A Hybrid Clone Detection Technique for Estimation of Resource Requirements of a Job
暂无分享,去创建一个
S. Roy | N. Mukherjee | M. Sarkar | S. Chudamani | N. Mukherjee | S. Roy | Sarbani Roy | M. Sarkar | S. Chudamani | Sameeta Chudamani
[1] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[2] Rainer Koschke,et al. Clone Detection Using Abstract Syntax Suffix Trees , 2006, 2006 13th Working Conference on Reverse Engineering.
[3] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[4] Arthur Bernard Maccabe,et al. Program Dependence Graphs for the Rest of Us , 1992 .
[5] Jeffrey G. Gray,et al. Phoenix-based clone detection using suffix trees , 2006, ACM-SE 44.
[6] Susan Horwitz,et al. Using Slicing to Identify Duplication in Source Code , 2001, SAS.
[7] Ajanta De Sarkar,et al. An Adaptive Execution Scheme for Achieving Guaranteed Performance in Computational Grids , 2010, Journal of Grid Computing.
[8] Daniel S. Hirschberg,et al. A linear space algorithm for computing maximal common subsequences , 1975, Commun. ACM.
[9] Sarbani Roy,et al. Adaptive Execution of Jobs in Computational Grid Environment , 2009, Journal of Computer Science and Technology.
[10] Wuu Yang,et al. Identifying syntactic differences between two programs , 1991, Softw. Pract. Exp..
[11] Jens Krinke,et al. Identifying similar code with program dependence graphs , 2001, Proceedings Eighth Working Conference on Reverse Engineering.
[12] Massimiliano Di Penta,et al. Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages , 2001 .
[13] Ettore Merlo,et al. Experiment on the automatic detection of function clones in a software system using metrics , 1996, 1996 Proceedings of International Conference on Software Maintenance.
[14] Michael W. Godfrey,et al. Supporting the analysis of clones in software systems , 2006, J. Softw. Maintenance Res. Pract..
[15] Nandini Mukherjee,et al. Implementation of execution history in non-relational databases for feedback-guided job modeling , 2012, CUBE.
[16] Magdalena Balazinska,et al. Measuring clone based reengineering opportunities , 1999, Proceedings Sixth International Software Metrics Symposium (Cat. No.PR00403).
[17] Sarbani Roy,et al. Feedback-Guided Analysis for Resource Requirements in Large Distributed System , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[18] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[19] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[20] Liu Dongsheng,et al. An XML plagiarism detection model for C program , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).