-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
R. Agrawal, T. Imieliski, A. Swami, "Mining Association Rules between Sets of Items in Large Databases", ACM SIGMOD, 1993, 22(2):207-216.
-
(1993)
ACM SIGMOD
, vol.22
, Issue.2
, pp. 207-216
-
-
Agrawal, R.1
Imieliski, T.2
Swami, A.3
-
2
-
-
0034503791
-
Advanced clone-Analysis to support object-Oriented system refactoring
-
M. Balazinska, E. Merlo, M. Dagenais, B. Lague, and K. Kontogiannis, "Advanced Clone-Analysis to Support Object-Oriented System Refactoring", Proc. WCRE, 2000, pp. 98-107.
-
(2000)
Proc. WCRE
, pp. 98-107
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
3
-
-
33750238130
-
A novel approach to optimize clone refactoring activity
-
S. Bouktif, G. Antoniol, E. Merlo, M. Neteler, "A Novel Approach to Optimize Clone Refactoring Activity", Proc. GECCO, 2006, pp.1885-1892.
-
(2006)
Proc. GECCO
, pp. 1885-1892
-
-
Bouktif, S.1
Antoniol, G.2
Merlo, E.3
Neteler, M.4
-
4
-
-
79953174967
-
An empirical study of long-Lived code clones
-
D. Cai, M. Kim,"An Empirical Study of Long-Lived Code Clones", FASE, 2011, pp. 432-446.
-
(2011)
FASE
, pp. 432-446
-
-
Cai, D.1
Kim, M.2
-
6
-
-
79959897807
-
Frequency and risks of changes to clones
-
N. Gode, Rainer Koschke, "Frequency and Risks of Changes to Clones.", Proc. ICSE, 2011, pp. 311-320.
-
(2011)
Proc. ICSE
, pp. 311-320
-
-
Gode, N.1
Koschke, R.2
-
7
-
-
77954707649
-
Clone removal fact or fiction
-
N. Gode, "Clone Removal: Fact or Fiction?", Proc. IWSC, 2010, pp. 33-40.
-
(2010)
Proc. IWSC
, pp. 33-40
-
-
Gode, N.1
-
9
-
-
35048850423
-
Refactoring support based on code clone analysis
-
Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue, "Refactoring Support Based on Code Clone Analysis", Lecture Notes in Computer Science, 2004, 3009: 220-233.
-
(2004)
Lecture Notes in Computer Science
, vol.3009
, pp. 220-233
-
-
Higo, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
10
-
-
73449090740
-
Do code clones matter
-
E. Juergens, F. Deissenboeck, B. Hummel, S. Wagner, "Do Code Clones Matter?", Proc. ICSE, 2009, pp. 485-495.
-
(2009)
Proc. ICSE
, pp. 485-495
-
-
Juergens, E.1
Deissenboeck, F.2
Hummel, B.3
Wagner, S.4
-
11
-
-
47749085664
-
An algorithm for detecting and removing clones in java code
-
N. Juillerat, and B. Hirsbrunner, "An Algorithm for Detecting and Removing Clones in Java Code", SeTra, 2006.
-
(2006)
SeTra
-
-
Juillerat, N.1
Hirsbrunner, B.2
-
12
-
-
32344450436
-
An empirical study on code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, G. Murphy, "An Empirical Study on Code Clone Genealogies", FSE, 2005, pp. 187-196.
-
(2005)
FSE
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
13
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, "A Study of Consistent and Inconsistent Changes to Code Clones", Proc. WCRE, 2007, pp. 170-178.
-
(2007)
Proc. WCRE
, pp. 170-178
-
-
Krinke, J.1
-
14
-
-
56349141528
-
Is cloned code more stable than non-cloned code
-
J. Krinke, "Is Cloned Code More Stable than Non-cloned Code?", Proc. SCAM, 2008, pp. 57-66.
-
(2008)
Proc. SCAM
, pp. 57-66
-
-
Krinke, J.1
-
15
-
-
57849136978
-
Assessing the effect of clones on changeability
-
A. Lozano, and M. Wermelinger, "Assessing the Effect of Clones on Changeability", Proc. ICSM, 2008, pp. 227-236.
-
(2008)
Proc. ICSM
, pp. 227-236
-
-
Lozano, A.1
Wermelinger, M.2
-
16
-
-
84898431022
-
-
MARC
-
MARC: https://homepage.usask.ca/-mam815/tools.php
-
-
-
-
17
-
-
84886065681
-
Connectivity of cochanged method groups a case study on open source systems
-
M. Mondal, C. K. Roy, and K. A. Schneider, "Connectivity of Cochanged Method Groups: A Case Study on Open Source Systems", Proc. CASCON, 2012, pp. 205-219.
-
(2012)
Proc. CASCON
, pp. 205-219
-
-
Mondal, M.1
Roy, C.K.2
Schneider, K.A.3
-
18
-
-
84863588657
-
Comparative stability of cloned and non-cloned code an empirical study
-
M. Mondal, C. K. Roy, and K. A. Schneider, "Comparative Stability of Cloned and Non-cloned Code: An Empirical Study", Proc. SAC, 2012, pp. 1227-1234.
-
(2012)
Proc. SAC
, pp. 1227-1234
-
-
Mondal, M.1
Roy, C.K.2
Schneider, K.A.3
-
19
-
-
71149111492
-
NICAD accurate detection of near-Miss intentional clones using flexible pretty-Printing and code normalization
-
C. K. Roy and J. R. Cordy, "NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization" Proc. ICPC, 2008, pp. 172-181.
-
(2008)
Proc. ICPC
, pp. 172-181
-
-
Roy, C.K.1
Cordy, J.R.2
-
20
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools a qualitative approach
-
C.K. Roy, J.R. Cordy and R. Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach", SCP, 2009, 74 (2009): 470-495.
-
(2009)
SCP
, vol.74
, Issue.2009
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
21
-
-
69949085058
-
A mutation / injection-based automatic framework for evaluating code clone detection tools
-
C.K. Roy, J.R. Cordy, "A Mutation / Injection-based Automatic Framework for Evaluating Code Clone Detection Tools", Proc. Mutation, 2009, pp. 157-166.
-
(2009)
Proc. Mutation
, pp. 157-166
-
-
Roy, C.K.1
Cordy, J.R.2
-
22
-
-
77954706752
-
Advanced analysis for code clone removal
-
S. Schulze and M. Kuhlemann, "Advanced Analysis for Code Clone Removal" WSR, 2009.
-
(2009)
WSR
-
-
Schulze, S.1
Kuhlemann, M.2
-
23
-
-
84865722976
-
Increasing clone maintenance support by unifying clone detection and refactoring activities
-
R. Tairas, and J. Gray, "Increasing Clone Maintenance Support by Unifying Clone Detection and Refactoring Activities", Information and Software Technology, 2012, 54(12):1297-1307.
-
(2012)
Information and Software Technology
, vol.54
, Issue.12
, pp. 1297-1307
-
-
Tairas, R.1
Gray, J.2
-
24
-
-
76749101150
-
An empirical study on the maintenance of source code clones
-
S. Thummalapenta, L. Cerulo, L. Aversano, and M. D. Penta, "An Empirical Study on the Maintenance of Source Code Clones", ESE, 15(1), 2009, pp. 1-34.
-
(2009)
ESE
, vol.15
, Issue.1
, pp. 1-34
-
-
Thummalapenta, S.1
Cerulo, L.2
Aversano, L.3
Penta, M.D.4
-
25
-
-
79955161150
-
Ranking refactoring suggestions based on historical volatility
-
N. Tsantalis, A. Chatzigeorgiou, "Ranking Refactoring Suggestions Based on Historical Volatility", Proc. CSMR, 2011, pp. 25-34.
-
(2011)
Proc. CSMR
, pp. 25-34
-
-
Tsantalis, N.1
Chatzigeorgiou, A.2
-
26
-
-
84886673916
-
Prioritizing code clone detection results for clone management
-
R. Venkatasubramanyam; S. Gupta; H. K. Singh, "Prioritizing Code Clone Detection Results for Clone Management ", Proc. IWSC, 2013, pp. 30-36.
-
(2013)
Proc. IWSC
, pp. 30-36
-
-
Venkatasubramanyam, R.1
Gupta, S.2
Singh, H.K.3
-
27
-
-
84866951484
-
Can i clone this piece of code here
-
X. Wang, Y. Dang, L. Zhang, D. Zhang, E. Lan, and H. Mei,"Can I Clone This Piece of Code Here?", Proc. ASE, 2012, pp. 170-179.
-
(2012)
Proc. ASE
, pp. 170-179
-
-
Wang, X.1
Dang, Y.2
Zhang, L.3
Zhang, D.4
Lan, E.5
Mei, H.6
-
28
-
-
84883701791
-
Searching for better configurations a rigorous approach to clone evaluation
-
T. Wang, M. Harman, Y. Jia, J. Krinke, "Searching for Better Configurations: A Rigorous Approach to Clone Evaluation", Proc. ESEC/SIGSOFT FSE, 2013, pp. 455-465.
-
(2013)
Proc. ESEC/SIGSOFT FSE
, pp. 455-465
-
-
Wang, T.1
Harman, M.2
Jia, Y.3
Krinke, J.4
-
29
-
-
84879668288
-
Conflict aware optimal scheduling of prioritized code clone refactoring
-
M. F. Zibran, and C. K. Roy, "Conflict Aware Optimal Scheduling of Prioritized Code Clone Refactoring", IET Software, 2013, pp. 167-186.
-
(2013)
IET Software
, pp. 167-186
-
-
Zibran, M.F.1
Roy, C.K.2
|