[1] Kamiya T, Kusumoto S, Inoue K. CCFinder: A Multi-linguistic Token-based Code Clone Detection System for Large Scale Source Code[J]. IEEE Transactions on Software Engineering, 2002, 28(7): 654-670.
[2] Deissenboeck F, Hummel B, Juergens E. Code Clone De- tection in Practice[C]//Proc. of the 32nd ACM/IEEE Inter- national Conference on Software Engineering. Cape Town, South Africa: ACM Press, 2010.
[3] Roy C K, Cordy J R, Koschke R. Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach[J]. Science of Computer Programming, 2009, 74(7): 470-495.
[4] Johnson J H. Identifying Redundancy in Source Code Using Fingerprints[C]//Proc. of Centre for Advanced Studies on Collaborative Research: Software Engineering. [S. l.]: IBM Press, 1993.
[5] Baker B S. On Finding Duplication and Near-duplication in Large Software Systems[C]//Proc. of the 2nd Working Conference on Reverse Engineering. Toronto, Canada: IEEE Press, 1995.
[6] Li Zhenmin, Lu Shan, Myagmar S, et al. CP-Miner: Finding Copy-paste and Related Bugs in Large Scale Software Code[J]. IEEE Transactions on Software Engineering, 2006, 32(3): 176-192.
[7] Baxter I, Andrew Y, Moura L, et al. Clone Detection Using Abstract Syntax Trees[C]//Proc. of International Conference on Software Maintenance. Bethesda, USA: IEEE Press, 1998.
[8] 郭 婧, 吴军华. 基于程序依赖图的克隆检测及改进[J]. 计算机工程与设计, 2012, 33(2): 595-600.
[9] Mayrand J, Leblanc C, Merlo E. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics[C]//Proc. of International Conference on Software Maintenance. Monterey, USA: IEEE Press, 1996.
[10] Davis I, Godfrey M. From Whence It Came: Detecting Source Code Clones by Analyzing Assembler[C]//Proc. of the 17th Working Conference on Reverse Engineering. Beverly, USA: IEEE Press, 2010.
[11] Keivanloo I, Roy C K, Rilling J. Java Bytecode Clone Detection via Relaxation on Code Fingerprint and Semantic Web Reasoning[C]//Proc. of the 6th International Workshop on Software Clones. Zurich, Switzerland: [s. n.], 2012.
[12] Bulychev P, Minea M. An Evaluation of Duplicate Code Detection Using Anti-unification[C]//Proc. the 3rd Inter- national Workshop on Software Clones. Kaiserslautern, Germany: [s. n.], 2009.
[13] Kim H, Jung Y, Kim S, et al. Mecc: Memory Comparison- based Clone Detector[C]//Proc. of the 33rd International Conference on Software Engineering. Honolulu, USA: ACM Press, 2011.
[14] 于冬琦, 吴毅坚, 彭 鑫, 等. 基于相似性度量的面向对象程序方法级克隆侦测[J]. 电子学报, 2010, 38(2A): 174-181.
[15] Mohamed I A, Stefan K, Enno O. Replacing Suffix Trees with Enhanced Suffix Arrays[J]. Journal of Discrete Algorithms, 2004, 2(1): 53-86.
[16] Manber U, Myers G. Suffix Arrays: A New Method for On-line String Searches[J]. SIAM Journal on Computing, 1993, 22(5): 935-948.
[17] Karkainen J, Sanders P, Burkhardt S. Linear Work Suffix Array Construction[J]. Journal of the ACM, 2006, 53(6): 918-936.
[18] Kasai T, Lee G, Arimura T, et al. Linear-time Longest- common-prefix Computation in Suffix Arrays and Its Applications[C]//Proc. of the 12th Annual Symposium on Combinatorial Pattern Matching. Jerusalem, Palestine: Springer-Verlag, 2001.
[19] Zibran M F, Saha R K, Asaduzzaman M, et al. Analyzing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study[C]//Proc. of the 16th IEEE International Conference on Engineering of Complex Computer Systems. Las Vegas, USA: IEEE Press, 2011.
编辑 刘 冰 |