-
2
-
-
0038011045
-
Using redundancies to find errors
-
Xie, Y., Engler, D.: Using redundancies to find errors. SIGSOFT Softw. Eng. Notes 27(6) (2002) 51-60
-
(2002)
SIGSOFT Softw. Eng. Notes
, vol.27
, Issue.6
, pp. 51-60
-
-
Xie, Y.1
Engler, D.2
-
4
-
-
0029222025
-
On finding duplication and near-duplication in large software systems
-
Wills, L., Newcomb, P., Chikofsky, E., eds.: Los Alamitos, California, IEEE Computer Society Press
-
Baker, B.S.: On finding duplication and near-duplication in large software systems. In Wills, L., Newcomb, P., Chikofsky, E., eds.: Second Working Conference on Reverse Engineering, Los Alamitos, California, IEEE Computer Society Press (1995) 86-95
-
(1995)
Second Working Conference on Reverse Engineering
, pp. 86-95
-
-
Baker, B.S.1
-
5
-
-
0030166953
-
Pattern matching for clone and concept detection
-
(/2)
-
Kontogiannis, K., Mori, R.D., Merlo, E., Galler, M., Bernstein, M.: Pattern matching for clone and concept detection. Automated Software Engineering 3(1/2) (1996) 79-108
-
(1996)
Automated Software Engineering
, vol.3
, Issue.1
, pp. 79-108
-
-
Kontogiannis, K.1
Mori, R.D.2
Merlo, E.3
Galler, M.4
Bernstein, M.5
-
6
-
-
0031371549
-
Assessing the benefits of incorporating function clone detection in a development process
-
Lague, B., Proulx, D., Mayrand, J., Merlo, E., Hudepohl, J.: Assessing the benefits of incorporating function clone detection in a development process. In: International Conference on Software Maintenance. (1997) 314-321
-
(1997)
International Conference on Software Maintenance
, pp. 314-321
-
-
Lague, B.1
Proulx, D.2
Mayrand, J.3
Merlo, E.4
Hudepohl, J.5
-
8
-
-
84944630622
-
Problems creating task-relevant clone detection reference data
-
Walenstein, A., Jyoti, N., Li, J., Yang, Y., Lakhotia, A.: Problems creating task-relevant clone detection reference data. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (2003)
-
(2003)
Working Conference on Reverse Engineering, IEEE Computer Society Press
-
-
Walenstein, A.1
Jyoti, N.2
Li, J.3
Yang, Y.4
Lakhotia, A.5
-
10
-
-
0033353188
-
Measuring clone based reengineering opportunities
-
IEEE Computer Society Press
-
Balazinska, M., Merlo, E., Dagenais, M., Lague, B., Kontogiannis, K.: Measuring clone based reengineering opportunities. In: IEEE Symposium on Software Metrics, IEEE Computer Society Press (1999) 292-303
-
(1999)
IEEE Symposium on Software Metrics
, pp. 292-303
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
11
-
-
0033359177
-
Partial redesign of java software systems based on clone analysis
-
IEEE Computer Society Press
-
Balazinska, M., Merlo, E., Dagenais, M., Lague, B., Kontogiannis, K.: Partial redesign of java software systems based on clone analysis. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (1999) 326-336
-
(1999)
Working Conference on Reverse Engineering
, pp. 326-336
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
12
-
-
0034503791
-
Advanced clone-analysis to support object-oriented system refactoring
-
IEEE Computer Society Press
-
Balazinska, M., Merlo, E., Dagenais, M., Lague, B., Kontogiannis, K.: Advanced clone-analysis to support object-oriented system refactoring. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (2000) 98-107
-
(2000)
Working Conference on Reverse Engineering
, pp. 98-107
-
-
Balazinska, M.1
Merlo, E.2
Dagenais, M.3
Lague, B.4
Kontogiannis, K.5
-
15
-
-
11244317212
-
An ethnographic study of copy and paste programming practices in OOPL
-
IEEE Computer Society Press
-
Kim, M., Bergman, L., Lau, T., Notkin, D.: An ethnographic study of copy and paste programming practices in OOPL. In: International Symposium on Empirical Software Engineering, IEEE Computer Society Press (2004) 83-92
-
(2004)
International Symposium on Empirical Software Engineering
, pp. 83-92
-
-
Kim, M.1
Bergman, L.2
Lau, T.3
Notkin, D.4
-
16
-
-
18044396139
-
An evaluation of clone detection techniques for crosscutting concerns
-
Bruntink, M., van Deursen, A., Tourwe, T., van Engelen, R.: An evaluation of clone detection techniques for crosscutting concerns. In: International Conference on Software Maintenance. (2004) 200-209
-
(2004)
International Conference on Software Maintenance
, pp. 200-209
-
-
Bruntink, M.1
van Deursen, A.2
Tourwe, T.3
van Engelen, R.4
-
20
-
-
18844392422
-
Comprehending reality: Practical challenges to software maintenance automation
-
IEEE Computer Society Press
-
Cordy, J.: Comprehending reality: Practical challenges to software maintenance automation. In: International Workshop on Program Comprehension, IEEE Computer Society Press (2003) 196-206
-
(2003)
International Workshop on Program Comprehension
, pp. 196-206
-
-
Cordy, J.1
-
21
-
-
77954747683
-
Software quality analysis by code clones in industrial legacy software
-
Monden, A., Nakae, D., Kamiya, T., Sato, S., Matsumoto, K.: Software quality analysis by code clones in industrial legacy software. In: IEEE Symposium on Software Metrics. (2002) 87-94
-
(2002)
IEEE Symposium on Software Metrics
, pp. 87-94
-
-
Monden, A.1
Nakae, D.2
Kamiya, T.3
Sato, S.4
Matsumoto, K.5
-
22
-
-
0036041421
-
An empirical study of operating system errors
-
Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.R.: An empirical study of operating system errors. In: Symposium on Operating Systems Principles. (2001) 73-88
-
(2001)
Symposium on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.R.5
-
23
-
-
33645819206
-
Copy-paste and related bugs in large-scale software code
-
Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Copy-paste and related bugs in large-scale software code. IEEE Computer Society Transactions on Software Engineering 32(3) (2006) 176-192
-
(2006)
IEEE Computer Society Transactions on Software Engineering
, vol.32
, Issue.3
, pp. 176-192
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
24
-
-
77956616360
-
Modeling clones evolution through time series
-
IEEE Computer Society Press
-
Antoniol, G., Casazza, G., Penta, M.D., Merlo, E.: Modeling clones evolution through time series. In: International Conference on Software Maintenance, IEEE Computer Society Press (2001) 273-280
-
(2001)
International Conference on Software Maintenance
, pp. 273-280
-
-
Antoniol, G.1
Casazza, G.2
Penta, M.D.3
Merlo, E.4
-
25
-
-
0036783855
-
Analyzing cloning evolution in the linux kernel
-
Antoniol, G., Villano, U., Merlo, E., Penta, M.: Analyzing cloning evolution in the linux kernel. Information and Software Technology 44(13) (2002)
-
(2002)
Information and Software Technology
, vol.44
, Issue.13
-
-
Antoniol, G.1
Villano, U.2
Merlo, E.3
Penta, M.4
-
27
-
-
32344450436
-
An empirical study of code clone genealogies
-
Kim, M., Sazawal, V., Notkin, D., Murphy, G.C.: An empirical study of code clone genealogies. In: European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE. (2005)
-
(2005)
European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE
-
-
Kim, M.1
Sazawal, V.2
Notkin, D.3
Murphy, G.C.4
-
31
-
-
84962184978
-
Substring matching for clone detection and change tracking
-
IEEE Computer Society Press
-
Johnson, J.H.: Substring matching for clone detection and change tracking. In: International Conference on Software Maintenance, IEEE Computer Society Press (1994) 120-126
-
(1994)
International Conference on Software Maintenance
, pp. 120-126
-
-
Johnson, J.H.1
-
32
-
-
0022664231
-
Combinatorics, complexity, and randomness
-
Karp, R.M.: Combinatorics, complexity, and randomness. Communications of the ACM 29(2) (1986) 98-109
-
(1986)
Communications of the ACM
, vol.29
, Issue.2
, pp. 98-109
-
-
Karp, R.M.1
-
33
-
-
0022030599
-
Efficient randomized pattern-matching algorithms
-
Karp, R.M., Rabin, M..: Efficient randomized pattern-matching algorithms. IBM Journal Research and Development 31(2) (1987) 249-260
-
(1987)
IBM Journal Research and Development
, vol.31
, Issue.2
, pp. 249-260
-
-
Karp, R.M.1
Rabin, M.2
-
35
-
-
0016942292
-
A space-economical suffix tree construction algorithm
-
McCreight, E.: A space-economical suffix tree construction algorithm. Journal of the ACM 32(2) (1976) 262-272
-
(1976)
Journal of the ACM
, vol.32
, Issue.2
, pp. 262-272
-
-
McCreight, E.1
-
36
-
-
0030084599
-
Parameterized Pattern Matching: Algorithms and Applications
-
Baker, B.S.: Parameterized Pattern Matching: Algorithms and Applications. Journal Computer System Science 52(1) (1996) 28-42
-
(1996)
Journal Computer System Science
, vol.52
, Issue.1
, pp. 28-42
-
-
Baker, B.S.1
-
37
-
-
0036648690
-
CCFinder: A Multi-Linguistic Token-based Code Clone Detection System for Large Scale Source Code
-
Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: A Multi-Linguistic Token-based Code Clone Detection System for Large Scale Source Code. IEEE Computer Society Transactions on Software Engineering 28(7) (2002) 654-670
-
(2002)
IEEE Computer Society Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
39
-
-
32344442609
-
Practical language-independent detection of near-miss clones
-
IBM Press
-
Cordy, J.R., Dean, T.R., Synytskyy, N.: Practical language-independent detection of near-miss clones. In: Conference of the Centre for Advanced Studies on Collaborative research, IBM Press (2004) 1-12
-
(2004)
Conference of the Centre for Advanced Studies on Collaborative research
, pp. 1-12
-
-
Cordy, J.R.1
Dean, T.R.2
Synytskyy, N.3
-
41
-
-
84949935816
-
On software maintenance process improvement based on code clone analysis
-
Springer
-
Higo, Y., Ueda, Y., Kamiya, T., Kusumoto, S., Inoue, K.: On software maintenance process improvement based on code clone analysis. In: International Conference on Product Focused Software Process Improvement. Volume 2559 of Lecture Notes In Computer Science., Springer (2002) 185-197
-
(2002)
International Conference on Product Focused Software Process Improvement. Volume 2559 of Lecture Notes In Computer Science
, pp. 185-197
-
-
Higo, Y.1
Ueda, Y.2
Kamiya, T.3
Kusumoto, S.4
Inoue, K.5
-
44
-
-
0029210270
-
Pattern matching for design concept localization
-
IEEE Computer Society Press
-
Kontogiannis, K., DeMori, R., Bernstein, M., Galler, M., Merlo, E.: Pattern matching for design concept localization. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (1995) 96-103
-
(1995)
Working Conference on Reverse Engineering
, pp. 96-103
-
-
Kontogiannis, K.1
DeMori, R.2
Bernstein, M.3
Galler, M.4
Merlo, E.5
-
47
-
-
0032311601
-
Clone Detection Using Abstract Syntax Trees
-
Koshgoftaar, T.M., Bennett, K., eds.: IEEE Computer Society Press
-
Baxter, I.D., Yahin, A., Moura, L., Sant'Anna, M., Bier, L.: Clone Detection Using Abstract Syntax Trees. In Koshgoftaar, T.M., Bennett, K., eds.: International Conference on Software Maintenance, IEEE Computer Society Press (1998) 368-378
-
(1998)
International Conference on Software Maintenance
, pp. 368-378
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
48
-
-
0026185673
-
Identifying syntactic differences between two programs
-
Yang, W.: Identifying syntactic differences between two programs. Software-Practice and Experience 21(7) (1991) 739-755
-
(1991)
Software-Practice and Experience
, vol.21
, Issue.7
, pp. 739-755
-
-
Yang, W.1
-
49
-
-
34948876329
-
Clone detection using abstract syntax suffix trees
-
Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax suffix trees. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (2006)
-
(2006)
Working Conference on Reverse Engineering, IEEE Computer Society Press
-
-
Koschke, R.1
Falke, R.2
Frenzel, P.3
-
50
-
-
0023385308
-
The program dependence graph and its use in optimization
-
Ferrante, J., Ottenstein, K., Warren, J.: The program dependence graph and its use in optimization. ACM Trans. on Prog. Lang. and Sys. 9(3) (1987) 319-349
-
(1987)
ACM Trans. on Prog. Lang. and Sys
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.2
Warren, J.3
-
51
-
-
0034770139
-
Identifying Similar Code with Program Dependence Graphs
-
Krinke, J.: Identifying Similar Code with Program Dependence Graphs. In: Working Conference on Reverse Engineering. (2001) 301-309
-
(2001)
Working Conference on Reverse Engineering
, pp. 301-309
-
-
Krinke, J.1
-
53
-
-
34548234736
-
Detection of redundant code using r2d2
-
IEEE Computer Society Press
-
Leitao, A.M.: Detection of redundant code using r2d2. In: Workshop Source Code Analysis and Manipulation, IEEE Computer Society Press (2003) 183-192
-
(2003)
Workshop Source Code Analysis and Manipulation
, pp. 183-192
-
-
Leitao, A.M.1
-
54
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
Wahler, V., Seipel, D., von Gudenberg, J.W., Fischer, G.: Clone detection in source code by frequent itemset techniques. In: Workshop Source Code Analysis and Manipulation. (2004) 128-135
-
(2004)
Workshop Source Code Analysis and Manipulation
, pp. 128-135
-
-
Wahler, V.1
Seipel, D.2
von Gudenberg, J.W.3
Fischer, G.4
-
55
-
-
84910009447
-
Cp-miner: A tool for finding copy-paste and related bugs in operating system code
-
Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In: Operating System Design and Implementation. (2004) 289-302
-
(2004)
Operating System Design and Implementation
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
56
-
-
34548812113
-
Evaluating clone detection tools for use during preventative maintenance
-
IEEE Computer Society Press
-
Bailey, J., Burd, E.: Evaluating clone detection tools for use during preventative maintenance. In: Workshop Source Code Analysis and Manipulation, IEEE Computer Society Press (2002) 36-43
-
(2002)
Workshop Source Code Analysis and Manipulation
, pp. 36-43
-
-
Bailey, J.1
Burd, E.2
-
58
-
-
0002895754
-
-
Technical report, University of Karlsruhe, Department of Informatics
-
Prechelt, L., Malpohl, G., Philippsen, M.: Jplag: Finding plagiarisms among a set of programs. Technical report, University of Karlsruhe, Department of Informatics (2000)
-
(2000)
Jplag: Finding plagiarisms among a set of programs
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
63
-
-
30344449773
-
On the use of clone detection for identifying crosscutting concern code
-
Bruntink, M., van Engelen, R., Tourwe, T.: On the use of clone detection for identifying crosscutting concern code. IEEE Computer Society Transactions on Software Engineering 31(10) (2005) 804-818
-
(2005)
IEEE Computer Society Transactions on Software Engineering
, vol.31
, Issue.10
, pp. 804-818
-
-
Bruntink, M.1
van Engelen, R.2
Tourwe, T.3
-
64
-
-
84952201613
-
Dotplot: A program for exploring self-similarity in millions of lines for text and code
-
Church, K.W., Helfman, J.I.: Dotplot: A program for exploring self-similarity in millions of lines for text and code. Journal of American Statistical Association, Institute for Mathematical Statistics and Interface Foundations of North America 2(2) (1993) 153-174
-
(1993)
Journal of American Statistical Association, Institute for Mathematical Statistics and Interface Foundations of North America
, vol.2
, Issue.2
, pp. 153-174
-
-
Church, K.W.1
Helfman, J.I.2
-
65
-
-
84948459152
-
Gemini: Maintenance support environment based on code clone analysis
-
IEEE Computer Society Press
-
Ueda, Y., Kamiya, T., Kusumoto, S., Inoue, K.: Gemini: Maintenance support environment based on code clone analysis. In: IEEE Symposium on Software Metrics, IEEE Computer Society Press (2002) 67-76
-
(2002)
IEEE Symposium on Software Metrics
, pp. 67-76
-
-
Ueda, Y.1
Kamiya, T.2
Kusumoto, S.3
Inoue, K.4
-
67
-
-
18144389452
-
Insights into system-wide code duplication
-
IEEE Computer Society Press
-
Rieger, M., Ducasse, S., Lanza, M.: Insights into system-wide code duplication. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (2004) 100-109
-
(2004)
Working Conference on Reverse Engineering
, pp. 100-109
-
-
Rieger, M.1
Ducasse, S.2
Lanza, M.3
-
70
-
-
33748601586
-
On the internet, software should be milked, not brewed
-
Flammia, G.: On the internet, software should be milked, not brewed. IEEE Expert 11(6) (1996) 87-88
-
(1996)
IEEE Expert
, vol.11
, Issue.6
, pp. 87-88
-
-
Flammia, G.1
-
72
-
-
0023960940
-
Detecting plagiarism in student pascal programs
-
Jankowitz, H.T.: Detecting plagiarism in student pascal programs. Computer Journal 1(31) (1988) 1-8
-
(1988)
Computer Journal
, vol.1
, Issue.31
, pp. 1-8
-
-
Jankowitz, H.T.1
-
73
-
-
32344452759
-
Compare: a collusion detector for pascal
-
Madhavji, N.H.: Compare: a collusion detector for pascal. Techniques et Sciences Informatiques 4(6) (1985) 489-497
-
(1985)
Techniques et Sciences Informatiques
, vol.4
, Issue.6
, pp. 489-497
-
-
Madhavji, N.H.1
-
74
-
-
84976757541
-
A tool that detects plagiarism in pascal programs
-
Grier, S.: A tool that detects plagiarism in pascal programs. SIGSCE Bulletin 13(1) (1981)
-
(1981)
SIGSCE Bulletin
, vol.13
, Issue.1
-
-
Grier, S.1
-
77
-
-
84948677440
-
An integrated approach for studying architectural evolution
-
IEEE Computer Society Press
-
Tu, Q., Godfrey, M.W.: An integrated approach for studying architectural evolution. In: International Workshop on Program Comprehension, IEEE Computer Society Press (2002) 127-136
-
(2002)
International Workshop on Program Comprehension
, pp. 127-136
-
-
Tu, Q.1
Godfrey, M.W.2
-
81
-
-
34547374057
-
Refactoring detection based on umldiff change-facts queries
-
IEEE Computer Society Press
-
Xing, Z., Stroulia, E.: Refactoring detection based on umldiff change-facts queries. In: Working Conference on Reverse Engineering, IEEE Computer Society Press (2003) 263-274
-
(2003)
Working Conference on Reverse Engineering
, pp. 263-274
-
-
Xing, Z.1
Stroulia, E.2
-
82
-
-
30344468434
-
Analyzing the evolutionary history of the logical design of object-oriented software
-
Xing, Z., Stroulia, E.: Analyzing the evolutionary history of the logical design of object-oriented software. IEEE Computer Society Transactions on Software Engineering 31(10) (2005) 850-868
-
(2005)
IEEE Computer Society Transactions on Software Engineering
, vol.31
, Issue.10
, pp. 850-868
-
-
Xing, Z.1
Stroulia, E.2
|