-
2
-
-
85008252938
-
-
JPlag. http://www.jplag.de.
-
JPlag
-
-
-
3
-
-
85008247398
-
E2LSH: Exact Euclidean locality-sensitive hashing
-
A. Andoni and P. Indyk. E2LSH: Exact Euclidean locality-sensitive hashing. Web: http://www.mit.edu/~andoni/LSH/, 2004.
-
(2004)
Web
-
-
Andoni, A.1
Indyk, P.2
-
4
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM, 51(1):117-122, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 117-122
-
-
Andoni, A.1
Indyk, P.2
-
5
-
-
0013238532
-
Parameterized duplication in strings: Algorithms and an application to software maintenance
-
B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J. Comput., 26(5):1343-1362, 1997.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1343-1362
-
-
Baker, B.S.1
-
6
-
-
32344438117
-
Detecting higher-level similarity patterns in programs
-
H. A. Basit and S. Jarzabek. Detecting higher-level similarity patterns in programs. In ESEC/FSE-13, pages 156-165, 2005.
-
(2005)
ESEC/FSE-13
, pp. 156-165
-
-
Basit, H.A.1
Jarzabek, S.2
-
7
-
-
4544229973
-
DMS R: Program transformations for practical scalable software evolution
-
I. D. Baxter, C. Pidgeon, and M. Mehlich. DMS R: Program transformations for practical scalable software evolution. In ICSE, pages 625-634, 2004.
-
(2004)
ICSE
, pp. 625-634
-
-
Baxter, I.D.1
Pidgeon, C.2
Mehlich, M.3
-
8
-
-
33746406796
-
Detecting self-mutating malware using control ow graph matching
-
D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control ow graph matching. In DIMVA, pages 129-143, 2006.
-
(2006)
DIMVA
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
11
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. A. Seshia, D. X. Song, and R. E. Bryant. Semantics-aware malware detection. In IEEE Symposium on Security and Privacy, pages 32-46, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.X.4
Bryant, R.E.5
-
12
-
-
57349194546
-
Scalable detection of semantic clones
-
M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In ICSE, pages 321-330, 2008.
-
(2008)
ICSE
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
13
-
-
0001944742
-
Similarity search in high dimensions via hashing
-
San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
-
A. Gionis, P. Indyk, and R. Motwani. Similarity search in high dimensions via hashing. In Very Large Data Bases, pages 518-529, San Francisco, CA, USA, 1999. Morgan Kaufmann Publishers Inc.
-
(1999)
Very Large Data Bases
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
15
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
ACM
-
P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality. In ACM Symposium on Theory of Computing, pages 604-613. ACM, 1998.
-
(1998)
ACM Symposium on Theory of Computing
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
16
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. Deckard: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
17
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7):654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
18
-
-
84890052317
-
Using slicing to identify duplication in source code
-
London, UK, Springer-Verlag
-
R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In Symposium on Static Analysis, pages 40-56, London, UK, 2001. Springer-Verlag.
-
(2001)
Symposium on Static Analysis
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
19
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Springer-Verlag
-
C. Kruegel, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Recent Adv. in Intrusion Detection, pages 207-226. Springer-Verlag, 2005.
-
(2005)
Recent Adv. in Intrusion Detection
, pp. 207-226
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Vigna, G.4
-
20
-
-
84910009447
-
CP-Miner: A tool for finding copy-paste and related bugs in operating system code
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: a tool for finding copy-paste and related bugs in operating system code. In OSDI, pages 20-20, 2004.
-
(2004)
OSDI
, pp. 20
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
21
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
S. Schleimer, D. S. Wilkerson, and A. Aiken. Winnowing: Local algorithms for document fingerprinting. In Management of Data, pages 76-85, 2003.
-
(2003)
Management of Data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
22
-
-
32844461721
-
A source-to-source architecture for user-defined optimizations
-
2789 of Lecture Notes in Computer Science, Springer Verlag, Aug
-
M. Schordan and D. Quinlan. A source-to-source architecture for user-defined optimizations. In Joint Modular Languages Conference, volume 2789 of Lecture Notes in Computer Science, pages 214-223. Springer Verlag, Aug. 2003.
-
(2003)
Joint Modular Languages Conference
, pp. 214-223
-
-
Schordan, M.1
Quinlan, D.2
-
23
-
-
77953978582
-
A dynamic birthmark for Java
-
New York, NY, USA, ACM
-
D. Schuler, V. Dallmeier, and C. Lindig. A dynamic birthmark for Java. In ASE07, pages 274-283, New York, NY, USA, 2007. ACM.
-
(2007)
ASE07
, pp. 274-283
-
-
Schuler, D.1
Dallmeier, V.2
Lindig, C.3
-
24
-
-
23844480424
-
Finding binary clones with opstrings and function digests
-
A. Schulman. Finding binary clones with opstrings and function digests. Doctor Dobb's J, 30(9):64-70, 2005.
-
(2005)
Doctor Dobb's J
, vol.30
, Issue.9
, pp. 64-70
-
-
Schulman, A.1
-
26
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
V. Wahler, D. Seipel, J. W. von Gudenberg, and G. Fischer. Clone detection in source code by frequent itemset techniques. In Source Code Analysis and Manipulation, pages 128-135, 2004.
-
(2004)
Source Code Analysis and Manipulation
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
Von Gudenberg, J.W.3
Fischer, G.4
-
27
-
-
77950788046
-
Panorama: Capturing system-wide information ow for malware detection and analysis
-
H. Yin, D. X. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information ow for malware detection and analysis. In ACM Conf. on Computer and Comms. Sec., pages 116-127, 2007.
-
(2007)
ACM Conf. on Computer and Comms. Sec
, pp. 116-127
-
-
Yin, H.1
Song, D.X.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|