Tag #clone detection
102 papers:
- ICPC-2019-LiuYJZS #contract #detection
- Enabling clone detection for ethereum via smart contract birthmarks (HL0, ZY, YJ0, WZ, JS), pp. 105–115.
- ICSME-2019-GaoWLYSC #approach #detection #named
- TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
- MSR-2019-PerezC #abstract syntax tree #detection #learning #syntax
- Cross-language clone detection by learning over abstract syntax trees (DP, SC), pp. 518–528.
- SANER-2019-BuchA #abstract syntax tree #detection #recursion #syntax
- Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection (LB, AA0), pp. 95–104.
- SANER-2019-Farmahinifarahani #detection #on the #precise #tool support
- On Precision of Code Clone Detection Tools (FF, VS, DY, HS, CVL), pp. 84–94.
- ASE-2019-NafiKRRS #api #detection #documentation #named #using
- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
- ICSE-2019-SainiFLY0SBL #automation #detection #precise #towards
- Towards automating precision studies of clone detectors (VS, FF, YL, DY, PM0, HS, PB, CVL), pp. 49–59.
- FASE-2019-NicholsEH #detection
- Structural and Nominal Cross-Language Clone Detection (LN, ME, BH), pp. 247–263.
- ICPC-2018-BlasiG #identification #named
- Replicomment: identifying clones in code comments (AB, AG), pp. 320–323.
- MSR-2018-NayrollesH #detection #fault #industrial #metric #named #scalability
- CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects (MN, AHL), pp. 153–164.
- SANER-2018-RoyC #benchmark #detection #metric
- Benchmarks for software clone detection: A ten-year retrospective (CKR, JRC), pp. 26–37.
- SANER-2018-VislavskiRCB #detection #named
- LICCA: A tool for cross-language clone detection (TV, GR, NC, ZB), pp. 512–516.
- SCAM-2018-KoschkeSB #detection
- [Engineering Paper] Built-in Clone Detection in Meta Languages (RK, UBS, BJB), pp. 165–170.
- ESEC-FSE-2018-LiuYLJZS #detection #named #semantics #sketching #transaction
- EClone: detect semantic clones in Ethereum via symbolic transaction sketch (HL, ZY, CL, YJ0, WZ, JS), pp. 900–903.
- ICSE-2018-WangSWXR #detection #named
- CCAligner: a token based large-gap clone detector (PW, JS, YW, YX, CKR), pp. 1066–1077.
- ICPC-2017-HuZLG #architecture #compilation #detection
- Binary code clone detection across architectures and compiling configurations (YH, YZ0, JL, DG), pp. 88–98.
- ICSME-2017-LiFZMR #approach #detection #named
- CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
- ICSME-2016-SvajlenkoR #detection #evaluation #framework #named
- BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench (JS, CKR), pp. 596–600.
- ICMT-2016-StrueberPA #detection #graph #model transformation #transformation language
- Clone Detection for Graph-Based Model Transformation Languages (DS, JP, VA), pp. 191–206.
- ASE-2016-WhiteTVP #detection #learning
- Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
- ICSE-2016-SajnaniSSRL #detection #named #scalability
- SourcererCC: scaling code clone detection to big-code (HS, VS, JS, CKR, CVL), pp. 1157–1168.
- ICSME-2015-SvajlenkoR #detection #tool support
- Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
- SANER-2015-Keivanloo0Z #detection #java #repository #scalability
- Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
- MoDELS-2015-StephanC #detection #identification #using
- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
- ISSTA-2015-WangGMC #android #approach #detection #named #scalability
- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
- ICSME-2014-Stephan #analysis #detection #evaluation #mutation testing #using
- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
- ICSME-2014-SvajlenkoR #detection #tool support
- Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
- MSR-2014-KrutzL
- A code clone oracle (DEK, WL), pp. 388–391.
- ICPC-2013-Kamiya #detection #named #semantics
- Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
- ICPC-2013-MurakamiHHIK #analysis #detection #lightweight #source code
- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
- ICPC-2013-UddinRS #detection #named #performance #scalability
- SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
- WCRE-2013-AntonyAC #approach #behaviour #detection #modelling
- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
- WCRE-2013-KrutzS #detection #named
- CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
- ICSE-2013-HermansSPD #detection #spreadsheet #visualisation
- Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
- ICSE-2013-StephanASC #analysis #comparison #detection #framework #mutation testing #using
- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
- WICSA-ECSA-2012-AstekinS #analysis #detection #simulation
- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
- CSMR-2012-Koschke #detection #scalability #using
- Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
- ICPC-2012-HauptmannJEJV #comprehension #detection #question
- Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
- ICPC-2012-Keivanloo #code search #detection #source code
- Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
- ICPC-2012-KeivanlooRR #detection #named #semantics
- SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
- ICPC-2012-SajnaniOL #detection #parallel #pipes and filters #using
- Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
- ICSM-2012-AlalfiCDSS #detection #modelling
- Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
- SCAM-2012-MurakamiHHIK #detection
- Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
- WCRE-2012-HemelK #case study #detection #linux #reverse engineering #source code #using #variability
- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
- WCRE-2012-IshiharaHHIK #detection #empirical #functional #library #towards
- Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
- WCRE-2012-LavoieKMZ #detection #nearest neighbour #repository #using
- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
- ASE-2012-YuanG #approach #detection #named #scalability
- Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
- CSMR-2011-HigoK #dependence #detection #heuristic
- Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
- ICPC-2011-Cordy #detection #incremental #scalability #similarity #using
- Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
- ICPC-2011-CordyR11a #detection
- The NiCad Clone Detector (JRC, CKR), pp. 219–220.
- ICPC-2011-KeivanlooRC #approach #hybrid #named #realtime
- SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
- MSR-2011-HemelKVD #detection
- Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
- WCRE-2011-HigoUNK #approach #detection #incremental
- Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
- WCRE-2011-KeivanlooRC #multi #realtime
- Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
- MoDELS-2011-Al-BatranSH #detection #development #embedded #modelling #semantics
- Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
- ICSE-2011-KimJKY #detection #memory management #named
- MeCC: memory comparison-based clone detector (HK, YJ, SK, KY), pp. 301–310.
- FASE-2011-LiT #detection #erlang #incremental #source code
- Incremental Clone Detection and Elimination for Erlang Programs (HL, SJT), pp. 356–370.
- ICPC-2010-BarbourYZ #detection #scalability
- A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
- ICSM-2010-CorazzaMMS #approach #detection #kernel
- A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
- ICSM-2010-HummelJHC #detection #distributed #incremental #scalability
- Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
- ICSM-2010-JalbertB #concurrent #debugging #detection #identification #using
- Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
- MSR-2010-SasakiYHI
- Finding file clones in FreeBSD Ports Collection (YS, TY, YH, KI), pp. 102–105.
- SCAM-2010-BrixtelFLBR #detection #independence
- Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
- WCRE-2010-BiegelD #configuration management #detection
- Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
- WCRE-2010-SelimFZ #detection #representation #using
- Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
- PEPM-2010-BrownT #detection #haskell
- Clone detection and elimination for Haskell (CB, SJT), pp. 111–120.
- ASE-2010-BiegelD #api #detection #flexibility #implementation #named
- JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
- FSE-2010-LeeRHK
- Instant code clone search (MWL, JWR, SwH, SK), pp. 167–176.
- ICSE-2010-DeissenboeckHJ #detection
- Code clone detection in practice (FD, BH, EJ), pp. 499–500.
- ICSE-2010-JurgensDFHSWDS #detection #quality #question #requirements #specification
- Can clone detection support quality assessments of requirements specifications? (EJ, FD, MF, BH, BS, SW, CD, JS), pp. 79–88.
- ICPC-J-2008-RoyCK09 #approach #comparison #detection #evaluation #tool support
- Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
- CSMR-2009-GodeK #detection #incremental
- Incremental Clone Detection (NG, RK), pp. 219–228.
- ICSM-2009-NguyenNAPN #detection #evolution #incremental #scalability
- Scalable and incremental clone detection for evolving software (TTN, HAN, JMAK, NHP, TNN), pp. 491–494.
- WCRE-1999-HigoK99a #dependence #detection #graph #quality
- Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
- WCRE-1999-KawaguchiYUFKNI99a #automation #detection #ide #named
- SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
- PEPM-2009-LiT #detection #erlang #refactoring
- Clone detection and removal for Erlang/OTP within a refactoring environment (HL, SJT), pp. 169–178.
- ICSE-2009-JurgensDH #detection #named #research
- CloneDetective — A workbench for clone detection research (EJ, FD, BH), pp. 603–606.
- ICSE-2009-PhamNNAN #detection #graph #modelling
- Complete and accurate clone detection in graph-based models (NHP, HAN, TTN, JMAK, TNN), pp. 276–286.
- FASE-2009-NguyenNPAN #detection #feature model #performance
- Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection (HAN, TTN, NHP, JMAK, TNN), pp. 440–455.
- CSMR-2008-MendeBKM #detection #evolution #product line #using
- Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
- ICPC-2008-RoyC #comparison #detection
- Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
- SEKE-2008-KraftBS #detection
- Cross-language Clone Detection (NAK, BWB, RKS), pp. 54–59.
- SPLC-2008-Dalgarno #detection #product line
- Jump-Starting Software Product Lines with Clone Detection (AMD), p. 351.
- ICSE-2008-DeissenboeckHJSWGT #detection #development #modelling
- Clone detection in automotive model-based development (FD, BH, EJ, BS, SW, JFG, ST), pp. 603–612.
- WCRE-2007-EvansFM #abstraction #detection
- Clone Detection via Structural Abstraction (WSE, CWF, FM), pp. 150–159.
- ASE-2007-TairasGB #detection #visualisation
- Visualizing clone detection results (RT, JG, IDB), pp. 549–550.
- ESEC-FSE-2007-BasitJ #detection #flexibility #performance
- Efficient token based clone detection with flexible tokenization (HAB, SJ), pp. 513–516.
- WCRE-2006-KoschkeFF #detection #syntax #using
- Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
- ICSM-2004-BruntinkDTE #detection #evaluation #identification
- An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
- ICSM-2004-MerloAPR #analysis #complexity #detection #evolution #linear #object-oriented #similarity
- Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
- SCAM-2004-WahlerSGF #detection #source code
- Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
- ICEIS-v1-2004-LuciaST #identification #similarity #using #web
- Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
- ASE-2004-RysselbergheD #detection #perspective #refactoring
- Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
- CSMR-2003-LanubileM #web
- Finding Function Clones in Web Applications (FL, TM), p. 379–?.
- IWPC-2003-LakhotiaLWY #benchmark #detection #metric #towards
- Towards a Clone Detection Benchmark Suite and Results Archive (AL, JL, AW, YY), pp. 285–287.
- WCRE-2003-WalensteinJLYL #detection #problem
- Problems Creating Task-relevant Clone Detection Reference Data (AW, NJ, JL, YY, AL), pp. 285–295.
- SCAM-2002-BurdB #detection #maintenance #tool support
- Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
- SCAM-2001-AntoniolVDCM #identification #kernel #linux
- Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
- WCRE-2000-BalazinskaMDLK #object-oriented #refactoring
- Advanced Clone-Analysis to Support Object-Oriented System Refactoring (MB, EM, MD, BL, KK), pp. 98–107.
- ICSM-1998-BaxterYMSB #abstract syntax tree #detection #syntax #using
- Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
- ICSM-2000-LaguePMMH #detection #development #process
- Assessing the Benefits of Incorporating Function Clone Detection in a Development Process (BL, DP, JM, EM, JPH), pp. 314–321.
- ICSM-1994-Johnson #detection #string
- Substring Matching for Clone Detection and Change Tracking (JHJ), pp. 120–126.