-
1
-
-
64549100783
-
Survey of research on software clones
-
R. Koschke, Survey of research on software clones, in Duplication, Redundancy, and Similarity in Software, ser. Dagstuhl Seminar Proceedings, no. 06301, 2006.
-
(2006)
Duplication, Redundancy, and Similarity in Software, Ser. Dagstuhl Seminar Proceedings
, pp. 06301
-
-
Koschke, R.1
-
2
-
-
84898402943
-
The vision of software clone management: Past, present and the future
-
C. K. Roy, M. F. Zibran, and R. Koschke, The vision of software clone management: Past, present and the future, in IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, 2014, pp. 18-33.
-
(2014)
IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week
, pp. 18-33
-
-
Roy, C.K.1
Zibran, M.F.2
Koschke, R.3
-
3
-
-
64549135034
-
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
-
May
-
C. K. Roy, J. R. Cordy, and R. Koschke, Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, Journal of Science of Computer Programming, vol. 74, no. 7, pp. 470-495, May 2009.
-
(2009)
Journal of Science of Computer Programming
, vol.74
, Issue.7
, pp. 470-495
-
-
Roy, C.K.1
Cordy, J.R.2
Koschke, R.3
-
4
-
-
84877921938
-
Software clone detection: A systematic review
-
Jul.
-
D. Rattana, R. Bhatiab, and M. Singh, Software clone detection: A systematic review, Information and Software Technology, vol. 55, no. 7, pp. 1165-1199, Jul. 2013.
-
(2013)
Information and Software Technology
, vol.55
, Issue.7
, pp. 1165-1199
-
-
Rattana, D.1
Bhatiab, R.2
Singh, M.3
-
5
-
-
84872356449
-
Software clone management towards industrial application
-
R. Koschke, I. Baxter, M. Conradt, and J. R. Cordy, Software clone management towards industrial application, in Dagstuhl Seminar: Software Clone Management Towards Industrial Application, 2012.
-
(2012)
Dagstuhl Seminar: Software Clone Management Towards Industrial Application
-
-
Koschke, R.1
Baxter, I.2
Conradt, M.3
Cordy, J.R.4
-
7
-
-
69049086133
-
Data mining approach for detecting higher-level clones in software
-
Apr
-
H. A. Basit and S. Jarzabek, Data mining approach for detecting higher-level clones in software, IEEE Trans. Softw. Eng., vol. 35, no. 4, pp. 497-514, Apr. 2009.
-
(2009)
IEEE Trans. Softw. Eng
, vol.35
, Issue.4
, pp. 497-514
-
-
Basit, H.A.1
Jarzabek, S.2
-
8
-
-
44949179331
-
Applying a code clone detection method to domain analysis of device drivers
-
Y. S. Ma and D. K. Woo, Applying a code clone detection method to domain analysis of device drivers, in Asia-Pacific Software Engineering Conference, 2007, pp. 254-261.
-
(2007)
Asia-Pacific Software Engineering Conference
, pp. 254-261
-
-
Ma, Y.S.1
Woo, D.K.2
-
9
-
-
0036041421
-
An empirical study of operating system errors
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. R. Engler, An empirical study of operating system errors, in Symposium on Operating Systems Principles, 2001, pp. 73-88.
-
(2001)
Symposium on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.R.5
-
10
-
-
33645819206
-
Copy-paste and related bugs in large-scale software code
-
Mar
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, Copy-paste and related bugs in large-scale software code, IEEE Trans. Softw. Eng., vol. 32, no. 3, pp. 176-192, Mar. 2006.
-
(2006)
IEEE Trans. Softw. Eng
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
12
-
-
84978093789
-
Static bug detection through analysis of inconsistent clones
-
E. Juergens, B. Hummel, F. Deissenboeck, and M. Feilkas, Static bug detection through analysis of inconsistent clones, in Testmethoden fur Software (TESO), 2008.
-
(2008)
Testmethoden fur Software (TESO)
-
-
Juergens, E.1
Hummel, B.2
Deissenboeck, F.3
Feilkas, M.4
-
13
-
-
83455205912
-
Approximate code search in program histories
-
S. Bazrafshan, R. Koschke, and N. Göde, Approximate code search in program histories, in Working Conference on Reverse Engineering, 2011, pp. 109-118.
-
(2011)
Working Conference on Reverse Engineering
, pp. 109-118
-
-
Bazrafshan, S.1
Koschke, R.2
Göde, N.3
-
16
-
-
77954705962
-
Can clone detection support quality assessments of requirements specifications?
-
E. Juergens, F. Deissenboeck, C. Domann, M. Feilkas, B. Hummel, B. Schaetz, J. Streit, and S. Wagner, Can clone detection support quality assessments of requirements specifications? in Int. Conference on Software Engineering, 2010.
-
(2010)
Int. Conference on Software Engineering
-
-
Juergens, E.1
Deissenboeck, F.2
Domann, C.3
Feilkas, M.4
Hummel, B.5
Schaetz, B.6
Streit, J.7
Wagner, S.8
-
18
-
-
35248872493
-
Code compaction of matching singleentry multiple-exit regions
-
W.-K. Chen, B. Li, and R. Gupta, Code compaction of matching singleentry multiple-exit regions, in Int. Conference on Static analysis, 2003, pp. 401-417.
-
(2003)
Int. Conference on Static Analysis
, pp. 401-417
-
-
Chen, W.-K.1
Li, B.2
Gupta, R.3
-
19
-
-
0000162467
-
Compiler techniques for code compaction
-
S. K. Debray, W. Evans, R. Muth, and B. De Sutter, Compiler techniques for code compaction, ACM Transactions on Programming languages and Systems, vol. 22, no. 2, pp. 378-415, 2000.
-
(2000)
ACM Transactions on Programming Languages and Systems
, vol.22
, Issue.2
, pp. 378-415
-
-
Debray, S.K.1
Evans, W.2
Muth, R.3
De Sutter, B.4
-
20
-
-
17644417780
-
Using origin analysis to detect merging and splitting of source code entities
-
Feb
-
M. Godfrey and Z. Lijie, Using origin analysis to detect merging and splitting of source code entities, IEEE Trans. Softw. Eng., vol. 31, no. 2, pp. 166-181, Feb. 2005.
-
(2005)
IEEE Trans. Softw. Eng
, vol.31
, Issue.2
, pp. 166-181
-
-
Godfrey, M.1
Lijie, Z.2
-
22
-
-
84877261131
-
An exploratory study of cloning in industrial software product lines
-
Y. Dubinsky, J. Rubin, T. Berger, S. Duszynski, M. Becker, and K. Czarnecki, An exploratory study of cloning in industrial software product lines, in Conference on Software Maintenance and Reengineering, 2013, pp. 25-34.
-
(2013)
Conference on Software Maintenance and Reengineering
, pp. 25-34
-
-
Dubinsky, Y.1
Rubin, J.2
Berger, T.3
Duszynski, S.4
Becker, M.5
Czarnecki, K.6
-
23
-
-
0042880898
-
Software product line migration and deployment
-
D. Faust and C. Verhoef, Software product line migration and deployment, Journal of Software: Practice and Experience, vol. 33, no. 10, pp. 933-955, 2003.
-
(2003)
Journal of Software: Practice and Experience
, vol.33
, Issue.10
, pp. 933-955
-
-
Faust, D.1
Verhoef, C.2
-
24
-
-
50249120730
-
Supporting the grow-and-prune model in software product lines evolution using clone detection
-
T. Mende, F. Beckwermert, R. Koschke, and G. Meier, Supporting the grow-and-prune model in software product lines evolution using clone detection, in Conference on Software Maintenance and Reengineering, 2008, pp. 163-172.
-
(2008)
Conference on Software Maintenance and Reengineering
, pp. 163-172
-
-
Mende, T.1
Beckwermert, F.2
Koschke, R.3
Meier, G.4
-
25
-
-
63849324240
-
An evaluation of code similarity identification for the grow-and-prune model
-
T. Mende and R. K. F. Beckwermert, An evaluation of code similarity identification for the grow-and-prune model, Journal on Software Maintenance and Evolution, vol. 21, no. 2, pp. 143-169, 2009.
-
(2009)
Journal on Software Maintenance and Evolution
, vol.21
, Issue.2
, pp. 143-169
-
-
Mende, T.1
Beckwermert, R.K.F.2
-
26
-
-
70349499350
-
Extending the reflexion method for consolidating software variants into product lines
-
R. Koschke, P. Frenzel, A. P. Breu, and K. Angstmann, Extending the reflexion method for consolidating software variants into product lines, Software Quality Journal, vol. 17, no. 4, pp. 331-366, 2009.
-
(2009)
Software Quality Journal
, vol.17
, Issue.4
, pp. 331-366
-
-
Koschke, R.1
Frenzel, P.2
Breu, A.P.3
Angstmann, K.4
-
27
-
-
84872341665
-
Inter-project functional clone detection toward building libraries-an empirical study on 13, 000 projects
-
T. Ishihara, K. Hotta, Y. Higo, H. Igaki, and S. Kusumoto, Inter-project functional clone detection toward building libraries-an empirical study on 13, 000 projects, in Working Conference on Reverse Engineering, 2012, pp. 387-391.
-
(2012)
Working Conference on Reverse Engineering
, pp. 387-391
-
-
Ishihara, T.1
Hotta, K.2
Higo, Y.3
Igaki, H.4
Kusumoto, S.5
-
28
-
-
30344449773
-
On the use of clone detection for identifying crosscutting concern code
-
Oct
-
M. Bruntink, A. V. Deursen, R. V. Engelen, and T. Tourwe, On the use of clone detection for identifying crosscutting concern code, IEEE Trans. Softw. Eng., vol. 31, no. 10, pp. 804-818, Oct. 2005.
-
(2005)
IEEE Trans. Softw. Eng
, vol.31
, Issue.10
, pp. 804-818
-
-
Bruntink, M.1
Deursen, A.V.2
Engelen, R.V.3
Tourwe, T.4
-
30
-
-
79959557630
-
Determining the provenance of software artifacts
-
M. W. Godfrey, D. M. German, J. Davies, and A. Hindle, Determining the provenance of software artifacts, in Int. Workshop on Software Clones, 2011, pp. 65-66.
-
(2011)
Int. Workshop on Software Clones
, pp. 65-66
-
-
Godfrey, M.W.1
German, D.M.2
Davies, J.3
Hindle, A.4
-
31
-
-
84927930411
-
Code siblings: Phenotype evolution
-
D. M. German, M. Di Penta, G. Antoniol, and Y.-G. Gúehéneuc, Code siblings: Phenotype evolution, in Int. Workshop on Software Clones, 2009.
-
(2009)
Int. Workshop on Software Clones
-
-
German, D.M.1
Di Penta, M.2
Antoniol, G.3
Gúehéneuc, Y.-G.4
-
32
-
-
79959275002
-
Software bertillonage: Finding the provenance of an entity
-
J. Davies, D. M. German, M. W. Godfrey, and A. Hindle, Software bertillonage: finding the provenance of an entity, in working conference on Mining Software Repositories, 2011, pp. 183-192.
-
(2011)
Working Conference on Mining Software Repositories
, pp. 183-192
-
-
Davies, J.1
German, D.M.2
Godfrey, M.W.3
Hindle, A.4
-
33
-
-
84927926384
-
Detection of plagiarism in university projects using metricsbased spectral similarity
-
06301
-
E. Merlo, Detection of plagiarism in university projects using metricsbased spectral similarity, in Duplication, Redundancy, and Similarity in Software, ser. Dagstuhl Seminar Proceedings, no. 06301, 2006.
-
(2006)
Duplication, Redundancy, and Similarity in Software, Ser. Dagstuhl Seminar Proceedings
-
-
Merlo, E.1
-
34
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, CCFinder: a multilinguistic token-based code clone detection system for large scale source code, IEEE Trans. Softw. Eng., vol. 28, no. 7, pp. 654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
35
-
-
84879652109
-
Clone evolution: A systematic review
-
J. R. Pate, R. Tairas, and N. A. Kraft, Clone evolution: a systematic review, Journal of Software: Evolution and Process, vol. 25, no. 3, pp. 261-283, 2013.
-
(2013)
Journal of Software: Evolution and Process
, vol.25
, Issue.3
, pp. 261-283
-
-
Pate, J.R.1
Tairas, R.2
Kraft, N.A.3
-
36
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lague, D. Proulx, J. Mayrand, E. M. Merlo, and J. Hudepohl, Assessing the benefits of incorporating function clone detection in a development process, in Int. Conference on Software Maintenance, 1997, pp. 314-321.
-
(1997)
Int. Conference on Software Maintenance
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.M.4
Hudepohl, J.5
-
37
-
-
77956616360
-
Modeling clones evolution through time series
-
G. Antoniol, G. Casazza, M. Di Penta, and E. Merlo, Modeling clones evolution through time series, in Int. Conference on Software Maintenance, 2001, pp. 273-280.
-
(2001)
Int. Conference on Software Maintenance
, pp. 273-280
-
-
Antoniol, G.1
Casazza, G.2
Di Penta, M.3
Merlo, E.4
-
38
-
-
0036783855
-
Analyzing cloning evolution in the Linux kernel
-
G. Antoniol, U. Villano, E. Merlo, and M. Di Penta, Analyzing cloning evolution in the Linux kernel, Information and Software Technology, vol. 44, no. 13, pp. 755-765, 2002.
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
, pp. 755-765
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Di Penta, M.4
-
39
-
-
32344450436
-
An empirical study of code clone genealogies
-
M. Kim, V. Sazawal, D. Notkin, and G. Murphy, An empirical study of code clone genealogies, in ACM SIGSOFT Software Engineering Notes, vol. 30, no. 5, 2005, pp. 187-196.
-
(2005)
ACM SIGSOFT Software Engineering Notes
, vol.30
, Issue.5
, pp. 187-196
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.4
-
40
-
-
33645819206
-
CP-Miner: Finding copy-paste and related bugs in large-scale software code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, CP-Miner: Finding copy-paste and related bugs in large-scale software code, IEEE Trans. Softw. Eng., vol. 32, no. 3, pp. 176-192, 2006.
-
(2006)
IEEE Trans. Softw. Eng
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
41
-
-
84872298173
-
Inferring repository file structure modifications using nearest-neighbor clone detection
-
T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, Inferring repository file structure modifications using nearest-neighbor clone detection, in Working Conference on Reverse Engineering, 2012, pp. 325-334.
-
(2012)
Working Conference on Reverse Engineering
, pp. 325-334
-
-
Lavoie, T.1
Khomh, F.2
Merlo, E.3
Zou, Y.4
-
42
-
-
84944696785
-
Generic modelling of code clones
-
06301
-
S. Giesecke, Generic modelling of code clones, in Duplication, Redundancy, and Similarity in Software, ser. Dagstuhl Seminar Proceedings, no. 06301, 2006, pp. 1-23.
-
(2006)
Duplication, Redundancy, and Similarity in Software, Ser. Dagstuhl Seminar Proceedings
, pp. 1-23
-
-
Giesecke, S.1
-
43
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
B. Lague, D. Proulx, J. Mayrand, E. M. Merlo, and J. Hudepohl, Assessing the benefits of incorporating function clone detection in a development process, in Int. Conference on Software Maintenance, 1997, pp. 314-321.
-
(1997)
Int. Conference on Software Maintenance
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.M.4
Hudepohl, J.5
-
45
-
-
51149095379
-
A study of consistent and inconsistent changes to code clones
-
J. Krinke, A study of consistent and inconsistent changes to code clones, in Working Conference on Reverse Engineering, 2007, pp. 170-178.
-
(2007)
Working Conference on Reverse Engineering
, pp. 170-178
-
-
Krinke, J.1
-
46
-
-
16244384526
-
Managing duplicated code with linked editing
-
M. Toomim, A. Begel, and S. L. Graham, Managing duplicated code with linked editing, in Symposium on Visual Languages and Human Centric Computing, 2004, pp. 173-180.
-
(2004)
Symposium on Visual Languages and Human Centric Computing
, pp. 173-180
-
-
Toomim, M.1
Begel, A.2
Graham, S.L.3
-
47
-
-
67651224123
-
The software similarity problem in malware analysis
-
06301
-
A. Walenstein and A. Lakhotia, The software similarity problem in malware analysis, in Duplication, Redundancy, and Similarity in Software, ser. Dagstuhl Seminar Proceedings, no. 06301, 2006.
-
(2006)
Duplication, Redundancy, and Similarity in Software, Ser. Dagstuhl Seminar Proceedings
-
-
Walenstein, A.1
Lakhotia, A.2
-
48
-
-
34047166855
-
Using code normalization for fighting self-mutating malware
-
D. Bruschi, L. Martignoni, and M. Monga, Using code normalization for fighting self-mutating malware, in Int. Symposium on Secure Software Engineering, 2006, pp. 37-44.
-
(2006)
Int. Symposium on Secure Software Engineering
, pp. 37-44
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
49
-
-
79959573240
-
Analyzing web service similarity using contextual clones
-
D. Martin and J. R. Cordy, Analyzing web service similarity using contextual clones, in Int. Workshop on Software Clones, 2011, pp. 41-46.
-
(2011)
Int. Workshop on Software Clones
, pp. 41-46
-
-
Martin, D.1
Cordy, J.R.2
|