BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
clone detection
Google clone detection

Tag #clone detection

102 papers:

ICPCICPC-2019-LiuYJZS #contract #detection
Enabling clone detection for ethereum via smart contract birthmarks (HL0, ZY, YJ0, WZ, JS), pp. 105–115.
ICSMEICSME-2019-GaoWLYSC #approach #detection #named
TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
MSRMSR-2019-PerezC #abstract syntax tree #detection #learning #syntax
Cross-language clone detection by learning over abstract syntax trees (DP, SC), pp. 518–528.
SANERSANER-2019-BuchA #abstract syntax tree #detection #recursion #syntax
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection (LB, AA0), pp. 95–104.
SANERSANER-2019-Farmahinifarahani #detection #on the #precise #tool support
On Precision of Code Clone Detection Tools (FF, VS, DY, HS, CVL), pp. 84–94.
ASEASE-2019-NafiKRRS #api #detection #documentation #named #using
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ICSE-2019-SainiFLY0SBL #automation #detection #precise #towards
Towards automating precision studies of clone detectors (VS, FF, YL, DY, PM0, HS, PB, CVL), pp. 49–59.
FASEFASE-2019-NicholsEH #detection
Structural and Nominal Cross-Language Clone Detection (LN, ME, BH), pp. 247–263.
ICPCICPC-2018-BlasiG #identification #named
Replicomment: identifying clones in code comments (AB, AG), pp. 320–323.
MSRMSR-2018-NayrollesH #detection #fault #industrial #metric #named #scalability
CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects (MN, AHL), pp. 153–164.
SANERSANER-2018-RoyC #benchmark #detection #metric
Benchmarks for software clone detection: A ten-year retrospective (CKR, JRC), pp. 26–37.
SANERSANER-2018-VislavskiRCB #detection #named
LICCA: A tool for cross-language clone detection (TV, GR, NC, ZB), pp. 512–516.
SCAMSCAM-2018-KoschkeSB #detection
[Engineering Paper] Built-in Clone Detection in Meta Languages (RK, UBS, BJB), pp. 165–170.
ESEC-FSEESEC-FSE-2018-LiuYLJZS #detection #named #semantics #sketching #transaction
EClone: detect semantic clones in Ethereum via symbolic transaction sketch (HL, ZY, CL, YJ0, WZ, JS), pp. 900–903.
ICSE-2018-WangSWXR #detection #named
CCAligner: a token based large-gap clone detector (PW, JS, YW, YX, CKR), pp. 1066–1077.
ICPCICPC-2017-HuZLG #architecture #compilation #detection
Binary code clone detection across architectures and compiling configurations (YH, YZ0, JL, DG), pp. 88–98.
ICSMEICSME-2017-LiFZMR #approach #detection #named
CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
ICSMEICSME-2016-SvajlenkoR #detection #evaluation #framework #named
BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench (JS, CKR), pp. 596–600.
ICMTICMT-2016-StrueberPA #detection #graph #model transformation #transformation language
Clone Detection for Graph-Based Model Transformation Languages (DS, JP, VA), pp. 191–206.
ASEASE-2016-WhiteTVP #detection #learning
Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
ICSE-2016-SajnaniSSRL #detection #named #scalability
SourcererCC: scaling code clone detection to big-code (HS, VS, JS, CKR, CVL), pp. 1157–1168.
ICSMEICSME-2015-SvajlenkoR #detection #tool support
Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
SANERSANER-2015-Keivanloo0Z #detection #java #repository #scalability
Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
MoDELSMoDELS-2015-StephanC #detection #identification #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
ISSTAISSTA-2015-WangGMC #android #approach #detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
ICSMEICSME-2014-Stephan #analysis #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-SvajlenkoR #detection #tool support
Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
MSRMSR-2014-KrutzL
A code clone oracle (DEK, WL), pp. 388–391.
ICPCICPC-2013-Kamiya #detection #named #semantics
Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
ICPCICPC-2013-MurakamiHHIK #analysis #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-UddinRS #detection #named #performance #scalability
SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
WCREWCRE-2013-AntonyAC #approach #behaviour #detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCREWCRE-2013-KrutzS #detection #named
CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
ICSEICSE-2013-HermansSPD #detection #spreadsheet #visualisation
Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
ICSEICSE-2013-StephanASC #analysis #comparison #detection #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
CSMRCSMR-2012-Koschke #detection #scalability #using
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
ICPCICPC-2012-HauptmannJEJV #comprehension #detection #question
Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
ICPCICPC-2012-Keivanloo #code search #detection #source code
Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPCICPC-2012-KeivanlooRR #detection #named #semantics
SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
ICPCICPC-2012-SajnaniOL #detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-AlalfiCDSS #detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
SCAMSCAM-2012-MurakamiHHIK #detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCREWCRE-2012-HemelK #case study #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-IshiharaHHIK #detection #empirical #functional #library #towards
Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
WCREWCRE-2012-LavoieKMZ #detection #nearest neighbour #repository #using
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
ASEASE-2012-YuanG #approach #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
CSMRCSMR-2011-HigoK #dependence #detection #heuristic
Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
ICPCICPC-2011-Cordy #detection #incremental #scalability #similarity #using
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-CordyR11a #detection
The NiCad Clone Detector (JRC, CKR), pp. 219–220.
ICPCICPC-2011-KeivanlooRC #approach #hybrid #named #realtime
SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
MSRMSR-2011-HemelKVD #detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
WCREWCRE-2011-HigoUNK #approach #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-KeivanlooRC #multi #realtime
Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
MODELSMoDELS-2011-Al-BatranSH #detection #development #embedded #modelling #semantics
Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
ICSEICSE-2011-KimJKY #detection #memory management #named
MeCC: memory comparison-based clone detector (HK, YJ, SK, KY), pp. 301–310.
FASEFASE-2011-LiT #detection #erlang #incremental #source code
Incremental Clone Detection and Elimination for Erlang Programs (HL, SJT), pp. 356–370.
ICPCICPC-2010-BarbourYZ #detection #scalability
A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
ICSMEICSM-2010-CorazzaMMS #approach #detection #kernel
A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
ICSMEICSM-2010-HummelJHC #detection #distributed #incremental #scalability
Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
ICSMEICSM-2010-JalbertB #concurrent #debugging #detection #identification #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
MSRMSR-2010-SasakiYHI
Finding file clones in FreeBSD Ports Collection (YS, TY, YH, KI), pp. 102–105.
SCAMSCAM-2010-BrixtelFLBR #detection #independence
Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
WCREWCRE-2010-BiegelD #configuration management #detection
Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
WCREWCRE-2010-SelimFZ #detection #representation #using
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
PEPMPEPM-2010-BrownT #detection #haskell
Clone detection and elimination for Haskell (CB, SJT), pp. 111–120.
ASEASE-2010-BiegelD #api #detection #flexibility #implementation #named
JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
FSEFSE-2010-LeeRHK
Instant code clone search (MWL, JWR, SwH, SK), pp. 167–176.
ICSEICSE-2010-DeissenboeckHJ #detection
Code clone detection in practice (FD, BH, EJ), pp. 499–500.
ICSEICSE-2010-JurgensDFHSWDS #detection #quality #question #requirements #specification
Can clone detection support quality assessments of requirements specifications? (EJ, FD, MF, BH, BS, SW, CD, JS), pp. 79–88.
ICPCICPC-J-2008-RoyCK09 #approach #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-GodeK #detection #incremental
Incremental Clone Detection (NG, RK), pp. 219–228.
ICSMEICSM-2009-NguyenNAPN #detection #evolution #incremental #scalability
Scalable and incremental clone detection for evolving software (TTN, HAN, JMAK, NHP, TNN), pp. 491–494.
WCREWCRE-1999-HigoK99a #dependence #detection #graph #quality
Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
WCREWCRE-1999-KawaguchiYUFKNI99a #automation #detection #ide #named
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
PEPMPEPM-2009-LiT #detection #erlang #refactoring
Clone detection and removal for Erlang/OTP within a refactoring environment (HL, SJT), pp. 169–178.
ICSEICSE-2009-JurgensDH #detection #named #research
CloneDetective — A workbench for clone detection research (EJ, FD, BH), pp. 603–606.
ICSEICSE-2009-PhamNNAN #detection #graph #modelling
Complete and accurate clone detection in graph-based models (NHP, HAN, TTN, JMAK, TNN), pp. 276–286.
FASEFASE-2009-NguyenNPAN #detection #feature model #performance
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection (HAN, TTN, NHP, JMAK, TNN), pp. 440–455.
CSMRCSMR-2008-MendeBKM #detection #evolution #product line #using
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
ICPCICPC-2008-RoyC #comparison #detection
Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
SEKESEKE-2008-KraftBS #detection
Cross-language Clone Detection (NAK, BWB, RKS), pp. 54–59.
SPLCSPLC-2008-Dalgarno #detection #product line
Jump-Starting Software Product Lines with Clone Detection (AMD), p. 351.
ICSEICSE-2008-DeissenboeckHJSWGT #detection #development #modelling
Clone detection in automotive model-based development (FD, BH, EJ, BS, SW, JFG, ST), pp. 603–612.
WCREWCRE-2007-EvansFM #abstraction #detection
Clone Detection via Structural Abstraction (WSE, CWF, FM), pp. 150–159.
ASEASE-2007-TairasGB #detection #visualisation
Visualizing clone detection results (RT, JG, IDB), pp. 549–550.
ESEC-FSEESEC-FSE-2007-BasitJ #detection #flexibility #performance
Efficient token based clone detection with flexible tokenization (HAB, SJ), pp. 513–516.
WCREWCRE-2006-KoschkeFF #detection #syntax #using
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
ICSMEICSM-2004-BruntinkDTE #detection #evaluation #identification
An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
ICSMEICSM-2004-MerloAPR #analysis #complexity #detection #evolution #linear #object-oriented #similarity
Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
SCAMSCAM-2004-WahlerSGF #detection #source code
Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
ICEISICEIS-v1-2004-LuciaST #identification #similarity #using #web
Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
ASEASE-2004-RysselbergheD #detection #perspective #refactoring
Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
CSMRCSMR-2003-LanubileM #web
Finding Function Clones in Web Applications (FL, TM), p. 379–?.
IWPCIWPC-2003-LakhotiaLWY #benchmark #detection #metric #towards
Towards a Clone Detection Benchmark Suite and Results Archive (AL, JL, AW, YY), pp. 285–287.
WCREWCRE-2003-WalensteinJLYL #detection #problem
Problems Creating Task-relevant Clone Detection Reference Data (AW, NJ, JL, YY, AL), pp. 285–295.
SCAMSCAM-2002-BurdB #detection #maintenance #tool support
Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
SCAMSCAM-2001-AntoniolVDCM #identification #kernel #linux
Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
WCREWCRE-2000-BalazinskaMDLK #object-oriented #refactoring
Advanced Clone-Analysis to Support Object-Oriented System Refactoring (MB, EM, MD, BL, KK), pp. 98–107.
ICSMEICSM-1998-BaxterYMSB #abstract syntax tree #detection #syntax #using
Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
ICSMEICSM-2000-LaguePMMH #detection #development #process
Assessing the Benefits of Incorporating Function Clone Detection in a Development Process (BL, DP, JM, EM, JPH), pp. 314–321.
ICSMEICSM-1994-Johnson #detection #string
Substring Matching for Clone Detection and Change Tracking (JHJ), pp. 120–126.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.