On the use of clone detection for identifying crosscutting concern code
暂无分享,去创建一个
Arie van Deursen | Magiel Bruntink | Tom Tourwé | Remco van Engelen | M. Bruntink | A. Deursen | T. Tourwé
[1] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[2] Arie van Deursen,et al. Identifying aspects using fan-in analysis , 2004, 11th Working Conference on Reverse Engineering.
[3] Václav Rajlich,et al. Removing clones from the code , 1999, J. Softw. Maintenance Res. Pract..
[4] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[5] Magiel Bruntink,et al. Predicting class testability using object-oriented metrics , 2004 .
[6] William G. Griswold,et al. Exploiting the map metaphor in a tool for software evolution , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[7] Alexander Dekhtyar,et al. Information Retrieval , 2018, Lecture Notes in Computer Science.
[8] Yun Yang,et al. Problems creating task-relevant clone detection reference data , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[9] Hans-Arno Jacobsen,et al. Quantifying aspects in middleware platforms , 2003, AOSD '03.
[10] Ran Ettinger,et al. Untangling: a slice extraction refactoring , 2004, AOSD '04.
[11] Stéphane Ducasse,et al. A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[12] Kim Mens,et al. Mining aspectual views using formal concept analysis , 2004, Source Code Analysis and Manipulation, Fourth IEEE International Workshop on.
[13] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[14] KiczalesGregor,et al. Using aspectC to improve the modularity of path-specific customization in operating system code , 2001 .
[15] Miryung Kim,et al. An ethnographic study of copy and paste programming practices in OOPL , 2004, Proceedings. 2004 International Symposium on Empirical Software Engineering, 2004. ISESE '04..
[16] Gregor Kiczales,et al. Using aspectC to improve the modularity of path-specific customization in operating system code , 2001, ESEC/FSE-9.
[17] Serge Demeyer,et al. Evaluating clone detection techniques from a refactoring perspective , 2004 .
[18] Mariano Ceccato,et al. A qualitative comparison of three aspect mining techniques , 2005, 13th International Workshop on Program Comprehension (IWPC'05).
[19] Stéphane Ducasse,et al. Tool Support for Refactoring Duplicated OO Code , 1999, ECOOP Workshops.
[20] Emily Hill,et al. Design and Evaluation of an Automated Aspect Mining Tool , 2004, Software Engineering Research and Practice.
[21] Magdalena Balazinska,et al. Advanced clone-analysis to support object-oriented system refactoring , 2000, Proceedings Seventh Working Conference on Reverse Engineering.
[22] Gregor Kiczales,et al. Overcoming the Prevalent Decomposition in Legacy Code , 2001 .
[23] Stanley M. Sutton,et al. N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[24] William G. Griswold,et al. Design Recommendations for Concern Elaboration Tools , 2005 .
[25] Andrew Walenstein,et al. Clone Detector Evaluation Can Be Improved: Ideas from Information Retrieval , 2003 .
[26] M. Bruntink. Aspect Mining using Clone Class Metrics Magiel Bruntink , 2022 .
[27] Ettore Merlo,et al. Experiment on the automatic detection of function clones in a software system using metrics , 1996, 1996 Proceedings of International Conference on Software Maintenance.
[28] Arie van Deursen,et al. Isolating idiomatic crosscutting concerns , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[29] Arie van Deursen,et al. An evaluation of clone detection techniques for crosscutting concerns , 2004, 20th IEEE International Conference on Software Maintenance, 2004. Proceedings..
[30] Andrian Marcus,et al. Identification of high-level concept clones in source code , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[31] Brenda S. Baker,et al. On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.
[32] J. Howard Johnson,et al. Identifying redundancy in source code using fingerprints , 1993, CASCON.
[33] Jens Krinke,et al. Aspect mining using event traces , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[34] Hans-Arno Jacobsen,et al. PRISM is research in aSpect mining , 2004, OOPSLA '04.
[35] Richard C. Holt. Structural manipulations of software architecture using Tarski relational algebra , 1998, Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261).
[36] Serge Demeyer,et al. Evaluating clone detection techniques from a refactoring perspective , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[37] Serge Demeyer,et al. Reconstruction of successful software evolution using clone detection , 2003, Sixth International Workshop on Principles of Software Evolution, 2003. Proceedings..
[38] Gilad Mishne,et al. Source Code Retrieval using Conceptual Similarity , 2004, RIAO.
[39] Elliot Soloway,et al. Designing documentation to compensate for delocalized plans , 1988, CACM.