Searching for better configurations: a rigorous approach to clone evaluation
暂无分享,去创建一个
Mark Harman | Yue Jia | Tiantian Wang | Jens Krinke | M. Harman | Yue Jia | J. Krinke | Tiantian Wang
[1] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[2] Rainer Koschke,et al. Incremental Clone Detection , 2009, 2009 13th European Conference on Software Maintenance and Reengineering.
[3] Premkumar T. Devanbu,et al. Clones: What is that smell? , 2010, MSR.
[4] Yuanyuan Zhou,et al. CP-Miner: finding copy-paste and related bugs in large-scale software code , 2006, IEEE Transactions on Software Engineering.
[5] Mark Harman,et al. The Current State and Future of Search Based Software Engineering , 2007, Future of Software Engineering (FOSE '07).
[6] Michael D. Ernst,et al. CBCD: Cloned buggy code detector , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[7] Elmar Jürgens,et al. CloneDetective - A workbench for clone detection research , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[8] Bashar Nuseibeh,et al. Evaluating the relation between changeability decay and the characteristics of clones and methods , 2008, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering - Workshops.
[9] Martin P. Robillard,et al. Clone region descriptors: Representing and tracking duplication in source code , 2010, TSEM.
[10] Heejung Kim,et al. MeCC: memory comparison-based clone detector , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[11] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[12] Miryung Kim,et al. An empirical study of code clone genealogies , 2005, ESEC/FSE-13.
[13] Jane Cleland-Huang,et al. Improving trace accuracy through data-driven configuration and composition of tracing features , 2013, ESEC/FSE 2013.
[14] Shinji Kusumoto,et al. Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software , 2010, IWPSE-EVOL '10.
[15] Zhendong Su,et al. Scalable detection of semantic clones , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[16] Chanchal Kumar Roy,et al. An Empirical Study of Function Clones in Open Source Software , 2008, 2008 15th Working Conference on Reverse Engineering.
[17] Ying Zou,et al. An Empirical Study on Inconsistent Changes to Code Clones at Release Level , 2009, 2009 16th Working Conference on Reverse Engineering.
[18] Hoan Anh Nguyen,et al. Clone Management for Evolving Software , 2012, IEEE Transactions on Software Engineering.
[19] Yue Jia,et al. Cloning and copying between GNOME projects , 2010, 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010).
[20] Lerina Aversano,et al. An empirical study on the maintenance of source code clones , 2010, Empirical Software Engineering.
[21] Manishankar Mondal,et al. An Empirical Study of the Impacts of Clones in Software Maintenance , 2011, 2011 IEEE 19th International Conference on Program Comprehension.
[22] Arie van Deursen,et al. On the use of clone detection for identifying crosscutting concern code , 2005, IEEE Transactions on Software Engineering.
[23] Andrea De Lucia,et al. How to effectively use topic models for software engineering tasks? An approach based on Genetic Algorithms , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[24] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[25] Lionel C. Briand,et al. A practical guide for using statistical tests to assess randomized algorithms in software engineering , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[26] Manishankar Mondal,et al. Comparative stability of cloned and non-cloned code: an empirical study , 2012, SAC '12.
[27] Carlo Ghezzi,et al. A hybrid approach (syntactic and textual) to clone detection , 2010, IWSC '10.
[28] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[29] P. Lachenbruch. Statistical Power Analysis for the Behavioral Sciences (2nd ed.) , 1989 .
[30] Mark Harman,et al. Search Based Software Engineering: Techniques, Taxonomy, Tutorial , 2010, LASER Summer School.
[31] Jens Krinke,et al. A Study of Consistent and Inconsistent Changes to Code Clones , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[32] Chanchal Kumar Roy,et al. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach , 2009, Sci. Comput. Program..
[33] Giuliano Antoniol,et al. Comparison and Evaluation of Clone Detection Tools , 2007, IEEE Transactions on Software Engineering.
[34] Ying Zou,et al. An Empirical Study on Inconsistent Changes to Code Clones at Release Level , 2009, 2009 16th Working Conference on Reverse Engineering.
[35] Nils Göde,et al. Efficiently handling clone data: RCF and cyclone , 2011, IWSC '11.