[1] HINDLE A,BARR E T,GABEL M,et al.On the naturalness of software[J].Communications of the ACM,2016,59(5):122-131. [2] ZHANG Junnan.Research on code recommendation based on program analysis and neural network language model[D].Shanghai:Shanghai Normal University,2018.(in Chinese) 张俊男.基于程序分析和神经网络语言模型的代码推荐研究[D].上海:上海师范大学,2018. [3] RAYCHEV V,VECHEV M,YAHAV E.Code completion with statistical language models[C]//Proceedings of ACM SIGPLAN Symposium on Programming Language Design and Implementation.New York,USA:ACM Press,2014:419-428. [4] BRUCH M,MONPERRUS M,MEZINI M.Learning from examples to improve code completion systems[C]//Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering.New York,USA:ACM Press,2009:213-222. [5] HILL R,RIDEOUT J.Automatic method completion[C]//Proceedings of the 19th IEEE International Conference on Automated Software Engineering.Washington D.C.,USA:IEEE Press,2004:228-235. [6] WANG P C,SVAJLENKO J,WU Y Z,et al.CCAligner:a token based large-gap clone detector[C]//Proceedings of the 40th International Conference on Software Engineering.New York,USA:ACM Press,2018:1066-1077. [7] ROY C K,CORDY J R.A survey on software clone detection research,2007-541[R].Queen's University,2007. [8] BAKER B S.On finding duplication and near-duplication in large software systems[C]//Proceedings of Working Conference on Reverse Engineering.Washington D.C.,USA:IEEE Press,1995:86-95. [9] BAKER B S.Parameterized duplication in strings:algorithms and an application to software maintenance[J].SIAM Journal on Computing,1997,26(5):1343-1362. [10] KAMIYA T,KUSUMOTO S,INOUE K.CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J].IEEE Transactions on Software Engineering,2002,28(7):654-670. [11] ROY C K,CORDY J R.NICAD:accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization[C]//Proceedings of ICPC'08.Washington D.C.,USA:IEEE Press,2008:172-181. [12] JIANG L X,MISHERGHI G,SU Z D,et al.DECKARD:scalable and accurate tree-based detection of code clones[C]//Proceedings of the 16th IEEE International Conference on Software Engineering.Washington D.C.,USA:IEEE Press,2007:96-105. [13] LI Yajun,XU Baowen,ZHOU Xiaoyu.Detection of clone sequences and classes using AST[J].Journal of Southeast University(Natural Science Edition),2008,38(2):228-232.(in Chinese) 李亚军,徐宝文,周晓宇.基于AST的克隆序列与克隆类识别[J].东南大学学报(自然科学版),2008,38(2):228-232. [14] LIU Chao,CHEN Chen,HAN Jiawei,et al.GPLAG:detection of software plagiarism by program dependence graph analysis[C]//Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2006:872-881. [15] GUO Jing,WU Junhua.Clone detection based on program dependence graph and it's improvement[J].Computer Engineering and Design,2012,33(2):595-600.(in Chinese)郭婧,吴军华.基于程序依赖图的克隆检测及改进[J].计算机工程与设计,2012,33(2):595-600. [16] SAINI V,SAJNANI H,LOPES C.Comparing quality metrics for cloned and non cloned Java methods:a large scale empirical study[C]//Proceedings of IEEE International Conference on Software Maintenance and Evolution.Washington D.C.,USA:IEEE Press,2017:256-266. [17] YUAN Yuan,GUO Yao.Boreas:an accurate and scalable token-based approach to code clone detection[C]//Proceedings of IEEE/ACM International Conference on Automated Software Engineering.Washington D.C.,USA:IEEE Press,2012:286-289. [18] PENG Hao,MOU Lili,LI Ge,et al.Building program vector representations for deep learning[C]//Proceedings of International Conference on Knowledge Science,Engineering and Management.Berlin,Germany:Springer,2015:547-553. [19] CORDY J R.The TXL source transformation language[J].Science of Computer Programming,2006,61(3):190-210. [20] SVAJLENKO J,ROY C K,CORDY J R.A mutation analysis based benchmarking framework for clone detectors[C]//Proceedings of the 7th International Workshop on Software Clones.Washington D.C.,USA:IEEE Press,2013:8-9. |