Author:
Rahman Foyzur,Bird Christian,Devanbu Premkumar
Publisher
Springer Science and Business Media LLC
Reference45 articles.
1. Alkhatib G (1992) The maintenance problem of application software: an empirical analysis. J Softw Maint: Res Pract 4(2):83–104. doi: 10.1002/smr.4360040203
2. Bachmann A, Bernstein A (2009) Data retrieval, processing and linking for software process data analysis. Technical report, University of Zurich. http://www.ifi.uzh.ch/ddis/people/adrian-bachmann/pdq/ . Accessed May 2009
3. Baker BS (1995) On finding duplication and near-duplication in large software systems. In: WCRE ’95: proceedings of the 2nd working conference on reverse engineering. IEEE Computer Society, Washington, pp 86–95. http://portal.acm.org/citation.cfm?id=836911
4. Balazinska M, Merlo E, Dagenais M, Lague B, Kontogiannis K (1999) Partial redesign of java software systems based on clone analysis. In: WCRE ’99: proceedings of the 6th working conference on reverse engineering. IEEE Computer Society, Washington, pp 326–336. http://portal.acm.org/citation.cfm?id=837061
5. Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Study of Code Smells: A Review and Research Agenda;International Journal of Mathematical, Engineering and Management Sciences;2024-06-01
2. A multi-objective effort-aware defect prediction approach based on NSGA-II;Applied Soft Computing;2023-12
3. Anti-Patterns (Smells) in Temporal Specifications;2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER);2023-05
4. An Empirical Comparison on the Results of Different Clone Detection Setups for C-based Projects;2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP);2023-05
5. CVMan: A Framework for Clone-Incurred Vulnerability Management;Applied Sciences;2023-04-14