메뉴 건너뛰기




Volumn , Issue , 2015, Pages 51-57

What do we need to know about clones? deriving information needs from user goals

Author keywords

[No Author keywords available]

Indexed keywords

BUG LOCALIZATIONS; CLONE DETECTION; PLAGIARISM DETECTION; PROGRAM UNDERSTANDING; REFACTORINGS; USER GOALS;

EID: 84927914689     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWSC.2015.7069891     Document Type: Conference Paper
Times cited : (10)

References (50)
  • 3
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
    • May
    • C. K. Roy, J. R. Cordy, and R. Koschke, Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, Journal of Science of Computer Programming, vol. 74, no. 7, pp. 470-495, May 2009.
    • (2009) Journal of Science of Computer Programming , vol.74 , Issue.7 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 4
    • 84877921938 scopus 로고    scopus 로고
    • Software clone detection: A systematic review
    • Jul.
    • D. Rattana, R. Bhatiab, and M. Singh, Software clone detection: A systematic review, Information and Software Technology, vol. 55, no. 7, pp. 1165-1199, Jul. 2013.
    • (2013) Information and Software Technology , vol.55 , Issue.7 , pp. 1165-1199
    • Rattana, D.1    Bhatiab, R.2    Singh, M.3
  • 7
    • 69049086133 scopus 로고    scopus 로고
    • Data mining approach for detecting higher-level clones in software
    • Apr
    • H. A. Basit and S. Jarzabek, Data mining approach for detecting higher-level clones in software, IEEE Trans. Softw. Eng., vol. 35, no. 4, pp. 497-514, Apr. 2009.
    • (2009) IEEE Trans. Softw. Eng , vol.35 , Issue.4 , pp. 497-514
    • Basit, H.A.1    Jarzabek, S.2
  • 8
    • 44949179331 scopus 로고    scopus 로고
    • Applying a code clone detection method to domain analysis of device drivers
    • Y. S. Ma and D. K. Woo, Applying a code clone detection method to domain analysis of device drivers, in Asia-Pacific Software Engineering Conference, 2007, pp. 254-261.
    • (2007) Asia-Pacific Software Engineering Conference , pp. 254-261
    • Ma, Y.S.1    Woo, D.K.2
  • 10
    • 33645819206 scopus 로고    scopus 로고
    • Copy-paste and related bugs in large-scale software code
    • Mar
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou, Copy-paste and related bugs in large-scale software code, IEEE Trans. Softw. Eng., vol. 32, no. 3, pp. 176-192, Mar. 2006.
    • (2006) IEEE Trans. Softw. Eng , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 18
    • 35248872493 scopus 로고    scopus 로고
    • Code compaction of matching singleentry multiple-exit regions
    • W.-K. Chen, B. Li, and R. Gupta, Code compaction of matching singleentry multiple-exit regions, in Int. Conference on Static analysis, 2003, pp. 401-417.
    • (2003) Int. Conference on Static Analysis , pp. 401-417
    • Chen, W.-K.1    Li, B.2    Gupta, R.3
  • 20
    • 17644417780 scopus 로고    scopus 로고
    • Using origin analysis to detect merging and splitting of source code entities
    • Feb
    • M. Godfrey and Z. Lijie, Using origin analysis to detect merging and splitting of source code entities, IEEE Trans. Softw. Eng., vol. 31, no. 2, pp. 166-181, Feb. 2005.
    • (2005) IEEE Trans. Softw. Eng , vol.31 , Issue.2 , pp. 166-181
    • Godfrey, M.1    Lijie, Z.2
  • 25
    • 63849324240 scopus 로고    scopus 로고
    • An evaluation of code similarity identification for the grow-and-prune model
    • T. Mende and R. K. F. Beckwermert, An evaluation of code similarity identification for the grow-and-prune model, Journal on Software Maintenance and Evolution, vol. 21, no. 2, pp. 143-169, 2009.
    • (2009) Journal on Software Maintenance and Evolution , vol.21 , Issue.2 , pp. 143-169
    • Mende, T.1    Beckwermert, R.K.F.2
  • 26
    • 70349499350 scopus 로고    scopus 로고
    • Extending the reflexion method for consolidating software variants into product lines
    • R. Koschke, P. Frenzel, A. P. Breu, and K. Angstmann, Extending the reflexion method for consolidating software variants into product lines, Software Quality Journal, vol. 17, no. 4, pp. 331-366, 2009.
    • (2009) Software Quality Journal , vol.17 , Issue.4 , pp. 331-366
    • Koschke, R.1    Frenzel, P.2    Breu, A.P.3    Angstmann, K.4
  • 27
    • 84872341665 scopus 로고    scopus 로고
    • Inter-project functional clone detection toward building libraries-an empirical study on 13, 000 projects
    • T. Ishihara, K. Hotta, Y. Higo, H. Igaki, and S. Kusumoto, Inter-project functional clone detection toward building libraries-an empirical study on 13, 000 projects, in Working Conference on Reverse Engineering, 2012, pp. 387-391.
    • (2012) Working Conference on Reverse Engineering , pp. 387-391
    • Ishihara, T.1    Hotta, K.2    Higo, Y.3    Igaki, H.4    Kusumoto, S.5
  • 28
    • 30344449773 scopus 로고    scopus 로고
    • On the use of clone detection for identifying crosscutting concern code
    • Oct
    • M. Bruntink, A. V. Deursen, R. V. Engelen, and T. Tourwe, On the use of clone detection for identifying crosscutting concern code, IEEE Trans. Softw. Eng., vol. 31, no. 10, pp. 804-818, Oct. 2005.
    • (2005) IEEE Trans. Softw. Eng , vol.31 , Issue.10 , pp. 804-818
    • Bruntink, M.1    Deursen, A.V.2    Engelen, R.V.3    Tourwe, T.4
  • 34
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue, CCFinder: a multilinguistic token-based code clone detection system for large scale source code, IEEE Trans. Softw. Eng., vol. 28, no. 7, pp. 654-670, 2002.
    • (2002) IEEE Trans. Softw. Eng , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 40
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding copy-paste and related bugs in large-scale software code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou, CP-Miner: Finding copy-paste and related bugs in large-scale software code, IEEE Trans. Softw. Eng., vol. 32, no. 3, pp. 176-192, 2006.
    • (2006) IEEE Trans. Softw. Eng , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 41
    • 84872298173 scopus 로고    scopus 로고
    • Inferring repository file structure modifications using nearest-neighbor clone detection
    • T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, Inferring repository file structure modifications using nearest-neighbor clone detection, in Working Conference on Reverse Engineering, 2012, pp. 325-334.
    • (2012) Working Conference on Reverse Engineering , pp. 325-334
    • Lavoie, T.1    Khomh, F.2    Merlo, E.3    Zou, Y.4
  • 44
  • 45
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • J. Krinke, A study of consistent and inconsistent changes to code clones, in Working Conference on Reverse Engineering, 2007, pp. 170-178.
    • (2007) Working Conference on Reverse Engineering , pp. 170-178
    • Krinke, J.1
  • 49
    • 79959573240 scopus 로고    scopus 로고
    • Analyzing web service similarity using contextual clones
    • D. Martin and J. R. Cordy, Analyzing web service similarity using contextual clones, in Int. Workshop on Software Clones, 2011, pp. 41-46.
    • (2011) Int. Workshop on Software Clones , pp. 41-46
    • Martin, D.1    Cordy, J.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.