参考文献
[1]Bettenburg N,Shang W,Ibrahim W M,et al.An Empirical Study on Inconsistent Changes to Code Clones at the Release Level[J].Science of Computer Programming,2012,77(6):760-776.
[2]Zibran M F,Roy C K.The Road to Software Clone Management:A Survey:Technical Report 2012-03[R].Canada,Saskatoon:The University of Saskatchewan,2012:1-66.
[3]Rainer K,Elmar J,Juergen R.7th International Workshop on Software Clones(IWSC 2013)[C]//Proceedings of International Conference on Software Engineering.San Francisco,USA:IEEE Press,2013:269-270.
[4]Roy C K.Detection andAnalysis of Near-miss Software Clones[C]//Proceedings of IEEE International Conference on Software Maintenance.Canada,Kingston:Queen’s University Press,2009:447-450.
[5]Pate J R,Tairas R,Kraft N A.Clone Evolution:A Systematic Review[J].Journal of Software Maintenance & Evolution Research & Practice,2013,25(3):261-283.
[6]Roy C K,Cordy J R,Koschke R.Comparison and Evaluation of Code Clone Detection Techniques and Tools:A Qualitative Approach[J].Journal of the International Society for Twin Studies,2009,74(7):470-495.
[7]Lague B,Proulx D,Mayrand J,et al.Assessing the Benefits of Incorporating Function Clone Detection in a Development Process[C]//Proceedings of International Conference on Software Maintenance.[S.1.]:IEEE Computer Society,1997:314-321.
[8]Kim M,Sazawal V,Notkin D,et al.An Empirical Study of Code Clone Genealogies[J].ACM SIGSOFT Software Engineering Notes,2005,30(5):187-196.
[9]Gode N,Koschke R.Incremental Clone Detection[C]//Proceedings of the 13th European Conference on Software Maintenance and Reengineering.Piscataway,USA:IEEE Press,2009:219-228.
[10]Keivanloo I.An Empirical Study on the Fault-proneness of Clone Migration in Clone Genealogies[C]//Proceedings of Software Evolution Week-IEEE Conference on Software Maintenance.[S.1.]:Reengineering and Reverse Engineering,2014:94-103.
[11]Saha R K,Roy C K,Schneider K A.gCad:A Near-miss Clone Genealogy Extractor to Support Clone Evolution Analysis[C]//Proceedings of the 29th IEEE International Conference on Software Maintenance.Eindhoven,the Netherlands:IEEE Press,2013:488-491.
[12]Duala-Ekoko E,Robillard M P.Tracking Code Clones in Evolving Software[J].Software Engineering,2007,116(67):158-167.
[13]Meng C,Su X H,Wang T T,et al.A New Clone Group Mapping Algorithm for Extracting Clone Genealogy on Multi-version Software[C]//Proceedings of the 3rd International Conference on Instrumentation,Measurement,Computer,Communication and Control.[S.1.]:IEEE Press,2013:848-853.
[14]涂颖,张丽萍,王春晖,等.基于软件多版本演化提取克隆谱系[J].计算机应用,2015,35(4):1169-1173.
[15]Kuhn A,Ducasse S,Grba T.Semantic Clustering:Identifying Topics in Source Code[J].Information & Software Technology,2007,49(3):230-243.
[16]Thomas S W,Adams B,Hassan A E,et al.Studying Software Evolution Using Topic Models[J].Science of Computer Programming,2014,80:457-479.
(下转第59页)
(上接第54页)
[17]Han X D,Wang X B,Liu C.Retrieval Method for Traceability Links Between Source Code and Chinese Documentation[J].Journal of Hefei University of Technology,2010,33(2):188-187.
[18]Nguyen A T,Nguyen T T,Alkofahi J,et al.ATopic-based Approach for Narrowing the Search Space of Buggy Files from a Bug Report[C]//Proceedings of IEEE/ACM International Conference on Automated Software Engineering.Washington D.C.,USA:IEEE Press,2011:263-272.
[19]尹丽丽,张丽萍,王春晖,等.基于潜在狄利克雷分配模型预测克隆代码不一致变化的可能性[J].计算机应用,2014,34(6):1788-1791.
[20]张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015,36(6):1524-1529.
[21]Roy C K,Cordy J R.NICAD:Accurate Detection of Near-miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization[C]//Proceedings of ICPC’08.Washington D.C.,USA:IEEE Press,2008:172-181.
编辑索书志 |