Understanding the evolution of Type-3 clones: An exploratory study
暂无分享,去创建一个
[1] Chanchal Kumar Roy,et al. The NiCad Clone Detector , 2011, 2011 IEEE 19th International Conference on Program Comprehension.
[2] Jens Krinke,et al. A Study of Consistent and Inconsistent Changes to Code Clones , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[3] Lu Zhang,et al. Can I clone this piece of code here? , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[4] Nils Göde,et al. Modeling Clone Evolution , 2009 .
[5] Rainer Koschke,et al. Studying clone evolution using incremental clone detection , 2013, J. Softw. Evol. Process..
[6] Ralph L. Rosnow,et al. Essentials of Behavioral Research: Methods and Data Analysis , 1984 .
[7] Rainer Koschke,et al. An extended assessment of type-3 clones as detected by state-of-the-art tools , 2011, Software Quality Journal.
[8] Miryung Kim,et al. An Empirical Study of Long-Lived Code Clones , 2011, FASE.
[9] Chanchal Kumar Roy,et al. A Mutation/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools , 2009, 2009 International Conference on Software Testing, Verification, and Validation Workshops.
[10] Saman Bazrafshan,et al. Evolution of Near-Miss Clones , 2012, 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation.
[11] Chanchal Kumar Roy,et al. Evaluating Code Clone Genealogies at Release Level: An Empirical Study , 2010, 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation.
[12] Ying Zou,et al. An Empirical Study on Inconsistent Changes to Code Clones at Release Level , 2009, 2009 16th Working Conference on Reverse Engineering.
[13] Chanchal K. Roy,et al. Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study , 2011, 2011 16th IEEE International Conference on Engineering of Complex Computer Systems.
[14] Nils Göde,et al. Evolution of Type-1 Clones , 2009, 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation.
[15] Martin P. Robillard,et al. Clone region descriptors: Representing and tracking duplication in source code , 2010, TSEM.
[16] James R. Cordy,et al. The TXL source transformation language , 2006, Sci. Comput. Program..
[17] Chanchal Kumar Roy,et al. Near-miss function clones in open source software : an empirical study , 2009 .
[18] Miryung Kim,et al. An empirical study of code clone genealogies , 2005, ESEC/FSE-13.
[19] Lerina Aversano,et al. How Clones are Maintained: An Empirical Study , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[20] Lerina Aversano,et al. An empirical study on the maintenance of source code clones , 2010, Empirical Software Engineering.
[21] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[22] Michel Wermelinger,et al. Tracking clones' imprint , 2010, IWSC '10.
[23] Giuliano Antoniol,et al. Modeling clones evolution through time series , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[24] Jens Krinke,et al. Is Cloned Code More Stable than Non-cloned Code? , 2008, 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation.
[25] Rainer Koschke,et al. Frequency and risks of changes to clones , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[26] Chanchal Kumar Roy,et al. An automatic framework for extracting and classifying near-miss clone genealogies , 2011, 2011 27th IEEE International Conference on Software Maintenance (ICSM).
[27] Tibor Gyimóthy,et al. Clone Smells in Software Evolution , 2007, 2007 IEEE International Conference on Software Maintenance.
[28] Premkumar T. Devanbu,et al. Clones: what is that smell? , 2010, 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010).