Publisher
Springer Science and Business Media LLC
Reference74 articles.
1. Al-Ekram R, Kapser C, Holt R, Godfrey M (2005) Cloning by accident: an empirical study of source code cloning across software systems. In: Proceedings of the 4th international symposium on empirical software engineering (ISESE), pp 376–385
2. Baker BS (1995) On finding duplicatation and near-duplication in large software systems. In: Proceedings of the 2nd working conference on reverse engineering (WCRE), pp 86–95
3. Baker BS (1997) Parameterized duplication in strings: algorithms and an application to software maintenance. Journal of Society for Industrial and Applied Mathematics (SIAM) 26(5):1343–1362
4. Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proceedings of the 27th international conference on software maintenance (ICSM), pp 273–282
5. Baxter ID, Yahin A, Moura L, Sant’Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the 14th international conference on software maintenance (ICSM), pp 368–377
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Encoding Version History Context for Better Code Representation;Proceedings of the 21st International Conference on Mining Software Repositories;2024-04-15
2. AntiCopyPaster 2.0: Whitebox just-in-time code duplicates extraction;Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings;2024-04-14
3. Just-in-time code duplicates extraction;Information and Software Technology;2023-06
4. Ranking code clones to support maintenance activities;Empirical Software Engineering;2023-04-25
5. CVMan: A Framework for Clone-Incurred Vulnerability Management;Applied Sciences;2023-04-14