Semantic Clone Detection Using Machine Learning
暂无分享,去创建一个
[1] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[2] Juan José Rodríguez Diez,et al. Rotation Forest: A New Classifier Ensemble Method , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] David W. Aha,et al. Instance-Based Learning Algorithms , 1991, Machine Learning.
[4] Pierre Geurts,et al. Extremely randomized trees , 2006, Machine Learning.
[5] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[6] Jugal Kalita,et al. Code clone detection using coarse and fine-grained hybrid approaches , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).
[7] Cristina V. Lopes,et al. SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch Mode and during Software Development , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).
[8] Rainer Koschke,et al. Clone Detection Using Abstract Syntax Suffix Trees , 2006, 2006 13th Working Conference on Reverse Engineering.
[9] D. F. Morrison,et al. Multivariate Statistical Methods , 1968 .
[10] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.
[11] Y. Freund,et al. Discussion of the Paper \additive Logistic Regression: a Statistical View of Boosting" By , 2000 .
[12] R. Radhika,et al. Detection of Type-1 and Type-2 Code Clones Using Textual Analysis and Metrics , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[13] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[14] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[15] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[16] Shinji Kusumoto,et al. Incremental Code Clone Detection: A PDG-based Approach , 2011, 2011 18th Working Conference on Reverse Engineering.
[17] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[18] Lu Zhang,et al. Can I clone this piece of code here? , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[19] Ying Zou,et al. Threshold-free code clone detection for a large-scale heterogeneous Java repository , 2015, 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[20] Bruce W. Suter,et al. The multilayer perceptron as an approximation to a Bayes optimal discriminant function , 1990, IEEE Trans. Neural Networks.
[21] John G. Cleary,et al. K*: An Instance-based Learner Using and Entropic Distance Measure , 1995, ICML.
[22] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[23] Emad Shihab,et al. CCCD: Concolic code clone detection , 2013, 2013 20th Working Conference on Reverse Engineering (WCRE).
[24] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[25] Maninder Singh,et al. Software clone detection: A systematic review , 2013, Inf. Softw. Technol..
[26] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.