. Kontogiannis. Evaluation experiments on the detection of programming patterns using software metrics. In WCRE, pages 44-54, 1997.
    • (1997) WCRE , pp. 44-54
    • Kontogiannis, K.1
  • 80
    • 72449205838 scopus 로고    scopus 로고
    • Survey of research on software clones
    • R. Koschke. Survey of research on software clones. In DRSS, pages 1-24, 2006.
    • (2006) DRSS , pp. 1-24
    • Koschke, R.1
  • 81
    • 56349141528 scopus 로고    scopus 로고
    • Is cloned code more stable than non-cloned code
    • J. Krinke. Is cloned code more stable than non-cloned code?. SCAM, 0:57-66, 2008.
    • (2008) SCAM , pp. 57-66
    • Krinke, J.1
  • 83
    • 0031371549 scopus 로고    scopus 로고
    • Assessing the benefits of incorporating function clone detection in a development process
    • B. Lague, D. Proulx, J. Mayrand, E. Merlo, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314-321, 1997.
    • (1997) ICSM , pp. 314-321
    • Lague, B.1    Proulx, D.2    Mayrand, J.3    Merlo, E.4    Hudepohl, J.5
  • 84
    • 85126165687 scopus 로고    scopus 로고
    • SDD high performance code clone detection system for large scale source code
    • S. Lee and I. Jeong. SDD: high performance code clone detection system for large scale source code. In OOPSLA, pages 140-141, 2005.
    • (2005) OOPSLA , pp. 140-141
    • Lee, S.1    Jeong, I.2
  • 85
    • 79952838956 scopus 로고    scopus 로고
    • Automated scheduling for clone-based refactoring using a competent ga
    • S. Lee, G. Bae, H. Chae, D. Bae, and Y. Kwon. Automated scheduling for clone-based refactoring using a competent ga. Softw. Pract. Exper., 41(5):521-550, 2010.
    • (2010) Softw. Pract. Exper. , vol.41 , Issue.5 , pp. 521-550
    • Lee, S.1    Bae, G.2    Chae, H.3    Bae, D.4    Kwon, Y.5
  • 86
    • 46149113708 scopus 로고    scopus 로고
    • Detecting duplications in sequence diagrams based on suffix trees
    • H. Liu, Z. Ma, L. Zhang, and W. Shao. Detecting duplications in sequence diagrams based on suffix trees. In APSEC, pages 269-276, 2006.
    • (2006) APSEC , pp. 269-276
    • Liu, H.1    Ma, Z.2    Zhang, L.3    Shao, W.4
  • 87
    • 34548789572 scopus 로고    scopus 로고
    • Very-large scale code clone analysis and visualization of open source programs using distributed cCFinder: D-CCFinder
    • S. Livieri, Y. Higo, M. Matushita, and K. Inoue. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In ICSE, pages 106-115, 2007.
    • (2007) ICSE , pp. 106-115
    • Livieri, S.1    Higo, Y.2    Matushita, M.3    Inoue, K.4
  • 88
    • 0010645736 scopus 로고    scopus 로고
    • Evaluating the benefits of clone detection in the software maintenance activities in large scale systems
    • J. Mayrand, B. Lague, and J. Hudepohl. Evaluating the benefits of clone detection in the software maintenance activities in large scale systems. In WESS, 1996.
    • (1996) WESS
    • Mayrand, J.1    Lague, B.2    Hudepohl, J.3
  • 89
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, pages 244-253, 1996.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 90
    • 84863588657 scopus 로고    scopus 로고
    • Comparative stability of cloned and non-cloned code an empirical study
    • M. Mondal, C. K. Roy, M. Rahman, R. K. Saha, J. Krinke, and K. A. Schneider. Comparative stability of cloned and non-cloned code: An empirical study. In ACM-SAC, pages 1227-1234, 2012.
    • (2012) ACM-SAC , pp. 1227-1234
    • Mondal, M.1    Roy, C.K.2    Rahman, M.3    Saha, R.K.4    Krinke, J.5    Schneider, K.A.6
  • 92
    • 84954360374 scopus 로고    scopus 로고
    • An insight into the dispersion of changes in cloned and non-cloned code a genealogy based empirical study
    • (in press)
    • M. Mondal, C. K. Roy, and K. A. Schneider. An insight into the dispersion of changes in cloned and non-cloned code: A genealogy based empirical study. Sci. of Comp. Prog., pages-, 2013 (in press).
    • (2013) Sci. of Comp. Prog
    • Mondal, M.1    Roy, C.K.2    Schneider, K.A.3
  • 93
    • 84898404595 scopus 로고    scopus 로고
    • Automatic ranking of clones for refactoring through mining association rules
    • (to appear)
    • M. Mondal, C. K. Roy, and K. A. Schneider. Automatic ranking of clones for refactoring through mining association rules. In CSMR-18/WCRE-21 Software Evolution Week, page 10, 2014 (to appear).
    • (2014) CSMR-18/WCRE-21 Software Evolution Week , pp. 10
    • Mondal, M.1    Roy, C.K.2    Schneider, K.A.3
  • 94
    • 56149091812 scopus 로고    scopus 로고
    • Source code enhancement using reduction of duplicated code
    • S. Nasehi, G. Sotudeh, and M. Gomrokchi. Source code enhancement using reduction of duplicated code. In IASTED, pages 192-197, 2007.
    • (2007) IASTED , pp. 192-197
    • Nasehi, S.1    Sotudeh, G.2    Gomrokchi, M.3
  • 96
    • 56249125683 scopus 로고    scopus 로고
    • Cleman comprehensive clone group evolution management
    • T. Nguyen, H. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Cleman: Comprehensive clone group evolution management. In ASE, pages 451-454, 2008.
    • (2008) ASE , pp. 451-454
    • Nguyen, T.1    Nguyen, H.2    Pham, N.3    Al-Kofahi, J.4    Nguyen, T.5
  • 97
    • 70849100692 scopus 로고    scopus 로고
    • Scalable and incremental clone detection for evolving software
    • T. Nguyen, H. Nguyen, J. Al-Kofahi, N. Pham, and T. Nguyen. Scalable and incremental clone detection for evolving software. In ICSM, pages 491-494, 2009.
    • (2009) ICSM , pp. 491-494
    • Nguyen, T.1    Nguyen, H.2    Al-Kofahi, J.3    Pham, N.4    Nguyen, T.5
  • 100
    • 77949896388 scopus 로고    scopus 로고
    • Complete and accurate clone detection in graph-based models
    • N. Pham, H. Nguyen, T. Nguyen, J. Al-Kofahi, and T. Nguyen. Complete and accurate clone detection in graph-based models. In ICSE, pages 276-286, 2009.
    • (2009) ICSE , pp. 276-286
    • Pham, N.1    Nguyen, H.2    Nguyen, T.3    Al-Kofahi, J.4    Nguyen, T.5
  • 101
    • 84886386931 scopus 로고    scopus 로고
    • On the relationships between domain-based coupling and code clones an exploratory study
    • M. S. Rahman, A. Aryani, C. K. Roy, and F. Perin. On the relationships between domain-based coupling and code clones: an exploratory study. In ICSE, pages 1265-1268, 2013.
    • (2013) ICSE , pp. 1265-1268
    • Rahman, M.S.1    Aryani, A.2    Roy, C.K.3    Perin, F.4
  • 102
    • 84877921938 scopus 로고    scopus 로고
    • Software clone detection a systematic review
    • D. Rattan, R. Bhatia, and M. Singh. Software clone detection: A systematic review. Infor. and Soft. Tech., 55(7):1165-1199, 2013.
    • (2013) Infor. and Soft. Tech. , vol.55 , Issue.7 , pp. 1165-1199
    • Rattan, D.1    Bhatia, R.2    Singh, M.3
  • 103
    • 18144389452 scopus 로고    scopus 로고
    • Insights into system-wide code duplication
    • M. Rieger, S. Ducasse, and M. Lanza. Insights into system-wide code duplication. In WCRE, pages 100-109, 2004.
    • (2004) WCRE , pp. 100-109
    • Rieger, M.1    Ducasse, S.2    Lanza, M.3
  • 104
    • 57849136059 scopus 로고    scopus 로고
    • A survey on software clone detection research
    • Queens University
    • C. K. Roy and J. R. Cordy. A survey on software clone detection research. Tech Report TR 2007-541, Queens University, 2007.
    • (2007) Tech Report TR 2007-541
    • Roy, C.K.1    Cordy, J.R.2
  • 105
    • 71149111492 scopus 로고    scopus 로고
    • NICAD accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
    • C. K. Roy and J. R. Cordy. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC, pages 172-181, 2008.
    • (2008) ICPC , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 106
    • 69949085058 scopus 로고    scopus 로고
    • A mutation/injection-based automatic framework for evaluating code clone detection tools
    • C. K. Roy and J. R. Cordy. A mutation/injection-based automatic framework for evaluating code clone detection tools. In ICSTW, pages 157-166, 2009.
    • (2009) ICSTW , pp. 157-166
    • Roy, C.K.1    Cordy, J.R.2
  • 107
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools a qualitative approach
    • C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program., 74:470-495, 2009.
    • (2009) Sci. Comput. Program. , vol.74 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 108
    • 78649431588 scopus 로고    scopus 로고
    • Evaluating code clone genealogies at release level an empirical study
    • R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, and K. A. Schneider. Evaluating code clone genealogies at release level: An empirical study. In SCAM, pages 87-96, 2010.
    • (2010) SCAM , pp. 87-96
    • Saha, R.K.1    Asaduzzaman, M.2    Zibran, M.F.3    Roy, C.K.4    Schneider, K.A.5
  • 109
    • 79959553623 scopus 로고    scopus 로고
    • Visualizing the evolution of code clones
    • ACM
    • R. K. Saha, C. K. Roy, and K. A. Schneider. Visualizing the evolution of code clones. In IWSC, pages 71-72. ACM, 2011.
    • (2011) IWSC , pp. 71-72
    • Saha, R.K.1    Roy, C.K.2    Schneider, K.A.3
  • 110
    • 83455169586 scopus 로고    scopus 로고
    • An automatic framework for extracting and classifying near-miss clone genealogies
    • R. K. Saha, C. K. Roy, and K. A. Schneider. An automatic framework for extracting and classifying near-miss clone genealogies. In ICSM, pages 293-302, 2011.
    • (2011) ICSM , pp. 293-302
    • Saha, R.K.1    Roy, C.K.2    Schneider, K.A.3
  • 111
    • 84891704605 scopus 로고    scopus 로고
    • Gcad a near-miss clone genealogy extractor to support clone evolution analysis
    • R. K. Saha, C. K. Roy, and K. A. Schneider. gcad: A near-miss clone genealogy extractor to support clone evolution analysis. In ICSM, pages 488-491, 2013.
    • (2013) ICSM , pp. 488-491
    • Saha, R.K.1    Roy, C.K.2    Schneider, K.A.3
  • 112
    • 84889033372 scopus 로고    scopus 로고
    • Understanding the evolution of type-3 clones an exploratory study
    • R. K. Saha, C. K. Roy, K. A. Schneider, and D. E. Perry. Understanding the evolution of type-3 clones: an exploratory study. In MSR, pages 139-148, 2013.
    • (2013) MSR , pp. 139-148
    • Saha, R.K.1    Roy, C.K.2    Schneider, K.A.3    Perry, D.E.4
  • 113
    • 79959563521 scopus 로고    scopus 로고
    • Clone detection through process algebras and java bytecode
    • ACM
    • A. Santone. Clone detection through process algebras and Java bytecode. In IWSC, pages 73-74. ACM, 2011.
    • (2011) IWSC , pp. 73-74
    • Santone, A.1
  • 114
    • 77954706752 scopus 로고    scopus 로고
    • Advanced analysis for code clone removal
    • S. Schulze and M. Kuhlemann. Advanced analysis for code clone removal. In WSR, pages 1-2, 2009.
    • (2009) WSR , pp. 1-2
    • Schulze, S.1    Kuhlemann, M.2
  • 115
    • 72249085983 scopus 로고    scopus 로고
    • Towards a refactoring guideline using code clone classification
    • S. Schulze, M. Kuhlemann, and M. Rosenmüller. Towards a refactoring guideline using code clone classification. In WRT, pages 6:1-6:4, 2008.
    • (2008) WRT , pp. 61-64
    • Schulze, S.1    Kuhlemann, M.2    Rosenmüller, M.3
  • 116
    • 84864228150 scopus 로고    scopus 로고
    • On how often code is cloned across repositories
    • N. Schwarz, M. Lungu, and R. Robbes. On how often code is cloned across repositories. In ICSE-NIER, pages 1289-1292, 2012.
    • (2012) ICSE-NIER , pp. 1289-1292
    • Schwarz, N.1    Lungu, M.2    Robbes, R.3
  • 117
    • 78149384656 scopus 로고    scopus 로고
    • Towards clone detection in uML domain models
    • H. Störrle. Towards clone detection in UML domain models. In ECSA, pages 285-293, 2010.
    • (2010) ECSA , pp. 285-293
    • Störrle, H.1
  • 118
    • 84886651387 scopus 로고    scopus 로고
    • Scaling classical clone detection tools for ultra-large datasets an exploratory study
    • J. Svajlenko, I. Keivanloo, and C. K. Roy. Scaling classical clone detection tools for ultra-large datasets: An exploratory study. In IWSC, pages 16-22, 2013.
    • (2013) IWSC , pp. 16-22
    • Svajlenko, J.1    Keivanloo, I.2    Roy, C.K.3
  • 119
    • 84886666391 scopus 로고    scopus 로고
    • A mutation analysis based benchmarking framework for clone detectors
    • J. Svajlenko, C. K. Roy, and J. R. Cordy. A mutation analysis based benchmarking framework for clone detectors. In IWSC, pages 8-9, 2013.
    • (2013) IWSC , pp. 8-9
    • Svajlenko, J.1    Roy, C.K.2    Cordy, J.R.3
  • 120
    • 84871342914 scopus 로고    scopus 로고
    • (last access: Dec.)
    • R. Tairas. Code clones literature, (last access: Dec. 2013). URL http: //students.cis.uab.edu/tairasr/clones/literature/.
    • (2013) Code Clones Literature
    • Tairas, R.1
  • 121
    • 34248359450 scopus 로고    scopus 로고
    • Phoenix-based clone detection using suffix trees
    • R. Tairas and J. Gray. Phoenix-based clone detection using suffix trees. In ACM-SE, pages 679-684, 2006.
    • (2006) ACM-SE , pp. 679-684
    • Tairas, R.1    Gray, J.2
  • 122
    • 72249122818 scopus 로고    scopus 로고
    • Get to know your clones with ceDAR
    • R. Tairas and J. Gray. Get to know your clones with CeDAR. In OOPSLA, pages 817-818, 2009.
    • (2009) OOPSLA , pp. 817-818
    • Tairas, R.1    Gray, J.2
  • 123
    • 84865722976 scopus 로고    scopus 로고
    • Increasing clone maintenance support by unifying clone detection and refactoring activities
    • R. Tairas and J. Gray. Increasing clone maintenance support by unifying clone detection and refactoring activities. Info. &Soft. Tech., 54(12):1297-1307, 2012.
    • (2012) Info. &Soft. Tech. , vol.54 , Issue.12 , pp. 1297-1307
    • Tairas, R.1    Gray, J.2
  • 124
    • 73449133306 scopus 로고    scopus 로고
    • Visualizing clone detection results
    • ACM
    • R. Tairas, J. Gray, and I. Baxter. Visualizing clone detection results. In ASE, pages 549-550. ACM, 2007.
    • (2007) ASE , pp. 549-550
    • Tairas, R.1    Gray, J.2    Baxter, I.3
  • 125
    • 16244384526 scopus 로고    scopus 로고
    • Managing duplicated code with linked editing
    • M. Toomim, A. Begel, and S. Graham. Managing duplicated code with linked editing. In VLHCC, pages 173-180, 2004.
    • (2004) VLHCC , pp. 173-180
    • Toomim, M.1    Begel, A.2    Graham, S.3
  • 126
    • 83455168943 scopus 로고    scopus 로고
    • On the effectiveness of simhash for detecting near-miss clones in large scale software systems
    • M. Uddin, C. K. Roy, K. A. Schneider, and A. Hindle. On the effectiveness of simhash for detecting near-miss clones in large scale software systems. In WCRE, pages 13-22, 2011.
    • (2011) WCRE , pp. 13-22
    • Uddin, M.1    Roy, C.K.2    Schneider, K.A.3    Hindle, A.4
  • 127
    • 84948459152 scopus 로고    scopus 로고
    • Gemini maintenance support environment based on code clone analysis
    • IEEE Computer Society Press
    • Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. Gemini: Maintenance support environment based on code clone analysis. In METRICS, pages 67-76. IEEE Computer Society Press, 2002.
    • (2002) METRICS , pp. 67-76
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 128
    • 84886673916 scopus 로고    scopus 로고
    • Prioritizing code clone detection results for clone management
    • R. D. Venkatasubramanyam, S. Gupta, and H. K. Singh. Prioritizing code clone detection results for clone management. In IWSC, pages 30-36, 2013.
    • (2013) IWSC , pp. 30-36
    • Venkatasubramanyam, R.D.1    Gupta, S.2    Singh, H.K.3
  • 129
    • 84883701791 scopus 로고    scopus 로고
    • Searching for better configurations a rigorous approach to clone evaluation
    • T. Wang, M. Harman, Y. Jia, and J. Krinke. Searching for better configurations: a rigorous approach to clone evaluation. In ESEC/SIGSOFT FSE, pages 455-465, 2013.
    • (2013) ESEC/SIGSOFT FSE , pp. 455-465
    • Wang, T.1    Harman, M.2    Jia, Y.3    Krinke, J.4
  • 132
    • 84889077392 scopus 로고    scopus 로고
    • An empirical study of the faultproneness of clone mutation and clone migration
    • S. Xie, F. Khomh, and Y. Zou. An empirical study of the faultproneness of clone mutation and clone migration. In MSR, pages 149-158, 2013.
    • (2013) MSR , pp. 149-158
    • Xie, S.1    Khomh, F.2    Zou, Y.3
  • 133
    • 84898406717 scopus 로고    scopus 로고
    • An empirical study on the fault-proneness of clone migration in clone genealogies
    • (to appear)
    • S. Xie, F. Khomh, Y. Zou, and I. Keivanloo. An empirical study on the fault-proneness of clone migration in clone genealogies. In CSMR-18/WCRE-21 Software Evolution Week, page 10, 2014 (to appear).
    • (2014) CSMR-18/WCRE-21 Software Evolution Week , pp. 10
    • Xie, S.1    Khomh, F.2    Zou, Y.3    Keivanloo, I.4
  • 134
    • 84893379503 scopus 로고    scopus 로고
    • Distilling useful clones by contextual differencing
    • Z. Xing, Y. Xue, and S. Jarzabek. Distilling useful clones by contextual differencing. In WCRE, pages 102-111, 2013.
    • (2013) WCRE , pp. 102-111
    • Xing, Z.1    Xue, Y.2    Jarzabek, S.3
  • 135
    • 84885973880 scopus 로고    scopus 로고
    • Applying clone change notification system into an industrial development process
    • Y. Yamanaka, E. Choi, N. Yoshida, K. Inoue, and T.i Sano. Applying clone change notification system into an industrial development process. In ICPC, pages 199-206, 2013.
    • (2013) ICPC , pp. 199-206
    • Yamanaka, Y.1    Choi, E.2    Yoshida, N.3    Inoue, K.4    Sano, T.I.5
  • 136
    • 33749041482 scopus 로고    scopus 로고
    • On refactoring support based on code clone dependency relation
    • N. Yoshida, Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. On refactoring support based on code clone dependency relation. In METRICS, pages 16-25, 2005.
    • (2005) METRICS , pp. 16-25
    • Yoshida, N.1    Higo, Y.2    Kamiya, T.3    Kusumoto, S.4    Inoue, K.5
  • 137
    • 84873121846 scopus 로고    scopus 로고
    • Cloning practices why developers clone and what can be changed
    • G. Zhang, X. Peng, Z. Xing, and W. Zhao. Cloning practices: Why developers clone and what can be changed. In ICSM, pages 285-294, 2012.
    • (2012) ICSM , pp. 285-294
    • Zhang, G.1    Peng, X.2    Xing, Z.3    Zhao, W.4
  • 138
    • 84893582102 scopus 로고    scopus 로고
    • Towards contextual and on-demand code clone management by continuous monitoring
    • G. Zhang, X. Peng, Z. Xing, S. Jiang, H. Wang, and W. Zhao. Towards contextual and on-demand code clone management by continuous monitoring. In ASE, pages 497-507, 2013.
    • (2013) ASE , pp. 497-507
    • Zhang, G.1    Peng, X.2    Xing, Z.3    Jiang, S.4    Wang, H.5    Zhao, W.6
  • 139
    • 57849101681 scopus 로고    scopus 로고
    • Query-based filtering and graphical view generation for clone analysis
    • Y. Zhang, H. Basit, S. Jarzabek, D Anh, and M. Low. Query-based filtering and graphical view generation for clone analysis. In ICSM, pages 376-385, 2008.
    • (2008) ICSM , pp. 376-385
    • Zhang, Y.1    Basit, H.2    Jarzabek, S.3    Anh, D.4    Low, M.5
  • 140
    • 79959541424 scopus 로고    scopus 로고
    • Towards flexible code clone detection, management, and refactoring in iDE
    • M. F. Zibran and C. K. Roy. Towards flexible code clone detection, management, and refactoring in IDE. In IWSC, pages 75-76, 2011.
    • (2011) IWSC , pp. 75-76
    • Zibran, M.F.1    Roy, C.K.2
  • 141
    • 82055196656 scopus 로고    scopus 로고
    • A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring
    • M. F. Zibran and C. K. Roy. A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring. In SCAM, pages 105-114, 2011.
    • (2011) SCAM , pp. 105-114
    • Zibran, M.F.1    Roy, C.K.2
  • 142
    • 80052420320 scopus 로고    scopus 로고
    • Conflict-aware optimal scheduling of code clone refactoring a constraint programming approach
    • M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of code clone refactoring: A constraint programming approach. In ICPC, pages 266-269, 2011.
    • (2011) ICPC , pp. 266-269
    • Zibran, M.F.1    Roy, C.K.2
  • 143
    • 84863558744 scopus 로고    scopus 로고
    • IDE-based real-time focused search for near-miss clones
    • M. F. Zibran and C. K. Roy. IDE-based real-time focused search for near-miss clones. In ACM-SAC, pages 1235-1242, 2012.
    • (2012) ACM-SAC , pp. 1235-1242
    • Zibran, M.F.1    Roy, C.K.2
  • 144
    • 84879668288 scopus 로고    scopus 로고
    • Conflict-aware optimal scheduling of prioritized code clone refactoring
    • M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of prioritized code clone refactoring. IET Software, 7(3), 2013.
    • (2013) IET Software , vol.7 , Issue.3
    • Zibran, M.F.1    Roy, C.K.2
  • 145
    • 79960520851 scopus 로고    scopus 로고
    • Analyzing and forecasting near-miss clones in evolving software an empirical study
    • M. F. Zibran, R. K. Saha, M. Asaduzzaman, and C. K. Roy. Analyzing and forecasting near-miss clones in evolving software: An empirical study. In ICECCS, pages 295-304, 2011.
    • (2011) ICECCS , pp. 295-304
    • Zibran, M.F.1    Saha, R.K.2    Asaduzzaman, M.3    Roy, C.K.4
  • 146
    • 84877970919 scopus 로고    scopus 로고
    • Evaluating the conventional wisdom in clone removal a genealogy-based empirical study
    • M. F. Zibran, R. K. Saha, C. K. Roy, and K. A. Schneider. Evaluating the conventional wisdom in clone removal: a genealogy-based empirical study. In SAC, pages 1123-1130, 2013.
    • (2013) SAC , pp. 1123-1130
    • Zibran, M.F.1    Saha, R.K.2    Roy, C.K.3    Schneider, K.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.